Vulnerabilities (CVE)

Filtered by CWE-36
Total 68 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-21323 1 Microsoft 1 Defender For Iot 2024-12-05 N/A 8.8 HIGH
Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2024-51549 2024-12-05 N/A 10.0 CRITICAL
Absolute File Traversal vulnerabilities allows access and modification of un-intended resources.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
CVE-2024-11978 2024-11-29 N/A 7.5 HIGH
DreamMaker from Interinfo has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
CVE-2024-20379 1 Cisco 2 Firepower Management Center, Secure Firewall Management Center 2024-11-26 N/A 6.5 MEDIUM
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.
CVE-2024-4881 1 Lollms 1 Lollms 2024-11-21 N/A 7.5 HIGH
A path traversal vulnerability exists in the parisneo/lollms application, affecting version 9.4.0 and potentially earlier versions, but fixed in version 5.9.0. The vulnerability arises due to improper validation of file paths between Windows and Linux environments, allowing attackers to traverse beyond the intended directory and read any file on the Windows system. Specifically, the application fails to adequately sanitize file paths containing backslashes (`\`), which can be exploited to access the root directory and read, or even delete, sensitive files. This issue was discovered in the context of the `/user_infos` endpoint, where a crafted request using backslashes to reference a file (e.g., `\windows\win.ini`) could result in unauthorized file access. The impact of this vulnerability includes the potential for attackers to access sensitive information such as environment variables, database files, and configuration files, which could lead to further compromise of the system.
CVE-2024-33620 2024-11-21 N/A 8.6 HIGH
Absolute path traversal vulnerability exists in ID Link Manager and FUJITSU Software TIME CREATOR. If this vulnerability is exploited, the file contents including sensitive information on the server may be retrieved by an unauthenticated remote attacker.
CVE-2024-2548 1 Lollms 1 Lollms Web Ui 2024-11-21 N/A 7.5 HIGH
A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the `lollms_core/lollms/server/endpoints/lollms_binding_files_server.py` and `lollms_core/lollms/security.py` files. Due to inadequate validation of file paths between Windows and Linux environments using `Path(path).is_absolute()`, attackers can exploit this flaw to read any file on the system. This issue affects the latest version of LoLLMs running on the Windows platform. The vulnerability is triggered when an attacker sends a specially crafted request to the `/user_infos/{path:path}` endpoint, allowing the reading of arbitrary files, as demonstrated with the `win.ini` file. The issue has been addressed in version 9.5 of the software.
CVE-2024-29053 1 Microsoft 1 Defender For Iot 2024-11-21 N/A 8.8 HIGH
Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2024-28806 2024-11-21 N/A 7.5 HIGH
An issue was discovered in Italtel i-MCS NFV 12.1.0-20211215. Remote unauthenticated attackers can upload files at an arbitrary path.
CVE-2023-5390 1 Honeywell 4 Controledge Unit Operations Controller, Controledge Unit Operations Controller Firmware, Controledge Virtual Unit Operations Controller and 1 more 2024-11-21 N/A 5.3 MEDIUM
An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
CVE-2023-5022 1 Dedecms 1 Dedecms 2024-11-21 5.2 MEDIUM 5.5 MEDIUM
A vulnerability has been found in DedeCMS up to 5.7.100 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /include/dialog/select_templets_post.php. The manipulation of the argument activepath leads to absolute path traversal. The associated identifier of this vulnerability is VDB-239863.
CVE-2023-41830 2024-11-21 N/A 6.5 MEDIUM
An improper absolute path traversal vulnerability was reported for the Ready For application allowing a local application access to files without authorization. 
CVE-2023-3765 2 Lfprojects, Microsoft 2 Mlflow, Windows 2024-11-21 N/A 10.0 CRITICAL
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0.
CVE-2023-36786 1 Microsoft 1 Skype For Business Server 2024-11-21 N/A 7.2 HIGH
Skype for Business Remote Code Execution Vulnerability
CVE-2023-32054 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2024-11-21 N/A 7.3 HIGH
Volume Shadow Copy Elevation of Privilege Vulnerability
CVE-2023-30970 1 Palantir 2 Gotham Blackbird-witchcraft, Gotham Static-assets-servlet 2024-11-21 N/A 6.5 MEDIUM
Gotham Table service and Forward App were found to be vulnerable to a Path traversal issue allowing an authenticated user to read arbitrary files on the file system.
CVE-2023-2101 1 Mogublog Project 1 Mogublog 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A vulnerability, which was classified as problematic, has been found in moxi624 Mogu Blog v2 up to 5.2. This issue affects the function uploadPictureByUrl of the file /mogu-picture/file/uploadPicsByUrl. The manipulation of the argument urlList leads to absolute path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226109 was assigned to this vulnerability.
CVE-2023-1176 1 Lfprojects 1 Mlflow 2024-11-21 N/A 3.3 LOW
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.2.2.
CVE-2022-20958 1 Cisco 1 Broadworks Commpilot Application 2024-11-21 N/A 8.3 HIGH
A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an unauthenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]
CVE-2021-30173 1 Junhetec 1 Omnidirectional Communication System 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Local File Inclusion vulnerability of the omni-directional communication system allows remote authenticated attacker inject absolute path into Url parameter and access arbitrary file.