Total
2964 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-19020 | 1 Titanhq | 1 Webtitan | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
An issue was discovered in TitanHQ WebTitan before 5.18. In the administration web interface it is possible to upload a crafted backup file that enables an attacker to execute arbitrary code by overwriting existing files or adding new PHP files under the web root. This requires the attacker to have access to a valid web interface account. | |||||
CVE-2019-18952 | 1 Sibsoft | 1 Xfilesharing | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
SibSoft Xfilesharing through 2.5.1 allows cgi-bin/up.cgi arbitrary file upload. This can be combined with CVE-2019-18951 to achieve remote code execution via a .html file, containing short codes, that is served over HTTP. | |||||
CVE-2019-18643 | 1 Sparkdevnetwork | 1 Rock Rms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Rock RMS versions before 8.10 and versions 9.0 through 9.3 fails to properly validate files uploaded in the application. The only protection mechanism is a file-extension blacklist that can be bypassed by adding multiple spaces and periods after the file name. This could allow an attacker to upload ASPX code and gain remote code execution on the application. The application typically runs as LocalSystem as mandated in the installation guide. Patched in versions 8.10 and 9.4. | |||||
CVE-2019-18417 | 1 Sourcecodester | 1 Restaurant Management System | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Sourcecodester Restaurant Management System 1.0 allows an authenticated attacker to upload arbitrary files that can result in code execution. The issue occurs because the application fails to adequately sanitize user-supplied input, e.g., "add a new food" allows .php files. | |||||
CVE-2019-18320 | 1 Siemens | 1 Sppa-t3000 Application Server | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could be able to upload arbitrary files without authentication. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | |||||
CVE-2019-18313 | 1 Siemens | 1 Sppa-t3000 Ms3000 Migration Server | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could gain remote code execution by sending specifically crafted objects to one of the RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | |||||
CVE-2019-18288 | 1 Siemens | 1 Sppa-t3000 Application Server | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with valid authentication at the RMI interface could be able to gain remote code execution through an unsecured file upload. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | |||||
CVE-2019-18204 | 1 Zucchetti | 1 Infobusiness | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Zucchetti InfoBusiness before and including 4.4.1 allows any authenticated user to upload .php files in order to achieve code execution. | |||||
CVE-2019-18188 | 2 Microsoft, Trendmicro | 2 Windows, Apex One | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication. | |||||
CVE-2019-17536 | 1 Gilacms | 1 Gila Cms | 2024-11-21 | 4.0 MEDIUM | 4.9 MEDIUM |
Gila CMS through 1.11.4 allows Unrestricted Upload of a File with a Dangerous Type via the moveAction function in core/controllers/fm.php. The attacker needs to use admin/media_upload and fm/move. | |||||
CVE-2019-17490 | 1 Jnoj | 1 Jiangnan Online Judge | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
app\modules\polygon\controllers\ProblemController in Jiangnan Online Judge (aka jnoj) 0.8.0 allows arbitrary file upload, as demonstrated by PHP code (with a .php filename but the image/png content type) to the web/polygon/problem/tests URI. | |||||
CVE-2019-17403 | 1 Nokia | 1 Impact | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Nokia IMPACT < 18A: An unrestricted File Upload vulnerability was found that may lead to Remote Code Execution. | |||||
CVE-2019-17352 | 1 Jfinal | 1 Jfinal | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions. | |||||
CVE-2019-17325 | 1 Clipsoft | 1 Rexpert | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
ClipSoft REXPERT 1.0.0.527 and earlier version allows remote attacker to upload arbitrary local file via the ActiveX method in RexViewerCtrl30.ocx. That could lead to disclosure of sensitive information. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page. | |||||
CVE-2019-17188 | 1 Fecmall | 1 Fecmall | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
An unrestricted file upload vulnerability was discovered in catalog/productinfo/imageupload in Fecshop FecMall 2.3.4. An attacker can bypass a front-end restriction and upload PHP code to the webserver, by providing image data and the image/jpeg content type, with a .php extension. This occurs because the code relies on the getimagesize function. | |||||
CVE-2019-17058 | 1 Footy | 1 Tipping Software | 2024-11-21 | 6.5 MEDIUM | 9.1 CRITICAL |
Footy Tipping Software AFL Web Edition 2019 allows arbitrary file upload and resultant remote code execution because a whitelist can be bypassed by an Administrator who uploads a crafted upload.dat file. | |||||
CVE-2019-17046 | 1 Ilch | 1 Ilch Cms | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
Ilch 2.1.22 allows remote code execution because php is listed under "Allowed files" on the index.php/admin/media/settings/index page. | |||||
CVE-2019-16790 | 1 Tiny File Manager Project | 1 Tiny File Manager | 2024-11-21 | 6.5 MEDIUM | 6.5 MEDIUM |
In Tiny File Manager before 2.3.9, there is a remote code execution via Upload from URL and Edit/Rename files. Only authenticated users are impacted. | |||||
CVE-2019-16720 | 1 Zzzcms | 1 Zzzphp | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
ZZZCMS zzzphp v1.7.2 does not properly restrict file upload in plugins/ueditor/php/controller.php?upfolder=news&action=catchimage, as demonstrated by uploading a .htaccess or .php5 file. | |||||
CVE-2019-16700 | 1 Slub-dresden | 1 Slub Events | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The slub_events (aka SLUB: Event Registration) extension through 3.0.2 for TYPO3 allows uploading of arbitrary files to the webserver. For versions 1.2.2 and below, this results in Remote Code Execution. In versions later than 1.2.2, this can result in Denial of Service, since the web space can be filled up with arbitrary files. |