Vulnerabilities (CVE)

Filtered by CWE-434
Total 2367 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-23970 1 Woorockets 1 Corsa 2023-12-27 N/A 8.8 HIGH
Unrestricted Upload of File with Dangerous Type vulnerability in WooRockets Corsa.This issue affects Corsa: from n/a through 1.5.
CVE-2023-25970 1 Zendrop 1 Zendrop 2023-12-27 N/A 9.8 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in Zendrop Zendrop – Global Dropshipping.This issue affects Zendrop – Global Dropshipping: from n/a through 1.0.0.
CVE-2023-48371 1 Itpison 1 Omicard Edm 2023-12-22 N/A 9.8 CRITICAL
ITPison OMICARD EDM’s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
CVE-2023-48394 1 Kaifa 1 Webitr Attendance System 2023-12-22 N/A 8.8 HIGH
Kaifa Technology WebITR is an online attendance system, its file uploading function does not restrict upload of file with dangerous type. A remote attacker with regular user privilege can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service.
CVE-2023-47706 3 Ibm, Linux, Microsoft 4 Aix, Security Guardium Key Lifecycle Manager, Linux Kernel and 1 more 2023-12-22 N/A 8.8 HIGH
IBM Security Guardium Key Lifecycle Manager 4.3 could allow an authenticated user to upload files of a dangerous file type. IBM X-Force ID: 271341.
CVE-2023-4311 1 Maurice 1 Vrm360 2023-12-21 N/A 8.8 HIGH
The Vrm 360 3D Model Viewer WordPress plugin through 1.2.1 is vulnerable to arbitrary file upload due to insufficient checks in a plugin shortcode.
CVE-2023-46263 2 Ivanti, Microsoft 2 Avalanche, Windows 2023-12-21 N/A 9.8 CRITICAL
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.4.1 and below that could allow an attacker to achieve a remote code execution.
CVE-2023-46264 2 Ivanti, Microsoft 2 Avalanche, Windows 2023-12-21 N/A 9.8 CRITICAL
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.4.1 and below that could allow an attacker to achieve a remove code execution.
CVE-2023-6826 1 E2pdf 1 E2pdf 2023-12-21 N/A 7.2 HIGH
The E2Pdf plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'import_action' function in versions up to, and including, 1.20.25. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2023-6827 1 G5plus 1 Essential Real Estate 2023-12-21 N/A 8.8 HIGH
The Essential Real Estate plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'ajaxUploadFonts' function in versions up to, and including, 4.3.5. This makes it possible for authenticated attackers with subscriber-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2023-48376 1 Csharp 1 Cws Collaborative Development Platform 2023-12-20 N/A 9.8 CRITICAL
SmartStar Software CWS is a web-based integration platform, its file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service.
CVE-2023-50564 1 Pluck-cms 1 Pluck 2023-12-18 N/A 8.8 HIGH
An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.
CVE-2023-6794 1 Paloaltonetworks 1 Pan-os 2023-12-18 N/A 4.7 MEDIUM
An arbitrary file upload vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
CVE-2023-6723 1 Europeana 1 Repox 2023-12-15 N/A 9.8 CRITICAL
An unrestricted file upload vulnerability has been identified in Repbox, which allows an attacker to upload malicious files via the transforamationfileupload function, due to the lack of proper file type validation controls, resulting in a full system compromise.
CVE-2023-48930 1 Rockoa 1 Xinhu 2023-12-11 N/A 9.8 CRITICAL
xinhu xinhuoa 2.2.1 contains a File upload vulnerability.
CVE-2023-4122 1 Imsurajghosh 1 Student Information System 2023-12-11 N/A 8.8 HIGH
Student Information System v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'photo' parameter of my-profile page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application.
CVE-2023-40460 1 Sierrawireless 8 Aleos, Es450, Gx450 and 5 more 2023-12-08 N/A 5.4 MEDIUM
The ACEManager component of ALEOS 4.16 and earlier does not validate uploaded file names and types, which could potentially allow an authenticated user to perform client-side script execution within ACEManager, altering the device functionality until the device is restarted.
CVE-2023-5953 1 Collne 1 Welcart E-commerce 2023-12-08 N/A 8.8 HIGH
The Welcart e-Commerce WordPress plugin before 2.9.5 does not validate files to be uploaded, as well as does not have authorisation and CSRF in an AJAX action handling such upload. As a result, any authenticated users, such as subscriber could upload arbitrary files, such as PHP on the server
CVE-2023-48965 1 Thinkadmin 1 Thinkadmin 2023-12-07 N/A 8.8 HIGH
An issue in the component /admin/api.plugs/script of ThinkAdmin v6.1.53 allows attackers to getshell via providing a crafted URL to download a malicious PHP file.
CVE-2023-48966 1 Thinkadmin 1 Thinkadmin 2023-12-07 N/A 8.8 HIGH
An arbitrary file upload vulnerability in the component /admin/api.upload/file of ThinkAdmin v6.1.53 allows attackers to execute arbitrary code via a crafted Zip file.