Vulnerabilities (CVE)

Filtered by CWE-434
Total 1113 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-14451 1 Repetier-server 1 Repetier-server 2024-11-21 10.0 HIGH 9.8 CRITICAL
RepetierServer.exe in Repetier-Server 0.8 through 0.91 does not properly validate the XML data structure provided when uploading a new printer configuration. When this is combined with CVE-2019-14450, an attacker can upload an "external command" configuration as a printer configuration, and achieve remote code execution. After exploitation, loading of the external command configuration is dependent on a system reboot or service restart.
CVE-2019-13976 1 Egain 1 Chat 2024-11-21 7.5 HIGH 9.8 CRITICAL
eGain Chat 15.0.3 allows unrestricted file upload.
CVE-2019-13973 1 Layerbb 1 Layerbb 2024-11-21 7.5 HIGH 9.8 CRITICAL
LayerBB 1.1.3 allows admin/general.php arbitrary file upload because the custom_logo filename suffix is not restricted, and .php may be used.
CVE-2019-13294 1 Arox 1 School-erp 2024-11-21 10.0 HIGH 9.8 CRITICAL
AROX School-ERP Pro has a command execution vulnerability. import_stud.php and upload_fille.php do not have session control. Therefore an unauthenticated user can execute a command on the system.
CVE-2019-13187 1 Symphonyextensions 1 Rich Text Formatter 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Rich Text Formatter (Redactor) extension through v1.1.1 for Symphony CMS has an Unauthenticated arbitrary file upload vulnerability in content.fileupload.php and content.imageupload.php.
CVE-2019-13082 1 Chamilo 1 Chamilo Lms 2024-11-21 7.5 HIGH 9.8 CRITICAL
Chamilo LMS 1.11.8 and 2.x allows remote code execution through an lp_upload.php unauthenticated file upload feature. It extracts a ZIP archive before checking its content, and once it has been extracted, does not check files in a recursive way. This means that by putting a .php file in a folder and then this folder in a ZIP archive, the server will accept this file without any checks. Because one can access this file from the website, it is remote code execution. This is related to a scorm imsmanifest.xml file, the import_package function, and extraction in $courseSysDir.$newDir.
CVE-2019-12971 1 G-u 2 Bks Ebk Ethernet-buskoppler Pro, Bks Ebk Ethernet-buskoppler Pro Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
BKS EBK Ethernet-Buskoppler Pro before 3.01 allows Unrestricted Upload of a File with a Dangerous Type.
CVE-2019-12803 1 Hunesion 1 I-onenet 2024-11-21 10.0 HIGH 9.8 CRITICAL
In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, the specific upload web module doesn't verify the file extension and type, and an attacker can upload a webshell. After the webshell upload, an attacker can use the webshell to perform remote code exection such as running a system command.
CVE-2019-12719 1 Auo 1 Sunveillance Monitoring System \& Data Recorder 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Picture_Manage_mvc.aspx in AUO SunVeillance Monitoring System before v1.1.9e. There is an incorrect access control vulnerability that can allow an unauthenticated user to upload files via a modified authority parameter.
CVE-2019-12409 2 Apache, Linux 2 Solr, Linux Kernel 2024-11-21 7.5 HIGH 9.8 CRITICAL
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.
CVE-2019-12377 1 Ivanti 1 Landesk Management Suite 2024-11-21 7.5 HIGH 9.8 CRITICAL
A vulnerable upl/async_upload.asp web API endpoint in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 allows arbitrary file upload, which may lead to arbitrary remote code execution.
CVE-2019-12271 1 Sandline 1 Centraleyezer 2024-11-21 7.5 HIGH 9.8 CRITICAL
Sandline Centraleyezer (On Premises) allows unrestricted File Upload with a dangerous type, because the feature of adding ".jpg" to any uploaded filename is not enforced on the server side.
CVE-2019-12150 1 Karamasoft 1 Ultimateeditor 2024-11-21 7.5 HIGH 9.8 CRITICAL
Karamasoft UltimateEditor 1 does not ensure that an uploaded file is an image or document (neither file types nor extensions are restricted). The attacker must use the Attach icon to perform an upload. An uploaded file is accessible under the UltimateEditorInclude/UserFiles/ URI.
CVE-2019-11887 1 Simplybook 1 Simplybook 2024-11-21 7.5 HIGH 9.8 CRITICAL
SimplyBook.me through 2019-05-11 does not properly restrict File Upload which could allow remote code execution.
CVE-2019-11344 1 Pluck-cms 1 Pluck 2024-11-21 7.5 HIGH 9.8 CRITICAL
data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked.
CVE-2019-11223 1 Supportcandy 1 Supportcandy 2024-11-21 7.5 HIGH 9.8 CRITICAL
An Unrestricted File Upload Vulnerability in the SupportCandy plugin through 2.0.0 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension.
CVE-2019-11185 1 3cx 1 Live Chat 2024-11-21 7.5 HIGH 9.8 CRITICAL
The WP Live Chat Support Pro plugin through 8.0.26 for WordPress contains an arbitrary file upload vulnerability. This results from an incomplete patch for CVE-2018-12426. Arbitrary file upload is achieved by using a non-blacklisted executable file extension in conjunction with a whitelisted file extension, and prepending "magic bytes" to the payload to pass MIME checks. Specifically, an unauthenticated remote user submits a crafted file upload POST request to the REST api remote_upload endpoint. The file contains data that will fool the plugin's MIME check into classifying it as an image (which is a whitelisted file extension) and finally a trailing .phtml file extension.
CVE-2019-11031 1 Mirasys 1 Mirasys Vms 2024-11-21 10.0 HIGH 9.8 CRITICAL
Mirasys VMS before V7.6.1 and 8.x before V8.3.2 mishandles the auto-update feature of IDVRUpdateService2 in DVRServer.exe. An attacker can upload files with a Setup-Files action, and then execute these files with SYSTEM privileges.
CVE-2019-10959 1 Bd 10 Alaris Cc Syringe Pump, Alaris Cc Syringe Pump Firmware, Alaris Gateway Workstation and 7 more 2024-11-21 7.5 HIGH 10.0 CRITICAL
BD Alaris Gateway Workstation Versions, 1.1.3 Build 10, 1.1.3 MR Build 11, 1.2 Build 15, 1.3.0 Build 14, 1.3.1 Build 13, This does not impact the latest firmware Versions 1.3.2 and 1.6.1, Additionally, the following products using software Version 2.3.6 and below, Alaris GS, Alaris GH, Alaris CC, Alaris TIVA, The application does not restrict the upload of malicious files during a firmware update.
CVE-2019-10647 1 Zzzcms 1 Zzzphp 2024-11-21 7.5 HIGH 9.8 CRITICAL
ZZZCMS zzzphp v1.6.3 allows remote attackers to execute arbitrary PHP code via a .php URL in the plugins/ueditor/php/controller.php?action=catchimage source[] parameter because of a lack of inc/zzz_file.php restrictions. For example, source%5B%5D=http%3A%2F%2F192.168.0.1%2Ftest.php can be used if the 192.168.0.1 web server sends the contents of a .php file (i.e., it does not interpret a .php file).