Total
2900 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2017-16594 | 1 Netgain-systems | 1 Enterprise Manager | 2024-11-21 | N/A |
This vulnerability allows remote attackers to create arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.db.save_005fimage_jsp servlet, which listens on TCP port 8081 by default. When parsing the id parameter, the process does not properly validate user-supplied data, which can allow for the upload of files. An attacker can leverage this vulnerability to execute code under the context of Administrator. Was ZDI-CAN-5117. | ||||
CVE-2017-16524 | 2 Hanwhasecurity, Samsung | 2 Web Viewer, Srn-1670d | 2024-11-21 | N/A |
Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted file upload vulnerability: 'network_ssl_upload.php' allows remote authenticated attackers to upload and execute arbitrary PHP code via a filename with a .php extension, which is then accessed via a direct request to the file in the upload/ directory. To authenticate for this attack, one can obtain web-interface credentials in cleartext by leveraging the existing Local File Read Vulnerability referenced as CVE-2015-8279, which allows remote attackers to read the web-interface credentials via a request for the cslog_export.php?path=/root/php_modules/lighttpd/sbin/userpw URI. | ||||
CVE-2017-16251 | 1 Mitel | 1 St14.2 | 2024-11-21 | N/A |
A vulnerability in the conferencing component of Mitel ST 14.2, release GA28 and earlier, could allow an authenticated user to upload a malicious script to the Personal Library by a crafted POST request. Successful exploit could allow an attacker to execute arbitrary code within the context of the application. | ||||
CVE-2017-15990 | 1 Savsofteproducts | 1 Phpinventory | 2024-11-21 | 9.8 Critical |
Php Inventory & Invoice Management System allows Arbitrary File Upload via dashboard/edit_myaccountdetail/. | ||||
CVE-2017-15962 | 1 Istock Management System Project | 1 Istock Management System | 2024-11-21 | N/A |
iStock Management System 1.0 allows Arbitrary File Upload via user/profile. | ||||
CVE-2017-15957 | 1 Ingenious School Management System Project | 1 Ingenious School Management System | 2024-11-21 | N/A |
my_profile.php in Ingenious School Management System 2.3.0 allows a student or teacher to upload an arbitrary file. | ||||
CVE-2017-15876 | 1 Sistemagpweb | 1 Gpweb | 2024-11-21 | N/A |
Unrestricted File Upload vulnerability in GPWeb 8.4.61 allows remote authenticated users to upload any type of file, including a PHP shell. | ||||
CVE-2017-15673 | 1 Cs-cart | 1 Cs-cart | 2024-11-21 | N/A |
The files function in the administration section in CS-Cart 4.6.2 and earlier allows attackers to execute arbitrary PHP code via vectors involving a custom page. | ||||
CVE-2017-15580 | 1 Osticket | 1 Osticket | 2024-11-21 | N/A |
osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content. | ||||
CVE-2017-15549 | 1 Emc | 3 Avamar Server, Integrated Data Protection Appliance, Networker | 2024-11-21 | N/A |
An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote authenticated malicious user with low privileges could potentially upload arbitrary maliciously crafted files in any location on the server file system. | ||||
CVE-2017-15054 | 1 Teampass | 1 Teampass | 2024-11-21 | N/A |
An arbitrary file upload vulnerability, present in TeamPass before 2.1.27.9, allows remote authenticated users to upload arbitrary files leading to Remote Command Execution. To exploit this vulnerability, an authenticated attacker has to tamper with parameters of a request to upload.files.php, in order to select the correct branch and be able to upload any arbitrary file. From there, it can simply access the file to execute code on the server. | ||||
CVE-2017-14958 | 1 Pivotx | 1 Pivotx | 2024-11-21 | N/A |
lib.php in PivotX 2.3.11 does not properly block uploads of dangerous file types by admin users, which allows remote PHP code execution via an upload of a .php file. | ||||
CVE-2017-14841 | 1 Dasinfomedia | 1 Annual Maintenance Contract Management System | 2024-11-21 | N/A |
Mojoomla Annual Maintenance Contract (AMC) Management System allows Arbitrary File Upload in profilesetting image handling. | ||||
CVE-2017-14840 | 1 Teamworktec | 1 Ticketplus | 2024-11-21 | N/A |
TeamWork TicketPlus allows Arbitrary File Upload in updateProfile. | ||||
CVE-2017-14839 | 1 Teamworktec | 1 Photo Fusion | 2024-11-21 | N/A |
TeamWork Photo Fusion allows Arbitrary File Upload in changeAvatar and changeCover. | ||||
CVE-2017-14838 | 1 Teamworktec | 1 Job Links | 2024-11-21 | N/A |
TeamWork Job Links allows Arbitrary File Upload in profileChange and coverChange. | ||||
CVE-2017-14704 | 1 Claydip | 1 Airbnb Clone | 2024-11-21 | N/A |
Multiple unrestricted file upload vulnerabilities in the (1) imageSubmit and (2) proof_submit functions in Claydip Laravel Airbnb Clone 1.0 allow remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images/profile. | ||||
CVE-2017-14521 | 1 Wondercms | 1 Wondercms | 2024-11-21 | N/A |
In WonderCMS 2.3.1, the upload functionality accepts random application extensions and leads to malicious File Upload. | ||||
CVE-2017-14399 | 1 Blackcat-cms | 1 Blackcat Cms | 2024-11-21 | N/A |
In BlackCat CMS 1.2.2, unrestricted file upload is possible in backend\media\ajax_rename.php via the extension parameter, as demonstrated by changing the extension from .jpg to .php. | ||||
CVE-2017-14346 | 1 Blog Project | 1 Blog | 2024-11-21 | N/A |
upload.php in tianchoy/blog through 2017-09-12 allows unrestricted file upload and PHP code execution by using the image/jpeg, image/pjpeg, image/png, or image/gif content type for a .php file. |