Total
2765 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-12263 | 1 Portfoliocms Project | 1 Portfoliocms | 2020-02-20 | 6.5 MEDIUM | 8.8 HIGH |
portfolioCMS 1.0.5 allows upload of arbitrary .php files via the admin/portfolio.php?newpage=true URI. | |||||
CVE-2013-2057 | 1 Yabb | 1 Yabb | 2020-02-14 | 7.5 HIGH | 9.8 CRITICAL |
YaBB through 2.5.2: 'guestlanguage' Cookie Parameter Local File Include Vulnerability | |||||
CVE-2013-0803 | 1 Polarbear Cms Project | 1 Polarbear Cms | 2020-02-14 | 7.5 HIGH | 9.8 CRITICAL |
A PHP File Upload Vulnerability exists in PolarBear CMS 2.5 via upload.php, which could let a malicious user execute arbitrary code. | |||||
CVE-2014-2025 | 1 Unitedplanet | 1 Intrexx | 2020-02-13 | 7.5 HIGH | 9.8 CRITICAL |
Unrestricted file upload vulnerability in an unspecified third party tool in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via unknown vectors. | |||||
CVE-2013-3684 | 1 Imagely | 1 Nextgen Gallery | 2020-02-13 | 10.0 HIGH | 9.8 CRITICAL |
NextGEN Gallery plugin before 1.9.13 for WordPress: ngggallery.php file upload | |||||
CVE-2014-8739 | 2 Creative-solutions, Jquery File Upload Project | 2 Creative Contact Form, Jquery File Upload | 2020-02-12 | 7.5 HIGH | 9.8 CRITICAL |
Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014. | |||||
CVE-2013-3591 | 1 Vtiger | 1 Vtiger Crm | 2020-02-11 | 6.5 MEDIUM | 8.8 HIGH |
vTiger CRM 5.3 and 5.4: 'files' Upload Folder Arbitrary PHP Code Execution Vulnerability | |||||
CVE-2011-1597 | 1 Openvas | 1 Openvas Manager | 2020-02-10 | 6.5 MEDIUM | 8.8 HIGH |
OpenVAS Manager v2.0.3 allows plugin remote code execution. | |||||
CVE-2015-6000 | 1 Vtiger | 1 Vtiger Crm | 2020-02-10 | 6.5 MEDIUM | 8.8 HIGH |
Unrestricted file upload vulnerability in the Settings_Vtiger_CompanyDetailsSave_Action class in modules/Settings/Vtiger/actions/CompanyDetailsSave.php in Vtiger CRM 6.3.0 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in test/logo/. | |||||
CVE-2020-6754 | 1 Dotcms | 1 Dotcms | 2020-02-07 | 7.5 HIGH | 9.8 CRITICAL |
dotCMS before 5.2.4 is vulnerable to directory traversal, leading to incorrect access control. It allows an attacker to read or execute files under $TOMCAT_HOME/webapps/ROOT/assets (which should be a protected directory). Additionally, attackers can upload temporary files (e.g., .jsp files) into /webapps/ROOT/assets/tmp_upload, which can lead to remote command execution (with the permissions of the user running the dotCMS application). | |||||
CVE-2013-6358 | 1 Prestashop | 1 Prestashop | 2020-02-06 | 9.0 HIGH | 8.8 HIGH |
PrestaShop 1.5.5 allows remote authenticated attackers to execute arbitrary code by uploading a crafted profile and then accessing it in the module/ directory. | |||||
CVE-2020-8440 | 1 Simplejobscript | 1 Simplejobscript | 2020-02-05 | 7.5 HIGH | 9.8 CRITICAL |
controllers/page_apply.php in Simplejobscript.com SJS through 1.66 is prone to unauthenticated Remote Code Execution by uploading a PHP script as a resume. | |||||
CVE-2013-2748 | 1 Belkin | 2 Wemo Switch, Wemo Switch Firmware | 2020-02-05 | 7.5 HIGH | 9.8 CRITICAL |
Belkin Wemo Switch before WeMo_US_2.00.2176.PVT could allow remote attackers to upload arbitrary files onto the system. | |||||
CVE-2013-7390 | 1 Zohocorp | 1 Manageengine Desktop Central | 2020-02-05 | 7.5 HIGH | 9.8 CRITICAL |
Unrestricted file upload vulnerability in AgentLogUploadServlet in ManageEngine DesktopCentral 7.x and 8.0.0 before build 80293 allows remote attackers to execute arbitrary code by uploading a file with a jsp extension, then accessing it via a direct request to the file in the webroot. | |||||
CVE-2020-7998 | 1 Super File Explorer Project | 1 Super File Explorer | 2020-02-04 | 9.0 HIGH | 8.8 HIGH |
An arbitrary file upload vulnerability has been discovered in the Super File Explorer app 1.0.1 for iOS. The vulnerability is located in the developer path that is accessible and hidden next to the root path. By default, there is no password set for the FTP or Web UI service. | |||||
CVE-2012-6649 | 1 Devfarm | 1 Wp Gpx Maps | 2020-01-29 | 7.5 HIGH | 9.8 CRITICAL |
WordPress WP GPX Maps Plugin 1.1.21 allows remote attackers to execute arbitrary PHP code via improper file upload. | |||||
CVE-2012-5190 | 1 Accusoft | 1 Prizm Content Connect | 2020-01-29 | 7.5 HIGH | 9.8 CRITICAL |
Prizm Content Connect 5.1 has an Arbitrary File Upload Vulnerability | |||||
CVE-2019-20385 | 1 Logaritmo | 1 Aware Callmanager | 2020-01-29 | 6.5 MEDIUM | 8.8 HIGH |
The CSV upload feature in /supervisor/procesa_carga.php on Logaritmo Aware CallManager 2012 devices allows upload of .php files with a text/* content type. The PHP code can then be executed by visiting a /supervisor/csv/ URI. | |||||
CVE-2019-16514 | 1 Connectwise | 1 Control | 2020-01-28 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. The server allows remote code execution. Administrative users could upload an unsigned extension ZIP file containing executable code that is subsequently executed by the server. | |||||
CVE-2011-4907 | 1 Joomla | 1 Joomla\! | 2020-01-22 | 5.0 MEDIUM | 5.3 MEDIUM |
Joomla! 1.5x through 1.5.12: Missing JEXEC Check |