Vulnerabilities (CVE)

Filtered by CWE-434
Total 2765 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-25115 1 Home Owners Collection Management System Project 1 Home Owners Collection Management System 2022-03-14 6.8 MEDIUM 7.8 HIGH
A remote code execution (RCE) vulnerability in the Avatar parameter under /admin/?page=user/manage_user of Home Owners Collection Management System v1.0 allows attackers to execute arbitrary code via a crafted PNG file.
CVE-2021-24960 1 Iptanus 2 Wordpress File Upload, Wordpress File Upload Pro 2022-03-11 3.5 LOW 5.4 MEDIUM
The WordPress File Upload WordPress plugin before 4.16.3, wordpress-file-upload-pro WordPress plugin before 4.16.3 allows users with a role as low as Contributor to configure the upload form in a way that allows uploading of SVG files, which could be then be used for Cross-Site Scripting attacks
CVE-2021-24216 1 Servmask 1 One-stop Wp Migration 2022-03-11 6.5 MEDIUM 7.2 HIGH
The All-in-One WP Migration WordPress plugin before 7.41 does not validate uploaded files' extension, which allows administrators to upload PHP files on their site, even on multisite installations.
CVE-2022-25016 1 Home Owners Collection Management System Project 1 Home Owners Collection Management System 2022-03-09 7.5 HIGH 9.8 CRITICAL
Home Owners Collection Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /student_attendance/index.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-24254 1 Extensis 1 Portfolio 2022-03-09 6.5 MEDIUM 8.8 HIGH
An unrestricted file upload vulnerability in the Backup/Restore Archive component of Extensis Portfolio v4.0 allows remote attackers to execute arbitrary code via a crafted ZIP file.
CVE-2022-24253 1 Extensis 1 Portfolio 2022-03-09 6.5 MEDIUM 8.8 HIGH
Extensis Portfolio v4.0 was discovered to contain an authenticated unrestricted file upload vulnerability via the component AdminFileTransferServlet.
CVE-2022-24252 1 Extensis 1 Portfolio 2022-03-09 6.5 MEDIUM 8.8 HIGH
An unrestricted file upload vulnerability in the FileTransferServlet component of Extensis Portfolio v4.0 allows remote attackers to execute arbitrary code via a crafted file.
CVE-2022-24251 1 Extensis 1 Portfolio 2022-03-09 6.5 MEDIUM 8.8 HIGH
Extensis Portfolio v4.0 was discovered to contain an authenticated unrestricted file upload vulnerability via the Catalog Asset Upload function.
CVE-2022-23906 1 Cmsmadesimple 1 Cms Made Simple 2022-03-08 6.5 MEDIUM 7.2 HIGH
CMS Made Simple v2.2.15 was discovered to contain a Remote Command Execution (RCE) vulnerability via the upload avatar function. This vulnerability is exploited via a crafted image file.
CVE-2022-25411 1 Max-3000 1 Maxsite Cms 2022-03-08 7.5 HIGH 9.8 CRITICAL
A Remote Code Execution (RCE) vulnerability at /admin/options in Maxsite CMS v180 allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2019-18313 1 Siemens 1 Sppa-t3000 Ms3000 Migration Server 2022-03-04 7.5 HIGH 9.8 CRITICAL
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could gain remote code execution by sending specifically crafted objects to one of the RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
CVE-2019-18320 1 Siemens 1 Sppa-t3000 Application Server 2022-03-04 5.0 MEDIUM 7.5 HIGH
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could be able to upload arbitrary files without authentication. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
CVE-2022-25360 1 Watchguard 1 Fireware 2022-03-04 6.5 MEDIUM 8.8 HIGH
WatchGuard Firebox and XTM appliances allow an authenticated remote attacker with unprivileged credentials to upload files to arbitrary locations. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
CVE-2022-23043 1 Tribalsystems 1 Zenario 2022-03-03 6.5 MEDIUM 7.2 HIGH
Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
CVE-2022-23375 1 Wikidocs 1 Wikidocs 2022-03-01 6.5 MEDIUM 8.8 HIGH
WikiDocs version 0.1.18 has an authenticated remote code execution vulnerability. An attacker can upload a malicious file using the image upload form through index.php.
CVE-2022-0409 1 Showdoc 1 Showdoc 2022-03-01 6.8 MEDIUM 7.8 HIGH
Unrestricted Upload of File with Dangerous Type in Packagist showdoc/showdoc prior to 2.10.2.
CVE-2022-24553 1 Zfaka Project 1 Zfaka 2022-02-28 7.5 HIGH 9.8 CRITICAL
An issue was found in Zfaka <= 1.4.5. The verification of the background file upload function check is not strict, resulting in remote command execution.
CVE-2021-39352 1 Catchplugins 1 Catch Themes Demo Import 2022-02-28 6.5 MEDIUM 7.2 HIGH
The Catch Themes Demo Import WordPress plugin is vulnerable to arbitrary file uploads via the import functionality found in the ~/inc/CatchThemesDemoImport.php file, in versions up to and including 1.7, due to insufficient file type validation. This makes it possible for an attacker with administrative privileges to upload malicious files that can be used to achieve remote code execution.
CVE-2021-46036 1 Mingsoft 1 Mcms 2022-02-25 7.5 HIGH 9.8 CRITICAL
An arbitrary file upload vulnerability in the component /ms/file/uploadTemplate.do of MCMS v5.2.4 allows attackers to execute arbitrary code.
CVE-2022-24984 1 Jqueryform 1 Jqueryform 2022-02-25 6.8 MEDIUM 9.8 CRITICAL
Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occurs because file-extension checks occur on the client side, and because not all executable content (e.g., .phtml or .php.bak) is blocked.