Total
1113 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-10276 | 1 Cobub | 1 Razor | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Western Bridge Cobub Razor 0.8.0 has a file upload vulnerability via the web/assets/swf/uploadify.php URI, as demonstrated by a .php file with the image/jpeg content type. | |||||
CVE-2019-1010062 | 1 Pluck-cms | 1 Pluckcms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d4a912397cf8. | |||||
CVE-2019-0259 | 1 Sap | 1 Businessobjects | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
SAP BusinessObjects, versions 4.2 and 4.3, (Visual Difference) allows an attacker to upload any file (including script files) without proper file format validation. | |||||
CVE-2018-9209 | 1 Fineuploader | 1 Php-traditional-server | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Unauthenticated arbitrary file upload vulnerability in FineUploader php-traditional-server <= v1.2.2 | |||||
CVE-2018-9208 | 1 Tuyoshi | 1 Jquery Picture Cut | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Unauthenticated arbitrary file upload vulnerability in jQuery Picture Cut <= v1.1Beta | |||||
CVE-2018-9207 | 1 Hayageek | 1 Jquery Upload File | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Arbitrary file upload in jQuery Upload File <= 4.0.2 | |||||
CVE-2018-9206 | 1 Jquery File Upload Project | 1 Jquery File Upload | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0 | |||||
CVE-2018-8944 | 1 Phpok | 1 Phpok | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
PHPOK 4.8.338 has an arbitrary file upload vulnerability. | |||||
CVE-2018-8766 | 1 Joyplus-cms Project | 1 Joyplus-cms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
joyplus-cms 1.6.0 allows Remote Code Execution because of an Arbitrary File Upload issue in manager/editor/upload.php, related to manager/admin_vod.php?action=add. | |||||
CVE-2018-7836 | 1 Schneider-electric | 1 Iiot Monitor | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An unrestricted Upload of File with Dangerous Type vulnerability exists on numerous methods of the IIoT Monitor 3.1.38 software that could allow upload and execution of malicious files. | |||||
CVE-2018-7665 | 1 Clip-bucket | 1 Clipbucket | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered in ClipBucket before 4.0.0 Release 4902. A malicious file can be uploaded via the name parameter to actions/beats_uploader.php or actions/photo_uploader.php, or the coverPhoto parameter to edit_account.php. | |||||
CVE-2018-7505 | 1 Advantech | 4 Webaccess, Webaccess\/nms, Webaccess Dashboard and 1 more | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a TFTP application has unrestricted file uploads to the web application without authorization, which may allow an attacker to execute arbitrary code. | |||||
CVE-2018-7316 | 1 Christianwebministries | 1 Proclaim | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Arbitrary File Upload exists in the Proclaim 9.1.1 component for Joomla! via a mediafileform action. | |||||
CVE-2018-6580 | 1 Janguo | 1 Jimtawl | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Arbitrary file upload exists in the Jimtawl 2.1.6 and 2.2.5 component for Joomla! via a view=upload&task=upload&pop=true&tmpl=component request. | |||||
CVE-2018-6411 | 1 Appnitro | 1 Machform | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection. | |||||
CVE-2018-6152 | 3 Debian, Google, Redhat | 5 Debian Linux, Chrome, Enterprise Linux Desktop and 2 more | 2024-11-21 | 6.8 MEDIUM | 9.6 CRITICAL |
The implementation of the Page.downloadBehavior backend unconditionally marked downloaded files as safe, regardless of file type in Google Chrome prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page and user interaction. | |||||
CVE-2018-5997 | 1 Ravpower | 1 Filehub Firmware | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered in the HTTP Server in RAVPower Filehub 2.000.056. Due to an unrestricted upload feature and a path traversal vulnerability, it is possible to upload a file on a filesystem with root privileges: this will lead to remote code execution as root. | |||||
CVE-2018-5749 | 2 Minecraft Servers List Lite Project, Premium Minecraft Servers List Project | 2 Minecraft Servers List Lite, Premium Minecraft Servers List | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
install.php in Minecraft Servers List Lite before commit c1cd164 and Premium Minecraft Servers List before 2.0.4 does not sanitize input before saving database connection information in connect.php, which might allow remote attackers to execute arbitrary PHP code via the (1) database_server, (2) database_user, (3) database_password, or (4) database_name parameter. | |||||
CVE-2018-5724 | 1 Barni | 2 Master Ip Camera01, Master Ip Camera01 Firmware | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
MASTER IPCAMERA01 3.3.4.2103 devices allow Unauthenticated Configuration Download and Upload, as demonstrated by restore.cgi. | |||||
CVE-2018-5204 | 1 Infraware-global | 1 Ml Report | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
ML Report version Between 2.00.000.0000 and 2.18.628.5980 contains a vulnerability that could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. this can be leveraged for code execution. |