Show filters
51 Total Results
Displaying 11-20 of 51
Sort by:
Attacker Value
Unknown

CVE-2021-40966

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
A Stored XSS exists in TinyFileManager All version up to and including 2.4.6 in /tinyfilemanager.php when the server is given a file that contains HTML and javascript in its name. A malicious user can upload a file with a malicious filename containing javascript code and it will run on any user browser when they access the server.
Attacker Value
Unknown

CVE-2021-40964

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
A Path Traversal vulnerability exists in TinyFileManager all version up to and including 2.4.6 that allows attackers to upload a file (with Admin credentials or with the CSRF vulnerability) with the "fullpath" parameter containing path traversal strings (../ and ..\) in order to escape the server's intended working directory and write malicious files onto any directory on the computer.
Attacker Value
Unknown

CVE-2020-11106

Disclosure Date: March 30, 2020 (last updated February 21, 2025)
An issue was discovered in Responsive Filemanager through 9.14.0. In the dialog.php page, the session variable $_SESSION['RF']["view_type"] wasn't sanitized if it was already set. This made stored XSS possible if one opens ajax_calls.php and uses the "view" action and places a payload in the type parameter, and then returns to the dialog.php page. This occurs because ajax_calls.php was also able to set the $_SESSION['RF']["view_type"] variable, but there it wasn't sanitized.
Attacker Value
Unknown

CVE-2020-10567

Disclosure Date: March 14, 2020 (last updated February 21, 2025)
An issue was discovered in Responsive Filemanager through 9.14.0. In the ajax_calls.php file in the save_img action in the name parameter, there is no validation of what kind of extension is sent. This makes it possible to execute PHP code if a legitimate JPEG image contains this code in the EXIF data, and the .php extension is used in the name parameter. (A potential fast patch is to disable the save_img action in the config file.)
Attacker Value
Unknown

CVE-2020-10212

Disclosure Date: March 07, 2020 (last updated February 21, 2025)
upload.php in Responsive FileManager 9.13.4 and 9.14.0 allows SSRF via the url parameter because file-extension blocking is mishandled and because it is possible for a DNS hostname to resolve to an internal IP address. For example, an SSRF attempt may succeed if a .ico filename is added to the PATH_INFO. Also, an attacker could create a DNS hostname that resolves to the 0.0.0.0 IP address for DNS pinning. NOTE: this issue exists because of an incomplete fix for CVE-2018-14728.
Attacker Value
Unknown

CVE-2018-20793

Disclosure Date: February 25, 2019 (last updated November 27, 2024)
tecrail Responsive FileManager 9.13.4 allows remote attackers to write to an arbitrary file as a consequence of a paths[0] path traversal mitigation bypass, through the create_file action in execute.php.
0
Attacker Value
Unknown

CVE-2018-20795

Disclosure Date: February 25, 2019 (last updated November 27, 2024)
tecrail Responsive FileManager 9.13.4 allows remote attackers to read arbitrary files via path traversal with the path parameter, through the copy_cut action in ajax_calls.php and the paste_clipboard action in execute.php.
0
Attacker Value
Unknown

CVE-2018-20794

Disclosure Date: February 25, 2019 (last updated November 27, 2024)
tecrail Responsive FileManager 9.13.4 allows remote attackers to write to an arbitrary image file (jpg/jpeg/png) via path traversal with the path parameter, through the save_img action in ajax_calls.php.
0
Attacker Value
Unknown

CVE-2018-20792

Disclosure Date: February 25, 2019 (last updated November 27, 2024)
tecrail Responsive FileManager 9.13.4 allows remote attackers to read arbitrary file via path traversal with the path parameter, through the get_file action in ajax_calls.php.
0
Attacker Value
Unknown

CVE-2018-20791

Disclosure Date: February 25, 2019 (last updated November 27, 2024)
tecrail Responsive FileManager 9.13.4 allows XSS via a media file upload with an XSS payload in the name, because of mishandling of the media_preview action.
0