### [CVE-2018-18874](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18874) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description nc-cms through 2017-03-10 allows remote attackers to execute arbitrary PHP code via the "Upload File or Image" feature, with a .php filename and "Content-Type: application/octet-stream" to the index.php?action=file_manager_upload URI. ### POC #### Reference - https://github.com/gnat/nc-cms/issues/11 - https://github.com/gnat/nc-cms/issues/11 #### Github No PoCs found on GitHub currently.