Vulnerabilities (CVE)

Filtered by CWE-434
Total 3110 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-3846 1 Firefly-iii 1 Firefly Iii 2024-11-21 6.5 MEDIUM 8.8 HIGH
firefly-iii is vulnerable to Unrestricted Upload of File with Dangerous Type
CVE-2021-3832 1 Artica 1 Integria Ims 2024-11-21 7.5 HIGH 9.8 CRITICAL
Integria IMS in its 5.0.92 version is vulnerable to a Remote Code Execution attack through file uploading. An unauthenticated attacker could abuse the AsyncUpload() function in order to exploit the vulnerability.
CVE-2021-3745 1 Flatcore 1 Flatcore-cms 2024-11-21 6.0 MEDIUM 6.6 MEDIUM
flatcore-cms is vulnerable to Unrestricted Upload of File with Dangerous Type
CVE-2021-3378 1 Fortilogger 1 Fortilogger 2024-11-21 7.5 HIGH 9.8 CRITICAL
FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
CVE-2021-3277 1 Nagios 1 Nagios Xi 2024-11-21 6.5 MEDIUM 7.2 HIGH
Nagios XI 5.7.5 and earlier allows authenticated admins to upload arbitrary files due to improper validation of the rename functionality in custom-includes component, which leads to remote code execution by uploading php files.
CVE-2021-3166 1 Asus 2 Dsl-n14u B1, Dsl-n14u B1 Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real update, resulting in a persistent outage of those services.
CVE-2021-3164 1 Churchdesk 1 Churchrota 2024-11-21 6.5 MEDIUM 8.8 HIGH
ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file via a POST request to resources.php.
CVE-2021-3120 1 Yithemes 1 Yith Woocommerce Gift Cards 2024-11-21 10.0 HIGH 9.8 CRITICAL
An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premium plugin before 3.3.1 for WordPress allows remote attackers to achieve remote code execution on the operating system in the security context of the web server. In order to exploit this vulnerability, an attacker must be able to place a valid Gift Card product into the shopping cart. An uploaded file is placed at a predetermined path on the web server with a user-specified filename and extension. This occurs because the ywgc-upload-picture parameter can have a .php value even though the intention was to only allow uploads of Gift Card images.
CVE-2021-39608 1 Flatcore 1 Flatcore-cms 2024-11-21 9.0 HIGH 7.2 HIGH
Remote Code Execution (RCE) vulnerabilty exists in FlatCore-CMS 2.0.7 via the upload addon plugin, which could let a remote malicious user exeuct arbitrary php code.
CVE-2021-39384 1 Diaowen 1 Dwsurvey 2024-11-21 7.5 HIGH 9.8 CRITICAL
DWSurvey v3.2.0 was discovered to contain an arbitrary file write vulnerability via the component /utils/ToHtmlServlet.java.
CVE-2021-39352 1 Catchplugins 1 Catch Themes Demo Import 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Catch Themes Demo Import WordPress plugin is vulnerable to arbitrary file uploads via the import functionality found in the ~/inc/CatchThemesDemoImport.php file, in versions up to and including 1.7, due to insufficient file type validation. This makes it possible for an attacker with administrative privileges to upload malicious files that can be used to achieve remote code execution.
CVE-2021-39317 1 Accesspressthemes 43 Access Demo Importer, Accesspress-lite, Accesspress-mag and 40 more 2024-11-21 6.5 MEDIUM 8.8 HIGH
A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer <=1.0.6 WordPress Themes: accesspress-basic <= 3.2.1 accesspress-lite <= 2.92 accesspress-mag <= 2.6.5 accesspress-parallax <= 4.5 accesspress-root <= 2.5 accesspress-store <= 2.4.9 agency-lite <= 1.1.6 arrival <= 1.4.2 bingle <= 1.0.4 bloger <= 1.2.6 brovy <= 1.3 construction-lite <= 1.2.5 doko <= 1.0.27 edict-lite <= 1.1.4 eightlaw-lite <= 2.1.5 eightmedi-lite <= 2.1.8 eight-sec <= 1.1.4 eightstore-lite <= 1.2.5 enlighten <= 1.3.5 fotography <= 2.4.0 opstore <= 1.4.3 parallaxsome <= 1.3.6 punte <= 1.1.2 revolve <= 1.3.1 ripple <= 1.2.0 sakala <= 1.0.4 scrollme <= 2.1.0 storevilla <= 1.4.1 swing-lite <= 1.1.9 the100 <= 1.1.2 the-launcher <= 1.3.2 the-monday <= 1.4.1 ultra-seven <= 1.2.8 uncode-lite <= 1.3.3 vmag <= 1.2.7 vmagazine-lite <= 1.3.5 vmagazine-news <= 1.0.5 wpparallax <= 2.0.6 wp-store <= 1.1.9 zigcy-baby <= 1.0.6 zigcy-cosmetics <= 1.0.5 zigcy-lite <= 2.0.9
CVE-2021-39221 1 Nextcloud 1 Contacts 2024-11-21 3.5 LOW 6.4 MEDIUM
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Contacts application is upgraded to 4.0.3. As a workaround, one may use a browser that has support for Content-Security-Policy.
CVE-2021-39040 1 Ibm 1 Planning Analytics Workspace 2024-11-21 6.0 MEDIUM 8.0 HIGH
IBM Planning Analytics Workspace 2.0 could be vulnerable to malicious file upload by not validating the file types or sizes. Attackers can make use of this weakness and upload malicious executable files into the system and it can be sent to victim for performing further attacks. IBM X-Force ID: 214025.
CVE-2021-38945 2 Ibm, Netapp 2 Cognos Analytics, Oncommand Insight 2024-11-21 7.5 HIGH 9.8 CRITICAL
IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 could allow a remote attacker to upload arbitrary files, caused by improper content validation. IBM X-Force ID: 211238.
CVE-2021-38847 1 S-cart 1 S-cart 2024-11-21 6.5 MEDIUM 8.8 HIGH
S-Cart v6.4.1 and below was discovered to contain an arbitrary file upload vulnerability in the Editor module on the Admin panel. This vulnerability allows attackers to execute arbitrary code via a crafted IMG file.
CVE-2021-38841 1 Simple Water Refilling Station Management System Project 1 Simple Water Refilling Station Management System 2024-11-21 6.5 MEDIUM 8.8 HIGH
Remote Code Execution can occur in Simple Water Refilling Station Management System 1.0 via the System Logo option on the system_info page in classes/SystemSettings.php with an update_settings action.
CVE-2021-38753 1 Simple Image Gallery Web App Project 1 Simple Image Gallery Web App 2024-11-21 7.5 HIGH 9.8 CRITICAL
An unrestricted file upload on Simple Image Gallery Web App can be exploited to upload a web shell and executed to gain unauthorized access to the server hosting the web app.
CVE-2021-38697 1 Softvibe 1 Saraban 2024-11-21 7.5 HIGH 9.8 CRITICAL
SoftVibe SARABAN for INFOMA 1.1 allows Unauthenticated unrestricted File Upload, that allows attackers to upload files with any file extension which can lead to arbitrary code execution.
CVE-2021-38613 1 Nascent 1 Remkon Device Manager 2024-11-21 10.0 HIGH 9.8 CRITICAL
The assets/index.php Image Upload feature of the NASCENT RemKon Device Manager 4.0.0.0 allows attackers to upload any code to the target system and achieve remote code execution.