CVE-2021-34639

CVSS v3 Score
8.8
High
CVSS v2 Score
6.5
Medium

Vulnerability Description

Authenticated File Upload in WordPress Download Manager <= 3.1.24 allows authenticated (Author+) users to upload files with a double extension, e.g. "payload.php.png" which is executable in some configurations. This issue affects: WordPress Download Manager version 3.1.24 and prior versions.

CVSS:8.8(High)

A CWE-646 “Reliance on File Name or Extension of Externally-Supplied File” vulnerability in the “iec61850” functionality of the web application allows a remote authenticated attacker to upload any arb...

CVSS:9.8(Critical)

Matrix Tafnit v8 - CWE-646: Reliance on File Name or Extension of Externally-Supplied File

CVSS:9.8(Critical)

SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart f...

CVSS:9.8(Critical)

picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pick...

CVSS:7.2(High)

Wowza Streaming Engine below 4.9.1 permits an authenticated Streaming Engine Manager administrator to define a custom application property and poison a stream target for high-privilege remote code exe...

CVSS:9.8(Critical)

Matrix Tafnit v8 - CWE-646: Reliance on File Name or Extension of Externally-Supplied File