Vulnerabilities (CVE)

Filtered by CWE-434
Total 2765 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-24145 1 Webnus 1 Modern Events Calendar Lite 2021-12-03 6.5 MEDIUM 7.2 HIGH
Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly check the imported file, allowing PHP ones to be uploaded by administrator by using the 'text/csv' content-type in the request.
CVE-2020-28328 1 Salesagility 1 Suitecrm 2021-12-02 9.0 HIGH 8.8 HIGH
SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled .php file under the web root.
CVE-2021-24311 1 External Media Project 1 External Media 2021-12-02 6.5 MEDIUM 8.8 HIGH
The wp_ajax_upload-remote-file AJAX action of the External Media WordPress plugin before 1.0.34 was vulnerable to arbitrary file uploads via any authenticated users.
CVE-2021-42840 1 Salesagility 1 Suitecrm 2021-11-30 9.0 HIGH 8.8 HIGH
SuiteCRM before 7.11.19 allows remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled PHP file under the web root, because only the all-lowercase PHP file extensions were blocked. NOTE: this issue exists because of an incomplete fix for CVE-2020-28328.
CVE-2021-42669 1 Engineers Online Portal Project 1 Engineers Online Portal 2021-11-29 10.0 HIGH 9.8 CRITICAL
A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing "<?php system($_GET["cmd"]); ?>" the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id.
CVE-2021-44094 1 Zrlog 1 Zrlog 2021-11-29 6.8 MEDIUM 7.8 HIGH
ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function, it could execute any JAR file
CVE-2021-44093 1 Zrlog 1 Zrlog 2021-11-29 7.5 HIGH 9.8 CRITICAL
A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
CVE-2021-41675 1 E-negosyo System Project 1 E-negosyo System 2021-11-28 6.5 MEDIUM 7.2 HIGH
A Remote Code Execution (RCE) vulnerabilty exists in Sourcecodester E-Negosyo System 1.0 in /admin/produts/controller.php via the doInsert function, which validates images with getImageSizei. .
CVE-2021-40524 1 Pureftpd 1 Pure-ftpd 2021-11-26 5.0 MEDIUM 7.5 HIGH
In Pure-FTPd before 1.0.50, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size, which may lead to denial of service or a server hang. This occurs because a certain greater-than-zero test does not anticipate an initial -1 value. (Versions 1.0.23 through 1.0.49 are affected.)
CVE-2021-43617 1 Laravel 1 Framework 2021-11-18 7.5 HIGH 9.8 CRITICAL
Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. NOTE: this CVE Record is for Laravel Framework, and is unrelated to any reports concerning incorrectly written user applications for image upload.
CVE-2021-3915 1 Bookstackapp 1 Bookstack 2021-11-17 3.5 LOW 5.7 MEDIUM
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
CVE-2021-42839 1 Vice 1 Webopac 2021-11-16 9.0 HIGH 8.8 HIGH
Grand Vice info Co. webopac7 file upload function fails to filter special characters. While logging in with general user’s permission, remote attackers can upload malicious script and execute arbitrary code to control the system or interrupt services.
CVE-2021-41833 1 Zohocorp 1 Manageengine Patch Connect Plus 2021-11-15 7.5 HIGH 9.8 CRITICAL
Zoho ManageEngine Patch Connect Plus before 90099 is vulnerable to unauthenticated remote code execution.
CVE-2020-23572 1 Beescms 1 Beescms 2021-11-13 6.8 MEDIUM 8.8 HIGH
BEESCMS v4.0 was discovered to contain an arbitrary file upload vulnerability via the component /admin/upload.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.
CVE-2021-34685 1 Hitachi 1 Vantara Pentaho 2021-11-09 6.5 MEDIUM 7.2 HIGH
UploadService in Hitachi Vantara Pentaho Business Analytics through 9.1 does not properly verify uploaded user files, which allows an authenticated user to upload various files of different file types. Specifically, a .jsp file is not allowed, but a .jsp. file is allowed (and leads to remote code execution).
CVE-2021-31599 1 Hitachi 2 Vantara Pentaho, Vantara Pentaho Business Intelligence Server 2021-11-09 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. A reports (.prpt) file allows the inclusion of BeanShell scripts to ease the production of complex reports. An authenticated user can run arbitrary code.
CVE-2021-28023 1 Servicetonic 1 Servicetonic 2021-11-09 7.5 HIGH 9.8 CRITICAL
Arbitrary file upload in Service import feature in ServiceTonic Helpdesk software version < 9.0.35937 allows a malicious user to execute JSP code by uploading a zip that extracts files in relative paths.
CVE-2021-36623 1 Phone Shop Sales Management System Project 1 Phone Shop Sales Management System 2021-11-06 7.5 HIGH 9.8 CRITICAL
Arbitrary File Upload in Sourcecodester Phone Shop Sales Management System 1.0 enables RCE.
CVE-2020-18261 1 Ed01-cms Project 1 Ed01-cms 2021-11-05 7.5 HIGH 9.8 CRITICAL
An arbitrary file upload vulnerability in the image upload function of ED01-CMS v1.0 allows attackers to execute arbitrary commands.
CVE-2018-25019 1 Learndash 1 Learndash 2021-11-03 5.0 MEDIUM 7.5 HIGH
The LearnDash LMS WordPress plugin before 2.5.4 does not have any authorisation and validation of the file to be uploaded in the learndash_assignment_process_init() function, which could allow unauthenticated users to upload arbitrary files to the web server