Total
2367 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-4972 | 1 Ajax Upload For Gravity Forms Project | 1 Ajax Upload For Gravity Forms | 2018-02-01 | 7.5 HIGH | 9.8 CRITICAL |
Unrestricted file upload vulnerability in the Gravity Upload Ajax plugin 1.1 and earlier for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file under wp-content/uploads/gravity_forms. | |||||
CVE-2017-15549 | 1 Emc | 3 Avamar Server, Integrated Data Protection Appliance, Networker | 2018-01-18 | 9.0 HIGH | 8.8 HIGH |
An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote authenticated malicious user with low privileges could potentially upload arbitrary maliciously crafted files in any location on the server file system. | |||||
CVE-2017-16949 | 1 Accesspressthemes | 1 Anonymous Post Pro | 2018-01-12 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in the AccessKeys AccessPress Anonymous Post Pro plugin through 3.1.9 for WordPress. Improper input sanitization allows the attacker to override the settings for allowed file extensions and upload file size, related to inc/cores/file-uploader.php and file-uploader/file-uploader-class.php. This allows the attacker to upload anything they want to the server, as demonstrated by an action=ap_file_upload_action&allowedExtensions[]=php request to /wp-admin/admin-ajax.php that results in a .php file upload and resultant PHP code execution. | |||||
CVE-2017-17874 | 1 Vanguard Project | 1 Marketplace Digital Products Php | 2018-01-11 | 6.5 MEDIUM | 8.8 HIGH |
Vanguard Marketplace Digital Products PHP 1.4 allows arbitrary file upload via an "Add a new product" or "Add a product preview" action, which can make a .php file accessible under a uploads/ URI. | |||||
CVE-2017-17987 | 1 Muslim Matrimonial Script Project | 1 Muslim Matrimonial Script | 2018-01-09 | 6.5 MEDIUM | 7.2 HIGH |
PHP Scripts Mall Muslim Matrimonial Script allows arbitrary file upload via admin/mydetails_edit.php. | |||||
CVE-2017-15876 | 1 Sistemagpweb | 1 Gpweb | 2018-01-05 | 9.0 HIGH | 7.2 HIGH |
Unrestricted File Upload vulnerability in GPWeb 8.4.61 allows remote authenticated users to upload any type of file, including a PHP shell. | |||||
CVE-2017-17727 | 1 Dedecms | 1 Dedecms | 2018-01-04 | 6.8 MEDIUM | 8.8 HIGH |
DedeCMS through 5.6 allows arbitrary file upload and PHP code execution by embedding the PHP code in a .jpg file, which is used in the templet parameter to member/article_edit.php. | |||||
CVE-2017-15673 | 1 Cs-cart | 1 Cs-cart | 2017-12-20 | 9.0 HIGH | 7.2 HIGH |
The files function in the administration section in CS-Cart 4.6.2 and earlier allows attackers to execute arbitrary PHP code via vectors involving a custom page. | |||||
CVE-2017-12332 | 1 Cisco | 2 Nx-os, Unified Computing System | 2017-12-15 | 4.9 MEDIUM | 4.4 MEDIUM |
A vulnerability in Cisco NX-OS System Software patch installation could allow an authenticated, local attacker to write a file to arbitrary locations. The vulnerability is due to insufficient restrictions in the patch installation process. An attacker could exploit this vulnerability by installing a crafted patch image on an affected device. The vulnerable operation occurs prior to patch activation. An exploit could allow the attacker to write arbitrary files on an affected system as root. The attacker would need valid administrator credentials to perform this exploit. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Unified Computing System Manager. Cisco Bug IDs: CSCvf16513, CSCvf23794, CSCvf23832. | |||||
CVE-2017-8862 | 1 Cohuhd | 2 3960hd, 3960hd Firmware | 2017-12-12 | 10.0 HIGH | 9.8 CRITICAL |
The webupgrade function on the Cohu 3960HD does not verify the firmware upgrade files or process, allowing an attacker to upload a specially crafted postinstall.sh file that will be executed with "root" privileges. | |||||
CVE-2017-2737 | 1 Huawei | 2 Vcm5010, Vcm5010 Firmware | 2017-12-11 | 6.5 MEDIUM | 8.8 HIGH |
VCM5010 with software versions earlier before V100R002C50SPC100 has an arbitrary file upload vulnerability. The software does not validate the files that uploaded. An authenticated attacker could upload arbitrary files to the system. | |||||
CVE-2017-15054 | 1 Teampass | 1 Teampass | 2017-12-07 | 6.5 MEDIUM | 7.5 HIGH |
An arbitrary file upload vulnerability, present in TeamPass before 2.1.27.9, allows remote authenticated users to upload arbitrary files leading to Remote Command Execution. To exploit this vulnerability, an authenticated attacker has to tamper with parameters of a request to upload.files.php, in order to select the correct branch and be able to upload any arbitrary file. From there, it can simply access the file to execute code on the server. | |||||
CVE-2017-14251 | 1 Typo3 | 1 Typo3 | 2017-12-04 | 6.5 MEDIUM | 8.8 HIGH |
Unrestricted File Upload vulnerability in the fileDenyPattern in sysext/core/Classes/Core/SystemEnvironmentBuilder.php in TYPO3 7.6.0 to 7.6.21 and 8.0.0 to 8.7.4 allows remote authenticated users to upload files with a .pht extension and consequently execute arbitrary PHP code. | |||||
CVE-2017-1000238 | 1 Invoiceplane | 1 Invoiceplane | 2017-11-30 | 6.5 MEDIUM | 8.8 HIGH |
InvoicePlane version 1.4.10 is vulnerable to a Arbitrary File Upload resulting in an authenticated user can upload a malicious file to the webserver. It is possible for an attacker to upload a script which is able to compromise the webserver. | |||||
CVE-2017-16524 | 2 Hanwhasecurity, Samsung | 2 Web Viewer, Srn-1670d | 2017-11-29 | 6.5 MEDIUM | 8.8 HIGH |
Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted file upload vulnerability: 'network_ssl_upload.php' allows remote authenticated attackers to upload and execute arbitrary PHP code via a filename with a .php extension, which is then accessed via a direct request to the file in the upload/ directory. To authenticate for this attack, one can obtain web-interface credentials in cleartext by leveraging the existing Local File Read Vulnerability referenced as CVE-2015-8279, which allows remote attackers to read the web-interface credentials via a request for the cslog_export.php?path=/root/php_modules/lighttpd/sbin/userpw URI. | |||||
CVE-2017-15957 | 1 Ingenious School Management System Project | 1 Ingenious School Management System | 2017-11-17 | 6.5 MEDIUM | 8.8 HIGH |
my_profile.php in Ingenious School Management System 2.3.0 allows a student or teacher to upload an arbitrary file. | |||||
CVE-2017-15962 | 1 Istock Management System Project | 1 Istock Management System | 2017-11-17 | 7.5 HIGH | 9.8 CRITICAL |
iStock Management System 1.0 allows Arbitrary File Upload via user/profile. | |||||
CVE-2014-2664 | 1 X2engine | 1 X2crm | 2017-11-08 | 6.5 MEDIUM | 8.8 HIGH |
Unrestricted file upload vulnerability in the ProfileController::actionUploadPhoto method in protected/controllers/ProfileController.php in X2Engine X2CRM before 4.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory. | |||||
CVE-2015-2780 | 1 Berta | 1 Berta Cms | 2017-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Unrestricted file upload vulnerability in Berta CMS allows remote attackers to execute arbitrary code by uploading a crafted image file with an executable extension, then accessing it via a direct request to the file in an unspecified directory. | |||||
CVE-2011-4334 | 1 Labwiki Project | 1 Labwiki | 2017-10-25 | 6.5 MEDIUM | 8.8 HIGH |
edit.php in LabWiki 1.1 and earlier does not properly verify uploaded user files, which allows remote authenticated users to upload arbitrary PHP files via a PHP file with a .gif extension in the userfile parameter. |