Total
6542 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-23547 | 1 Milesight | 2 Ur32l, Ur32l Firmware | 2024-11-21 | N/A | 6.5 MEDIUM |
A directory traversal vulnerability exists in the luci2-io file-export mib functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary file read. An attacker can send a network request to trigger this vulnerability. | |||||
CVE-2023-23366 | 1 Qnap | 1 Music Station | 2024-11-21 | N/A | 7.7 HIGH |
A path traversal vulnerability has been reported to affect Music Station. If exploited, the vulnerability could allow authenticated users to read the contents of unexpected files and expose sensitive data via a network. We have already fixed the vulnerability in the following version: Music Station 5.3.22 and later | |||||
CVE-2023-23365 | 1 Qnap | 1 Music Station | 2024-11-21 | N/A | 7.7 HIGH |
A path traversal vulnerability has been reported to affect Music Station. If exploited, the vulnerability could allow authenticated users to read the contents of unexpected files and expose sensitive data via a network. We have already fixed the vulnerability in the following version: Music Station 5.3.22 and later | |||||
CVE-2023-23314 | 1 Zdir Project | 1 Zdir | 2024-11-21 | N/A | 8.8 HIGH |
An arbitrary file upload vulnerability in the /api/upload component of zdir v3.2.0 allows attackers to execute arbitrary code via a crafted .ssh file. | |||||
CVE-2023-23169 | 1 Synapsoft | 1 Pdfocus | 2024-11-21 | N/A | 6.5 MEDIUM |
Synapsoft pdfocus 1.17 is vulnerable to local file inclusion and server-side request forgery Directory Traversal. | |||||
CVE-2023-23136 | 1 Lmxcms | 1 Lmxcms | 2024-11-21 | N/A | 6.5 MEDIUM |
lmxcms v1.41 was discovered to contain an arbitrary file deletion vulnerability via BackdbAction.class.php. | |||||
CVE-2023-23063 | 1 Cellinx | 1 Nvt Web Server | 2024-11-21 | N/A | 7.5 HIGH |
Cellinx NVT v1.0.6.002b was discovered to contain a local file disclosure vulnerability via the component /cgi-bin/GetFileContent.cgi. | |||||
CVE-2023-22973 | 1 Open-emr | 1 Openemr | 2024-11-21 | N/A | 8.8 HIGH |
A Local File Inclusion (LFI) vulnerability in interface/forms/LBF/new.php in OpenEMR < 7.0.0 allows remote authenticated users to execute code via the formname parameter. | |||||
CVE-2023-22914 | 1 Zyxel | 22 Usg Flex 100, Usg Flex 100 Firmware, Usg Flex 100w and 19 more | 2024-11-21 | N/A | 7.2 HIGH |
A path traversal vulnerability in the “account_print.cgi” CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote authenticated attacker with administrator privileges to execute unauthorized OS commands in the “tmp” directory by uploading a crafted file if the hotspot function were enabled. | |||||
CVE-2023-22901 | 1 Changingtec | 1 Mobile One Time Password | 2024-11-21 | N/A | 4.9 MEDIUM |
ChangingTec MOTP system has a path traversal vulnerability. A remote attacker with administrator’s privilege can exploit this vulnerability to access arbitrary system files. | |||||
CVE-2023-22887 | 1 Apache | 1 Airflow | 2024-11-21 | N/A | 6.5 MEDIUM |
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected | |||||
CVE-2023-22776 | 1 Arubanetworks | 24 7010, 7030, 7205 and 21 more | 2024-11-21 | N/A | 4.9 MEDIUM |
An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to read arbitrary files on the underlying operating system, including sensitive system files. | |||||
CVE-2023-22774 | 1 Arubanetworks | 24 7010, 7030, 7205 and 21 more | 2024-11-21 | N/A | 7.2 HIGH |
Authenticated path traversal vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files in the underlying operating system. | |||||
CVE-2023-22773 | 1 Arubanetworks | 24 7010, 7030, 7205 and 21 more | 2024-11-21 | N/A | 7.2 HIGH |
Authenticated path traversal vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files in the underlying operating system. | |||||
CVE-2023-22772 | 1 Arubanetworks | 2 Arubaos, Sd-wan | 2024-11-21 | N/A | 6.5 MEDIUM |
An authenticated path traversal vulnerability exists in the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in the ability to delete arbitrary files in the underlying operating system. | |||||
CVE-2023-22726 | 1 Act Project | 1 Act | 2024-11-21 | N/A | 8.0 HIGH |
act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually. | |||||
CVE-2023-22629 | 1 Southrivertech | 1 Titan Ftp Server | 2024-11-21 | N/A | 8.8 HIGH |
An issue was discovered in TitanFTP through 1.94.1205. The move-file function has a path traversal vulnerability in the newPath parameter. An authenticated attacker can upload any file and then move it anywhere on the server's filesystem. | |||||
CVE-2023-22380 | 1 Github | 1 Enterprise Server | 2024-11-21 | N/A | 6.5 MEDIUM |
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.6. This vulnerability was reported via the GitHub Bug Bounty program. | |||||
CVE-2023-22336 | 1 Dos-osaka | 2 Rakuraku Pc Cloud Agent, Ss1 | 2024-11-21 | N/A | 9.8 CRITICAL |
Path traversal vulnerability in SS1 Ver.13.0.0.40 and earlier and Rakuraku PC Cloud Agent Ver.2.1.8 and earlier allows a remote attacker to upload a specially crafted file to an arbitrary directory. As a result of exploiting this vulnerability with CVE-2023-22335 and CVE-2023-22344 vulnerabilities together, it may allow a remote attacker to execute an arbitrary code with SYSTEM privileges by sending a specially crafted script to the affected device. | |||||
CVE-2023-22320 | 1 Openam | 1 Openam | 2024-11-21 | N/A | 7.5 HIGH |
OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium parses URLs improperly, leading to a path traversal vulnerability(CWE-22). Furthermore, a crafted URL may be evaluated incorrectly. |