Vulnerabilities (CVE)

Filtered by CWE-434
Total 2976 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-42675 1 Kreado 1 Kreasfero 2024-11-21 7.5 HIGH 9.8 CRITICAL
Kreado Kreasfero 1.5 does not properly sanitize uploaded files to the media directory. One can upload a malicious PHP file and obtain remote code execution.
CVE-2021-42669 1 Engineers Online Portal Project 1 Engineers Online Portal 2024-11-21 10.0 HIGH 9.8 CRITICAL
A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing "<?php system($_GET["cmd"]); ?>" the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id.
CVE-2021-42654 1 Sscms 1 Siteserver Cms 2024-11-21 7.5 HIGH 9.8 CRITICAL
SiteServer CMS < V5.1 is affected by an unrestricted upload of a file with dangerous type (getshell), which could be used to execute arbitrary code.
CVE-2021-42645 1 Cmsimple-xh 1 Cmsimple Xh 2024-11-21 10.0 HIGH 10.0 CRITICAL
CMSimple_XH 1.7.4 is affected by a remote code execution (RCE) vulnerability. To exploit this vulnerability, an attacker must use the "File" parameter to upload a PHP payload to get a reverse shell from the vulnerable host.
CVE-2021-42362 1 Wordpress Popular Posts Project 1 Wordpress Popular Posts 2024-11-21 6.5 MEDIUM 8.8 HIGH
The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.
CVE-2021-42342 1 Embedthis 1 Goahead 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
CVE-2021-42171 1 Tribalsystems 1 Zenario 2024-11-21 6.5 MEDIUM 7.2 HIGH
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
CVE-2021-42125 1 Ivanti 1 Avalanche 2024-11-21 6.5 MEDIUM 8.8 HIGH
An unrestricted file upload vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to write dangerous files.
CVE-2021-42123 1 Businessdnasolutions 1 Topease 2024-11-21 6.5 MEDIUM 7.3 HIGH
Unrestricted File Upload in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 in the File Upload Functions allows an authenticated remote attacker with Upload privileges to upload files with any file type, enabling client-side attacks.
CVE-2021-42099 1 Zohocorp 1 Manageengine M365 Manager Plus 2024-11-21 7.5 HIGH 9.8 CRITICAL
Zoho ManageEngine M365 Manager Plus before 4421 is vulnerable to file-upload remote code execution.
CVE-2021-41938 1 Shopxo 1 Shopxo 2024-11-21 6.5 MEDIUM 7.2 HIGH
An issue was discovered in ShopXO CMS 2.2.0. After entering the management page, there is an arbitrary file upload vulnerability in three locations.
CVE-2021-41921 1 Xxyopen 1 Novel-plus 2024-11-21 7.5 HIGH 9.8 CRITICAL
novel-plus V3.6.1 allows unrestricted file uploads. Unrestricted file suffixes and contents can lead to server attacks and arbitrary code execution.
CVE-2021-41919 1 Webtareas Project 1 Webtareas 2024-11-21 6.5 MEDIUM 8.8 HIGH
webTareas version 2.4 and earlier allows an authenticated user to arbitrarily upload potentially dangerous files without restrictions. This is working by adding or replacing a personal profile picture. The affected endpoint is /includes/upload.php on the HTTP POST data. This allows an attacker to exploit the platform by injecting code or malware and, under certain conditions, to execute code on remote user browsers.
CVE-2021-41870 1 Socomec 2 Remote View Pro, Remote View Pro Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in the firmware update form in Socomec REMOTE VIEW PRO 2.0.41.4. An authenticated attacker can bypass a client-side file-type check and upload arbitrary .php files.
CVE-2021-41833 1 Zohocorp 1 Manageengine Patch Connect Plus 2024-11-21 7.5 HIGH 9.8 CRITICAL
Zoho ManageEngine Patch Connect Plus before 90099 is vulnerable to unauthenticated remote code execution.
CVE-2021-41745 1 Showdoc 1 Showdoc 2024-11-21 7.5 HIGH 9.8 CRITICAL
ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions.
CVE-2021-41675 1 E-negosyo System Project 1 E-negosyo System 2024-11-21 6.5 MEDIUM 7.2 HIGH
A Remote Code Execution (RCE) vulnerabilty exists in Sourcecodester E-Negosyo System 1.0 in /admin/produts/controller.php via the doInsert function, which validates images with getImageSizei. .
CVE-2021-41646 1 Online Reviewer System Project 1 Online Reviewer System 2024-11-21 7.5 HIGH 9.8 CRITICAL
Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters..
CVE-2021-41645 1 Oretnom23 1 Budget And Expense Tracker System 2024-11-21 6.5 MEDIUM 8.8 HIGH
Remote Code Execution (RCE) vulnerability exists in Sourcecodester Budget and Expense Tracker System 1.0 that allows a remote malicious user to inject arbitrary code via the image upload field. .
CVE-2021-41644 1 Online Food Ordering System Project 1 Online Food Ordering System 2024-11-21 7.5 HIGH 9.8 CRITICAL
Remote Code Exection (RCE) vulnerability exists in Sourcecodester Online Food Ordering System 2.0 via a maliciously crafted PHP file that bypasses the image upload filters.