Vulnerabilities (CVE)

Filtered by CWE-23
Total 157 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-47769 1 Idurarapp 1 Idurar 2024-11-13 N/A 7.5 HIGH
IDURAR is open source ERP CRM accounting invoicing software. The vulnerability exists in the corePublicRouter.js file. Using the reference usage here, it is identified that the public endpoint is accessible to an unauthenticated user. The user's input is directly appended to the join statement without additional checks. This allows an attacker to send URL encoded malicious payload. The directory structure can be escaped to read system files by adding an encoded string (payload) at subpath location.
CVE-2024-10200 1 Wellchoose 1 Administrative Management System 2024-10-24 N/A 7.5 HIGH
Administrative Management System from Wellchoose has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to download arbitrary files on the server.
CVE-2024-9923 1 Teamplus 1 Team\+ Pro 2024-10-24 N/A 4.9 MEDIUM
The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with administrator privileges to move arbitrary system files to the website root directory and access them.
CVE-2024-9922 1 Teamplus 1 Team\+ Pro 2024-10-24 N/A 7.5 HIGH
The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
CVE-2024-43614 1 Microsoft 1 Defender For Endpoint 2024-10-21 N/A 5.5 MEDIUM
Microsoft Defender for Endpoint for Linux Spoofing Vulnerability
CVE-2024-45731 2 Microsoft, Splunk 2 Windows, Splunk 2024-10-17 N/A 8.0 HIGH
In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive.
CVE-2024-9983 1 Ragic 1 Enterprise Cloud Database 2024-10-16 N/A 7.5 HIGH
Enterprise Cloud Database from Ragic does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
CVE-2024-49253 2024-10-16 N/A 8.6 HIGH
Relative Path Traversal vulnerability in James Park Analyse Uploads allows Relative Path Traversal.This issue affects Analyse Uploads: from n/a through 0.5.
CVE-2024-47637 2024-10-16 N/A 8.8 HIGH
: Relative Path Traversal vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Path Traversal.This issue affects LiteSpeed Cache: from n/a through 6.4.1.
CVE-2024-47949 1 Jetbrains 1 Teamcity 2024-10-11 N/A 7.5 HIGH
In JetBrains TeamCity before 2024.07.3 path traversal allowed backup file write to arbitrary location
CVE-2024-47948 1 Jetbrains 1 Teamcity 2024-10-11 N/A 7.5 HIGH
In JetBrains TeamCity before 2024.07.3 path traversal leading to information disclosure was possible via server backups
CVE-2024-20449 1 Cisco 1 Nexus Dashboard Fabric Controller 2024-10-08 N/A 8.8 HIGH
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device. This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root.
CVE-2024-9405 2024-10-04 N/A 5.3 MEDIUM
An incorrect limitation of a path to a restricted directory (path traversal) has been detected in Pluck CMS, affecting version 4.7.18. An unauthenticated attacker could extract sensitive information from the server via the absolute path of a file located in the same directory or subdirectory as the module, but not from recursive directories.
CVE-2024-38258 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-09-13 N/A 7.5 HIGH
Windows Remote Desktop Licensing Service Information Disclosure Vulnerability
CVE-2024-43454 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-09-13 N/A 7.1 HIGH
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-7693 1 Raidenmaild 1 Raidenmaild 2024-09-06 N/A 7.5 HIGH
Raiden MAILD Remote Management System from Team Johnlong Software has a Relative Path Traversal vulnerability, allowing unauthenticated remote attackers to read arbitrary file on the remote server.
CVE-2024-43399 1 Opensecurity 1 Mobile Security Framework 2024-08-20 N/A 9.8 CRITICAL
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7.