Total
81 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-2053 | 2024-08-06 | N/A | 7.5 HIGH | ||
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user. | |||||
CVE-2024-6433 | 2024-07-12 | N/A | 7.5 HIGH | ||
The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter. | |||||
CVE-2024-5547 | 2024-07-12 | N/A | 7.5 HIGH | ||
A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory. | |||||
CVE-2024-3122 | 2024-07-01 | N/A | 4.9 MEDIUM | ||
CHANGING Mobile One Time Password does not properly filter parameters for the file download functionality, allowing remote attackers with administrator privilege to read arbitrary file on the system. | |||||
CVE-2024-3497 | 2024-06-17 | N/A | 8.8 HIGH | ||
Path traversal vulnerability in the web server of the Toshiba printer enables attacker to overwrite orginal files or add new ones to the printer. As for the affected products/models/versions, see the reference URL. | |||||
CVE-2024-2461 | 2024-06-11 | N/A | N/A | ||
If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible | |||||
CVE-2024-36362 | 2024-05-31 | N/A | 6.5 MEDIUM | ||
In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5, 2024.03.2 path traversal allowing to read files from server was possible | |||||
CVE-2024-4330 | 2024-05-30 | N/A | 4.0 MEDIUM | ||
A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file. | |||||
CVE-2023-23391 | 1 Microsoft | 1 Office | 2024-05-29 | N/A | 5.5 MEDIUM |
Office for Android Spoofing Vulnerability | |||||
CVE-2023-23379 | 1 Microsoft | 1 Defender For Iot | 2024-05-29 | N/A | 7.8 HIGH |
Microsoft Defender for IoT Elevation of Privilege Vulnerability | |||||
CVE-2023-38185 | 1 Microsoft | 1 Exchange Server | 2024-05-29 | N/A | 8.8 HIGH |
Microsoft Exchange Server Remote Code Execution Vulnerability | |||||
CVE-2023-35359 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2024-05-29 | N/A | 7.8 HIGH |
Windows Kernel Elevation of Privilege Vulnerability | |||||
CVE-2023-33144 | 1 Microsoft | 1 Visual Studio Code | 2024-05-29 | N/A | 6.6 MEDIUM |
Visual Studio Code Spoofing Vulnerability | |||||
CVE-2024-35186 | 2024-05-24 | N/A | 8.8 HIGH | ||
gitoxide is a pure Rust implementation of Git. During checkout, `gix-worktree-state` does not verify that paths point to locations in the working tree. A specially crafted repository can, when cloned, place new files anywhere writable by the application. This vulnerability leads to a major loss of confidentiality, integrity, and availability, but creating files outside a working tree without attempting to execute code can directly impact integrity as well. This vulnerability has been patched in version(s) 0.36.0. | |||||
CVE-2023-3941 | 2024-05-21 | N/A | 10.0 CRITICAL | ||
Relative Path Traversal vulnerability in ZkTeco-based OEM devices allows an attacker to write any file on the system with root privileges. This issue affects ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others) with the ZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly others. | |||||
CVE-2023-3940 | 2024-05-21 | N/A | 7.5 HIGH | ||
Relative Path Traversal vulnerability in ZkTeco-based OEM devices allows an attacker to access any file on the system. This issue affects ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others) with the ZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly others. | |||||
CVE-2024-33615 | 2024-05-16 | N/A | 8.8 HIGH | ||
A specially crafted Zip file containing path traversal characters can be imported to the CyberPower PowerPanel server, which allows file writing to the server outside the intended scope, and could allow an attacker to achieve remote code execution. | |||||
CVE-2024-34712 | 2024-05-14 | N/A | 6.5 MEDIUM | ||
Oceanic is a NodeJS library for interfacing with Discord. Prior to version 1.10.4, input to functions such as `Client.rest.channels.removeBan` is not url-encoded, resulting in specially crafted input such as `../../../channels/{id}` being normalized into the url `/api/v10/channels/{id}`, and deleting a channel rather than removing a ban. Version 1.10.4 fixes this issue. Some workarounds are available. One may sanitize user input, ensuring strings are valid for the purpose they are being used for. One may also encode input with `encodeURIComponent` before providing it to the library. | |||||
CVE-2024-30010 | 2024-05-14 | N/A | 8.8 HIGH | ||
Windows Hyper-V Remote Code Execution Vulnerability | |||||
CVE-2024-0549 | 2024-04-16 | N/A | 8.1 HIGH | ||
mintplex-labs/anything-llm is vulnerable to a relative path traversal attack, allowing unauthorized attackers with a default role account to delete files and folders within the filesystem, including critical database files such as 'anythingllm.db'. The vulnerability stems from insufficient input validation and normalization in the handling of file and folder deletion requests. Successful exploitation results in the compromise of data integrity and availability. |