Total
2498 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2018-25019 | 1 Learndash | 1 Learndash | 2024-08-05 | 7.5 High |
The LearnDash LMS WordPress plugin before 2.5.4 does not have any authorisation and validation of the file to be uploaded in the learndash_assignment_process_init() function, which could allow unauthenticated users to upload arbitrary files to the web server | ||||
CVE-2018-21244 | 1 Foxitsoftware | 1 Phantompdf | 2024-08-05 | 9.8 Critical |
An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows arbitrary application execution via an embedded executable file in a PDF portfolio, aka FG-VD-18-029. | ||||
CVE-2018-21243 | 1 Foxitsoftware | 1 Phantompdf | 2024-08-05 | 6.5 Medium |
An issue was discovered in Foxit PhantomPDF before 8.3.6. It has COM object mishandling when Microsoft Word is used. | ||||
CVE-2018-21024 | 1 Centreon | 1 Centreon | 2024-08-05 | 9.8 Critical |
licenseUpload.php in Centreon Web before 2.8.27 allows attackers to upload arbitrary files via a POST request. | ||||
CVE-2018-20926 | 1 Cpanel | 1 Cpanel | 2024-08-05 | N/A |
cPanel before 70.0.23 allows local privilege escalation via the WHM Locale XML Upload interface (SEC-380). | ||||
CVE-2018-20925 | 1 Cpanel | 1 Cpanel | 2024-08-05 | N/A |
cPanel before 70.0.23 allows local privilege escalation via the WHM Legacy Language File Upload interface (SEC-379). | ||||
CVE-2018-20526 | 1 Roxyfileman | 1 Roxy Fileman | 2024-08-05 | N/A |
Roxy Fileman 1.4.5 allows unrestricted file upload in upload.php. | ||||
CVE-2018-20166 | 1 Rukovoditel | 1 Rukovoditel | 2024-08-05 | N/A |
A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in ".php" with mixed case, such as the .pHp extension. | ||||
CVE-2018-20063 | 1 Gurock | 1 Testrail | 2024-08-05 | N/A |
An issue was discovered in Gurock TestRail 5.6.0.3853. An "Unrestricted Upload of File" vulnerability exists in the image-upload form (available in the description editor), allowing remote authenticated users to execute arbitrary code by uploading an image file with an executable extension but a safe Content-Type value, and then accessing it via a direct request to the file in the file-upload directory (if it's accessible according to the server configuration). | ||||
CVE-2018-19798 | 1 Fleetco | 1 Fleet Maintenance Management | 2024-08-05 | 8.8 High |
Fleetco Fleet Maintenance Management (FMM) 1.2 and earlier allows uploading an arbitrary ".php" file with the application/x-php Content-Type to the accidents_add.php?submit=1 URI, as demonstrated by the value_Images_1 field, which leads to remote command execution on the remote server. Any authenticated user can exploit this. | ||||
CVE-2018-19789 | 2 Debian, Sensiolabs | 2 Debian Linux, Symfony | 2024-08-05 | N/A |
An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution. | ||||
CVE-2018-19612 | 1 Westermo | 6 Dr-250, Dr-250 Firmware, Dr-260 and 3 more | 2024-08-05 | N/A |
The /uploadfile? functionality in Westermo DR-250 Pre-5162 and DR-260 Pre-5162 routers allows remote users to upload malicious file types and execute ASP code. | ||||
CVE-2018-19692 | 1 Tp5cms Project | 1 Tp5cms | 2024-08-05 | N/A |
An issue was discovered in tp5cms through 2017-05-25. admin.php/upload/picture.html allows remote attackers to execute arbitrary PHP code by uploading a .php file with the image/jpeg content type. | ||||
CVE-2018-19537 | 1 Tp-link | 2 Archer C5, Archer C5 Firmware | 2024-08-05 | N/A |
TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases. | ||||
CVE-2018-19514 | 1 Ens | 1 Webgalamb | 2024-08-05 | N/A |
In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file. | ||||
CVE-2018-19550 | 1 Interspire | 1 Email Marketer | 2024-08-05 | N/A |
Interspire Email Marketer through 6.1.6 allows arbitrary file upload via a surveys_submit.php "create survey and submit survey" operation, which can cause a .php file to be accessible under a admin/temp/surveys/ URI. | ||||
CVE-2018-19453 | 1 Kentico | 1 Kentico Cms | 2024-08-05 | N/A |
Kentico CMS before 11.0.45 allows unrestricted upload of a file with a dangerous type. | ||||
CVE-2018-19422 | 1 Intelliants | 1 Subrion Cms | 2024-08-05 | 7.2 High |
/panel/uploads in Subrion CMS 4.2.1 allows remote attackers to execute arbitrary PHP code via a .pht or .phar file, because the .htaccess file omits these. | ||||
CVE-2018-19423 | 1 Codiad | 1 Codiad | 2024-08-05 | 7.2 High |
Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file. | ||||
CVE-2018-19355 | 2 Mypresta, Prestashop | 2 Customer Files Upload, Prestashop | 2024-08-05 | 9.8 Critical |
modules/orderfiles/ajax/upload.php in the Customer Files Upload addon 2018-08-01 for PrestaShop (1.5 through 1.7) allows remote attackers to execute arbitrary code by uploading a php file via modules/orderfiles/upload.php with auptype equal to product (for upload destinations under modules/productfiles), order (for upload destinations under modules/files), or cart (for upload destinations under modules/cartfiles). |