Vulnerabilities (CVE)

Filtered by CWE-434
Total 3006 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-34738 1 Chemex 1 Chemex 2024-11-21 N/A 9.8 CRITICAL
Chemex through 3.7.1 is vulnerable to arbitrary file upload.
CVE-2023-34736 1 Guantang Equipment Management System Project 1 Guantang Equipment Management System 2024-11-21 N/A 7.2 HIGH
Guantang Equipment Management System version 4.12 is vulnerable to Arbitrary File Upload.
CVE-2023-34660 1 Jeecg 1 Jeecg Boot 2024-11-21 N/A 6.5 MEDIUM
jjeecg-boot V3.5.0 has an unauthorized arbitrary file upload in /jeecg-boot/jmreport/upload interface.
CVE-2023-34394 1 Keysight 1 Geolocation Server 2024-11-21 N/A 7.8 HIGH
In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition.
CVE-2023-34385 1 Akshaymenariya 1 Export Import Menus 2024-11-21 N/A 9.9 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in Akshay Menariya Export Import Menus.This issue affects Export Import Menus: from n/a through 1.8.0.
CVE-2023-34207 1 Easyuse 1 Mailhunter Ultimate 2024-11-21 N/A 9.9 CRITICAL
Unrestricted upload of file with dangerous type vulnerability in create template function in EasyUse MailHunter Ultimate 2023 and earlier allows remote authenticated users to perform arbitrary system commands with ‘NT Authority\SYSTEM‘ privilege via a crafted ZIP archive.
CVE-2023-34193 1 Zimbra 1 Collaboration 2024-11-21 N/A 8.8 HIGH
File Upload vulnerability in Zimbra ZCS 8.8.15 allows an authenticated privileged user to execute arbitrary code and obtain sensitive information via the ClientUploader function.
CVE-2023-34136 1 Sonicwall 2 Analytics, Global Management System 2024-11-21 N/A 9.8 CRITICAL
Vulnerability in SonicWall GMS and Analytics allows unauthenticated attacker to upload files to a restricted location not controlled by the attacker. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
CVE-2023-34126 1 Sonicwall 2 Analytics, Global Management System 2024-11-21 N/A 8.8 HIGH
Vulnerability in SonicWall GMS and Analytics allows an authenticated attacker to upload files on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
CVE-2023-34007 1 Wpchill 1 Download Monitor 2024-11-21 N/A 9.9 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in WPChill Download Monitor.This issue affects Download Monitor: from n/a through 4.8.3.
CVE-2023-33493 1 Ajaxmanager Project 1 Ajaxmanager 2024-11-21 N/A 9.8 CRITICAL
An Unrestricted Upload of File with Dangerous Type vulnerability in the Ajaxmanager File and Database explorer (ajaxmanager) module for PrestaShop through 2.3.0, allows remote attackers to upload dangerous files without restrictions.
CVE-2023-33480 1 Remoteclinic 1 Remote Clinic 2024-11-21 N/A 8.8 HIGH
RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access control in the staff/register.php endpoint and the edit-my-profile.php page. By sending a series of specially crafted requests to the RemoteClinic application, an attacker can create admin users with more privileges than their own, upload a PHP file containing arbitrary code, and execute arbitrary commands via the PHP shell.
CVE-2023-33404 1 Blogengine 1 Blogengine.net 2024-11-21 N/A 9.8 CRITICAL
An Unrestricted Upload vulnerability, due to insufficient validation on UploadControlled.cs file, in BlogEngine.Net version 3.3.8.0 and earlier allows remote attackers to execute remote code.
CVE-2023-33318 1 Woocommerce 1 Automatewoo 2024-11-21 N/A 9.9 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in WooCommerce AutomateWoo.This issue affects AutomateWoo: from n/a through 4.9.40.
CVE-2023-33253 1 Agilebio 1 Labcollector 2024-11-21 N/A 8.8 HIGH
LabCollector 6.0 though 6.15 allows remote code execution. An authenticated remote low-privileged user can upload an executable PHP file and execute system commands. The vulnerability is in the message function, and is due to insufficient validation of the file (such as shell.jpg.php.shell) being sent.
CVE-2023-32757 1 Edetw 1 U-office Force 2024-11-21 N/A 9.8 CRITICAL
e-Excellence U-Office Force file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker without logging the service can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service.
CVE-2023-32753 1 Itpison 1 Omicard Edm 2024-11-21 N/A 9.8 CRITICAL
OMICARD EDM’s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
CVE-2023-32752 1 L7-networks 2 Instantqos, Instantscan 2024-11-21 N/A 9.8 CRITICAL
L7 Networks InstantScan IS-8000 & InstantQoS IQ-8000’s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
CVE-2023-32689 1 Parseplatform 1 Parse-server 2024-11-21 N/A 6.3 MEDIUM
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 5.4.4 and 6.1.1 are vulnerable to a phishing attack vulnerability that involves a user uploading malicious files. A malicious user could upload an HTML file to Parse Server via its public API. That HTML file would then be accessible at the internet domain at which Parse Server is hosted. The URL of the the uploaded HTML could be shared for phishing attacks. The HTML page may seem legitimate because it is served under the internet domain where Parse Server is hosted, which may be the same as a company's official website domain. An additional security issue arises when the Parse JavaScript SDK is used. The SDK stores sessions in the internet browser's local storage, which usually restricts data access depending on the internet domain. A malicious HTML file could contain a script that retrieves the user's session token from local storage and then share it with the attacker. The fix included in versions 5.4.4 and 6.1.1 adds a new Parse Server option `fileUpload.fileExtensions` to restrict file upload on Parse Server by file extension. It is recommended to restrict file upload for HTML file extensions, which this fix disables by default. If an app requires upload of files with HTML file extensions, the option can be set to `['.*']` or another custom value to override the default.
CVE-2023-32686 1 Kiwitcms 1 Kiwi Tcms 2024-11-21 N/A 8.1 HIGH
Kiwi TCMS is an open source test management system for both manual and automated testing. Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced upload validators in order to prevent potentially dangerous files from being uploaded. The upload validation checks were not robust enough which left the possibility of an attacker to circumvent them and upload a potentially dangerous file. Exploiting this flaw, a combination of files could be uploaded so that they work together to circumvent the existing Content-Security-Policy and allow execution of arbitrary JavaScript in the browser. This issue has been patched in version 12.3.