Vulnerabilities (CVE)

Filtered by CWE-434
Total 2367 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-3684 1 Imagely 1 Nextgen Gallery 2020-02-13 10.0 HIGH 9.8 CRITICAL
NextGEN Gallery plugin before 1.9.13 for WordPress: ngggallery.php file upload
CVE-2014-8739 2 Creative-solutions, Jquery File Upload Project 2 Creative Contact Form, Jquery File Upload 2020-02-12 7.5 HIGH 9.8 CRITICAL
Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.
CVE-2013-3591 1 Vtiger 1 Vtiger Crm 2020-02-11 6.5 MEDIUM 8.8 HIGH
vTiger CRM 5.3 and 5.4: 'files' Upload Folder Arbitrary PHP Code Execution Vulnerability
CVE-2011-1597 1 Openvas 1 Openvas Manager 2020-02-10 6.5 MEDIUM 8.8 HIGH
OpenVAS Manager v2.0.3 allows plugin remote code execution.
CVE-2015-6000 1 Vtiger 1 Vtiger Crm 2020-02-10 6.5 MEDIUM 8.8 HIGH
Unrestricted file upload vulnerability in the Settings_Vtiger_CompanyDetailsSave_Action class in modules/Settings/Vtiger/actions/CompanyDetailsSave.php in Vtiger CRM 6.3.0 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in test/logo/.
CVE-2020-6754 1 Dotcms 1 Dotcms 2020-02-07 7.5 HIGH 9.8 CRITICAL
dotCMS before 5.2.4 is vulnerable to directory traversal, leading to incorrect access control. It allows an attacker to read or execute files under $TOMCAT_HOME/webapps/ROOT/assets (which should be a protected directory). Additionally, attackers can upload temporary files (e.g., .jsp files) into /webapps/ROOT/assets/tmp_upload, which can lead to remote command execution (with the permissions of the user running the dotCMS application).
CVE-2013-6358 1 Prestashop 1 Prestashop 2020-02-06 9.0 HIGH 8.8 HIGH
PrestaShop 1.5.5 allows remote authenticated attackers to execute arbitrary code by uploading a crafted profile and then accessing it in the module/ directory.
CVE-2020-8440 1 Simplejobscript 1 Simplejobscript 2020-02-05 7.5 HIGH 9.8 CRITICAL
controllers/page_apply.php in Simplejobscript.com SJS through 1.66 is prone to unauthenticated Remote Code Execution by uploading a PHP script as a resume.
CVE-2013-2748 1 Belkin 2 Wemo Switch, Wemo Switch Firmware 2020-02-05 7.5 HIGH 9.8 CRITICAL
Belkin Wemo Switch before WeMo_US_2.00.2176.PVT could allow remote attackers to upload arbitrary files onto the system.
CVE-2013-7390 1 Zohocorp 1 Manageengine Desktop Central 2020-02-05 7.5 HIGH 9.8 CRITICAL
Unrestricted file upload vulnerability in AgentLogUploadServlet in ManageEngine DesktopCentral 7.x and 8.0.0 before build 80293 allows remote attackers to execute arbitrary code by uploading a file with a jsp extension, then accessing it via a direct request to the file in the webroot.
CVE-2020-7998 1 Super File Explorer Project 1 Super File Explorer 2020-02-04 9.0 HIGH 8.8 HIGH
An arbitrary file upload vulnerability has been discovered in the Super File Explorer app 1.0.1 for iOS. The vulnerability is located in the developer path that is accessible and hidden next to the root path. By default, there is no password set for the FTP or Web UI service.
CVE-2012-6649 1 Devfarm 1 Wp Gpx Maps 2020-01-29 7.5 HIGH 9.8 CRITICAL
WordPress WP GPX Maps Plugin 1.1.21 allows remote attackers to execute arbitrary PHP code via improper file upload.
CVE-2012-5190 1 Accusoft 1 Prizm Content Connect 2020-01-29 7.5 HIGH 9.8 CRITICAL
Prizm Content Connect 5.1 has an Arbitrary File Upload Vulnerability
CVE-2019-20385 1 Logaritmo 1 Aware Callmanager 2020-01-29 6.5 MEDIUM 8.8 HIGH
The CSV upload feature in /supervisor/procesa_carga.php on Logaritmo Aware CallManager 2012 devices allows upload of .php files with a text/* content type. The PHP code can then be executed by visiting a /supervisor/csv/ URI.
CVE-2019-16514 1 Connectwise 1 Control 2020-01-28 6.5 MEDIUM 7.2 HIGH
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. The server allows remote code execution. Administrative users could upload an unsigned extension ZIP file containing executable code that is subsequently executed by the server.
CVE-2011-4907 1 Joomla 1 Joomla\! 2020-01-22 5.0 MEDIUM 5.3 MEDIUM
Joomla! 1.5x through 1.5.12: Missing JEXEC Check
CVE-2012-2950 2 Gatewaygeomatics, Microsoft 2 Mapserver, Windows 2020-01-22 9.3 HIGH 8.1 HIGH
Gateway Geomatics MapServer for Windows before 3.0.6 contains a Local File Include Vulnerability which allows remote attackers to execute local PHP code and obtain sensitive information.
CVE-2011-2933 1 Websitebaker 1 Websitebaker 2020-01-21 6.5 MEDIUM 7.2 HIGH
An Arbitrary File Upload vulnerability exists in admin/media/upload.php in WebsiteBaker 2.8.1 and earlier due to a failure to restrict uploaded files with .htaccess, .php4, .php5, and .phtl extensions.
CVE-2020-5846 1 Ahsay 1 Cloud Backup Suite 2020-01-17 4.0 MEDIUM 8.8 HIGH
An insecure file upload and code execution issue was discovered in Ahsay Cloud Backup Suite 8.3.0.30 via a "PUT /obs/obm7/file/upload" request with the base64-encoded pathname in the X-RSW-custom-encode-path HTTP header, and the content in the HTTP request body. It is possible to upload a file into any directory of the server. One can insert a JSP shell into the web server's directory and execute it. This leads to full system access as the configured user (e.g., Administrator) when starting from any authenticated session (e.g., a trial account). This is fixed in the 83/830122/cbs-*-hotfix-task26000 builds.
CVE-2015-4553 1 Dedecms 1 Dedecms 2020-01-15 6.5 MEDIUM 8.8 HIGH
A file upload issue exists in DeDeCMS before 5.7-sp1, which allows malicious users getshell.