Vulnerabilities (CVE)

Filtered by CWE-434
Total 2367 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-32119 1 Arox 1 School Erp Pro 2022-07-22 N/A 8.8 HIGH
Arox School ERP Pro v1.0 was discovered to contain multiple arbitrary file upload vulnerabilities via the Add Photo function at photogalleries.inc.php and the import staff excel function at 1finance_master.inc.php.
CVE-2022-31134 1 Zulip 1 Zulip Server 2022-07-22 4.0 MEDIUM 4.9 MEDIUM
Zulip is an open-source team collaboration tool. Zulip Server versions 2.1.0 above have a user interface tool, accessible only to server owners and server administrators, which provides a way to download a "public data" export. While this export is only accessible to administrators, in many configurations server administrators are not expected to have access to private messages and private streams. However, the "public data" export which administrators could generate contained the attachment contents for all attachments, even those from private messages and streams. Zulip Server version 5.4 contains a patch for this issue.
CVE-2021-36711 1 Octobot 1 Octobot 2022-07-22 N/A 9.8 CRITICAL
WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
CVE-2022-28369 1 Verizon 2 Lvskihp Indoorunit, Lvskihp Indoorunit Firmware 2022-07-21 N/A 9.8 CRITICAL
Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 does not validate the user-provided URL within the crtcmode function's enable_ssh sub-operation of the crtcrpc JSON listener (found at /lib/functions/wnc_jsonsh/crtcmode.sh) A remote attacker on the local network can provide a malicious URL. The data (found at that URL) is written to /usr/sbin/dropbear and then executed as root.
CVE-2022-28372 1 Verizon 4 Lvskihp Indoorunit, Lvskihp Indoorunit Firmware, Lvskihp Outdoorunit and 1 more 2022-07-21 N/A 7.5 HIGH
On Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 and OutDoorUnit (ODU) 3.33.101.0 devices, the CRTC and ODU RPC endpoints provide a means of provisioning a firmware update for the device via crtc_fw_upgrade or crtcfwimage. The URL provided is not validated, and thus allows for arbitrary file upload to the device. This occurs in /lib/lua/luci/crtc.lua (IDU) and /lib/functions/wnc_jsonsh/wnc_crtc_fw.sh (ODU).
CVE-2022-22450 2 Ibm, Linux 2 Security Verify Governance, Linux Kernel 2022-07-20 N/A 3.8 LOW
IBM Security Verify Identity Manager 10.0 could allow a privileged user to upload a malicious file by bypassing extension security in an HTTP request. IBM X-Force ID: 224916.
CVE-2021-36461 1 Microweber 1 Microweber 2022-07-19 6.5 MEDIUM 8.8 HIGH
An Arbitrary File Upload vulnerability exists in Microweber 1.1.3 that allows attackers to getshell via the Settings Upload Picture section by uploading pictures with malicious code, user.ini.
CVE-2022-1952 1 Syntactics 1 Free Booking Plugin For Hotels\, Restaurant And Car Rental 2022-07-15 7.5 HIGH 9.8 CRITICAL
The Free Booking Plugin for Hotels, Restaurant and Car Rental WordPress plugin before 1.1.16 suffers from insufficient input validation which leads to arbitrary file upload and subsequently to remote code execution. An AJAX action accessible to unauthenticated users is affected by this issue. An allowlist of valid file extensions is defined but is not used during the validation steps.
CVE-2021-29281 1 Gfi 1 Archiver 2022-07-15 7.5 HIGH 9.8 CRITICAL
File upload vulnerability in GFI Mail Archiver versions up to and including 15.1 via insecure implementation of Telerik Web UI plugin which is affected by CVE-2014-2217, and CVE-2017-11317.
CVE-2015-1785 1 Imagely 1 Nextgen Gallery 2022-07-14 4.3 MEDIUM 6.5 MEDIUM
In nextgen-galery wordpress plugin before 2.0.77.3 there are two vulnerabilities which can allow an attacker to gain full access over the web application. The vulnerabilities lie in how the application validates user uploaded files and lack of security measures preventing unwanted HTTP requests.
CVE-2015-1784 1 Imagely 1 Nextgen Gallery 2022-07-14 6.5 MEDIUM 8.8 HIGH
In nextgen-galery wordpress plugin before 2.0.77.3 there are two vulnerabilities which can allow an attacker to gain full access over the web application. The vulnerabilities lie in how the application validates user uploaded files and lack of security measures preventing unwanted HTTP requests.
CVE-2022-32413 1 Dice Project 1 Dice 2022-07-13 7.5 HIGH 9.8 CRITICAL
An arbitrary file upload vulnerability in Dice v4.2.0 allows attackers to execute arbitrary code via a crafted file.
CVE-2021-37741 1 Zohocorp 1 Manageengine Admanager Plus 2022-07-12 6.5 MEDIUM 8.8 HIGH
ManageEngine ADManager Plus before 7111 has Pre-authentication RCE vulnerabilities.
CVE-2020-24203 1 Projectworlds 1 Travel Management System 2022-07-12 7.5 HIGH 9.8 CRITICAL
Insecure File Permissions and Arbitrary File Upload in the upload pic function in updatesubcategory.php in Projects World Travel Management System v1.0 allows remote unauthenticated attackers to gain remote code execution.
CVE-2021-21131 2 Google, Microsoft 2 Chrome, Edge Chromium 2022-07-12 4.3 MEDIUM 6.5 MEDIUM
Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
CVE-2021-44664 1 Xerte 1 Xerte 2022-07-12 6.5 MEDIUM 8.8 HIGH
An Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable.
CVE-2022-31943 1 Mingsoft 1 Mcms 2022-07-11 7.5 HIGH 9.8 CRITICAL
MCMS v5.2.8 was discovered to contain an arbitrary file upload vulnerability.
CVE-2021-37770 1 Nucleuscms 1 Nucleus Cms 2022-07-09 6.5 MEDIUM 7.2 HIGH
Nucleus CMS v3.71 is affected by a file upload vulnerability. In this vulnerability, we can use upload to change the upload path to the path without the Htaccess file. Upload an Htaccess file and write it to AddType application / x-httpd-php.jpg. In this way, an attacker can upload a picture with shell, treat it as PHP, execute commands, so as to take down website resources.
CVE-2013-1916 1 User Photo Project 1 User Photo 2022-07-07 8.5 HIGH 8.8 HIGH
In WordPress Plugin User Photo 0.9.4, when a photo is uploaded, it is only partially validated and it is possible to upload a backdoor on the server hosting WordPress. This backdoor can be called (executed) even if the photo has not been yet approved.
CVE-2022-2212 1 Library Management System Project 1 Library Management System 2022-07-07 6.5 MEDIUM 8.8 HIGH
A vulnerability was found in SourceCodester Library Management System 1.0. It has been classified as critical. Affected is an unknown function of the component /card/index.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.