Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2022-40797
Disclosure Date: November 09, 2022 (last updated February 24, 2025)
Roxy Fileman 1.4.6 allows Remote Code Execution via a .phar upload, because the default FORBIDDEN_UPLOADS value in conf.json only blocks .php, .php4, and .php5 files. (Visiting any .phar file invokes the PHP interpreter in some realistic web-server configurations.)
0
Attacker Value
Unknown
CVE-2019-19731
Disclosure Date: December 16, 2019 (last updated November 27, 2024)
Roxy Fileman 1.4.5 for .NET is vulnerable to path traversal. A remote attacker can write uploaded files to arbitrary locations via the RENAMEFILE action. This can be leveraged for code execution by uploading a specially crafted Windows shortcut file and writing the file to the Startup folder (because an incomplete blacklist of file extensions allows Windows shortcut files to be uploaded).
0
Attacker Value
Unknown
CVE-2019-7174
Disclosure Date: April 09, 2019 (last updated November 27, 2024)
Roxy Fileman 1.4.5 allows attackers to execute renamefile.php (aka Rename File), createdir.php (aka Create Directory), fileslist.php (aka Echo File List), and movefile.php (aka Move File) operations.
0
Attacker Value
Unknown
CVE-2018-20526
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
Roxy Fileman 1.4.5 allows unrestricted file upload in upload.php.
0
Attacker Value
Unknown
CVE-2018-20525
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
Roxy Fileman 1.4.5 allows Directory Traversal in copydir.php, copyfile.php, and fileslist.php.
0
Attacker Value
Unknown
CVE-2018-12042
Disclosure Date: June 07, 2018 (last updated November 26, 2024)
Roxy Fileman through v1.4.5 has Directory traversal via the php/download.php f parameter.
0