Page 3 of 11 results (0.001 seconds)

CVSS: 7.5EPSS: 14%CPEs: 15EXPL: 5

Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory. Vulnerabilidad de la subida de ficheros sin restricciones en process-upload.php en ProjectSend (anteriormente cFTP) r100 hasta r561 permite a atacantes remotos ejecutar código PHP arbitrario mediante la subida de un fichero con una extensión PHP, posteriormente accediendo a ello a través de una solicitud directa al fichero en el directorio upload/files/ or upload/temp/. • https://www.exploit-db.com/exploits/35660 https://www.exploit-db.com/exploits/35424 http://osvdb.org/show/osvdb/116469 http://packetstormsecurity.com/files/129759/ProjectSend-Arbitrary-File-Upload.html http://www.exploit-db.com/exploits/35424 http://www.exploit-db.com/exploits/35660 https://exchange.xforce.ibmcloud.com/vulnerabilities/99548 • CWE-94: Improper Control of Generation of Code ('Code Injection') •