Vulnerabilities (CVE)

Filtered by CWE-434
Total 2231 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-15962 1 Istock Management System Project 1 Istock Management System 2023-12-10 7.5 HIGH 9.8 CRITICAL
iStock Management System 1.0 allows Arbitrary File Upload via user/profile.
CVE-2017-2737 1 Huawei 2 Vcm5010, Vcm5010 Firmware 2023-12-10 6.5 MEDIUM 8.8 HIGH
VCM5010 with software versions earlier before V100R002C50SPC100 has an arbitrary file upload vulnerability. The software does not validate the files that uploaded. An authenticated attacker could upload arbitrary files to the system.
CVE-2017-14958 1 Pivotx 1 Pivotx 2023-12-10 6.5 MEDIUM 7.2 HIGH
lib.php in PivotX 2.3.11 does not properly block uploads of dangerous file types by admin users, which allows remote PHP code execution via an upload of a .php file.
CVE-2017-1000119 1 Octobercms 1 October 2023-12-10 6.5 MEDIUM 7.2 HIGH
October CMS build 412 is vulnerable to PHP code execution in the file upload functionality resulting in site compromise and possibly other applications on the server.
CVE-2017-1000194 1 Octobercms 1 October 2023-12-10 7.5 HIGH 9.8 CRITICAL
October CMS build 412 is vulnerable to Apache configuration modification via file upload functionality resulting in site compromise and possibly other applications on the server.
CVE-2017-14050 1 Blackcat-cms 1 Blackcat Cms 2023-12-10 6.5 MEDIUM 8.8 HIGH
In BlackCat CMS 1.2, backend/addons/install.php allows remote authenticated users to execute arbitrary PHP code via a ZIP archive that contains a .php file.
CVE-2015-4462 1 Efrontlearning 1 Efront 2023-12-10 4.0 MEDIUM 6.5 MEDIUM
Absolute path traversal vulnerability in the file_manager component of eFront CMS before 3.6.15.5 allows remote authenticated users to read arbitrary files via a full pathname in the "Upload file from url" field in the file manager for professor.php.
CVE-2017-15580 1 Osticket 1 Osticket 2023-12-10 7.5 HIGH 9.8 CRITICAL
osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content.
CVE-2017-14840 1 Teamworktec 1 Ticketplus 2023-12-10 6.5 MEDIUM 8.8 HIGH
TeamWork TicketPlus allows Arbitrary File Upload in updateProfile.
CVE-2017-14079 1 Trendmicro 1 Mobile Security 2023-12-10 6.5 MEDIUM 8.8 HIGH
Unrestricted file uploads in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allow remote attackers to execute arbitrary code on vulnerable installations.
CVE-2016-0354 1 Ibm 1 Sametime 2023-12-10 6.0 MEDIUM 5.5 MEDIUM
IBM Sametime Enterprise Meeting Server 8.5.2 and 9.0 could allow an authenticated user to upload a malicious file to a Sametime meeting room, that could be downloaded by unsuspecting users which could be executed with user privileges. IBM X-Force ID: 111893.
CVE-2015-9228 1 Imagely 1 Nextgen Gallery 2023-12-10 9.0 HIGH 8.8 HIGH
In post-new.php in the Photocrati NextGEN Gallery plugin 2.1.10 for WordPress, unrestricted file upload is available via the name parameter, if a file extension is changed from .jpg to .php.
CVE-2017-9380 1 Open-emr 1 Openemr 2023-12-10 6.5 MEDIUM 8.8 HIGH
OpenEMR 5.0.0 and prior allows low-privilege users to upload files of dangerous types which can result in arbitrary code execution within the context of the vulnerable application.
CVE-2017-1000238 1 Invoiceplane 1 Invoiceplane 2023-12-10 6.5 MEDIUM 8.8 HIGH
InvoicePlane version 1.4.10 is vulnerable to a Arbitrary File Upload resulting in an authenticated user can upload a malicious file to the webserver. It is possible for an attacker to upload a script which is able to compromise the webserver.
CVE-2017-9650 2 Automatedlogic, Carrier 3 I-vu, Sitescan Web, Automatedlogic Webctrl 2023-12-10 4.6 MEDIUM 7.8 HIGH
An Unrestricted Upload of File with Dangerous Type issue was discovered in Automated Logic Corporation (ALC) ALC WebCTRL, i-Vu, SiteScan Web 6.5 and prior; ALC WebCTRL, SiteScan Web 6.1 and prior; ALC WebCTRL, i-Vu 6.0 and prior; ALC WebCTRL, i-Vu, SiteScan Web 5.5 and prior; and ALC WebCTRL, i-Vu, SiteScan Web 5.2 and prior. An authenticated attacker may be able to upload a malicious file allowing the execution of arbitrary code.
CVE-2015-7571 1 Yeager 1 Yeager Cms 2023-12-10 6.8 MEDIUM 7.8 HIGH
Unrestricted file upload vulnerability in Yeager CMS 1.2.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension.
CVE-2014-9619 1 Netsweeper 1 Netsweeper 2023-12-10 6.5 MEDIUM 7.2 HIGH
Unrestricted file upload vulnerability in webadmin/ajaxfilemanager/ajaxfilemanager.php in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote authenticated users with admin privileges on the Cloud Manager web console to execute arbitrary PHP code by uploading a file with a double extension, then accessing it via a direct request to the file in webadmin/deny/images/, as demonstrated by secuid0.php.gif.
CVE-2017-16949 1 Accesspressthemes 1 Anonymous Post Pro 2023-12-10 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the AccessKeys AccessPress Anonymous Post Pro plugin through 3.1.9 for WordPress. Improper input sanitization allows the attacker to override the settings for allowed file extensions and upload file size, related to inc/cores/file-uploader.php and file-uploader/file-uploader-class.php. This allows the attacker to upload anything they want to the server, as demonstrated by an action=ap_file_upload_action&allowedExtensions[]=php request to /wp-admin/admin-ajax.php that results in a .php file upload and resultant PHP code execution.
CVE-2017-1002002 1 Webapp-builder Project 1 Webapp-builder 2023-12-10 7.5 HIGH 9.8 CRITICAL
Vulnerability in wordpress plugin webapp-builder v2.0, The plugin includes unlicensed vulnerable CMS software from http://www.invedion.com/
CVE-2015-2780 1 Berta 1 Berta Cms 2023-12-10 7.5 HIGH 9.8 CRITICAL
Unrestricted file upload vulnerability in Berta CMS allows remote attackers to execute arbitrary code by uploading a crafted image file with an executable extension, then accessing it via a direct request to the file in an unspecified directory.