Vulnerabilities (CVE)

Filtered by CWE-23
Total 86 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-3122 2024-07-01 N/A 4.9 MEDIUM
CHANGING Mobile One Time Password does not properly filter parameters for the file download functionality, allowing remote attackers with administrator privilege to read arbitrary file on the system.
CVE-2024-3497 2024-06-17 N/A 8.8 HIGH
Path traversal vulnerability in the web server of the Toshiba printer enables attacker to overwrite orginal files or add new ones to the printer. As for the affected products/models/versions, see the reference URL.
CVE-2024-2461 2024-06-11 N/A N/A
If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible
CVE-2024-36362 2024-05-31 N/A 6.5 MEDIUM
In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5, 2024.03.2 path traversal allowing to read files from server was possible
CVE-2024-4330 2024-05-30 N/A 4.0 MEDIUM
A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.
CVE-2023-23391 1 Microsoft 1 Office 2024-05-29 N/A 5.5 MEDIUM
Office for Android Spoofing Vulnerability
CVE-2023-23379 1 Microsoft 1 Defender For Iot 2024-05-29 N/A 7.8 HIGH
Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVE-2023-38185 1 Microsoft 1 Exchange Server 2024-05-29 N/A 8.8 HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-35359 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-05-29 N/A 7.8 HIGH
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-33144 1 Microsoft 1 Visual Studio Code 2024-05-29 N/A 6.6 MEDIUM
Visual Studio Code Spoofing Vulnerability
CVE-2024-35186 2024-05-24 N/A 8.8 HIGH
gitoxide is a pure Rust implementation of Git. During checkout, `gix-worktree-state` does not verify that paths point to locations in the working tree. A specially crafted repository can, when cloned, place new files anywhere writable by the application. This vulnerability leads to a major loss of confidentiality, integrity, and availability, but creating files outside a working tree without attempting to execute code can directly impact integrity as well. This vulnerability has been patched in version(s) 0.36.0.
CVE-2023-3941 2024-05-21 N/A 10.0 CRITICAL
Relative Path Traversal vulnerability in ZkTeco-based OEM devices allows an attacker to write any file on the system with root privileges. This issue affects ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others) with the ZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly others.
CVE-2023-3940 2024-05-21 N/A 7.5 HIGH
Relative Path Traversal vulnerability in ZkTeco-based OEM devices allows an attacker to access any file on the system. This issue affects ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others) with the ZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly others.
CVE-2023-1112 1 Drag And Drop Multiple File Uploader Pro - Contact Form 7 Project 1 Drag And Drop Multiple File Uploader Pro - Contact Form 7 2024-05-17 5.8 MEDIUM 9.8 CRITICAL
A vulnerability was found in Drag and Drop Multiple File Upload Contact Form 7 5.0.6.1. It has been classified as critical. Affected is an unknown function of the file admin-ajax.php. The manipulation of the argument upload_name leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222072.
CVE-2024-33615 2024-05-16 N/A 8.8 HIGH
A specially crafted Zip file containing path traversal characters can be imported to the CyberPower PowerPanel server, which allows file writing to the server outside the intended scope, and could allow an attacker to achieve remote code execution.
CVE-2024-30010 2024-05-14 N/A 8.8 HIGH
Windows Hyper-V Remote Code Execution Vulnerability
CVE-2024-34712 2024-05-14 N/A 6.5 MEDIUM
Oceanic is a NodeJS library for interfacing with Discord. Prior to version 1.10.4, input to functions such as `Client.rest.channels.removeBan` is not url-encoded, resulting in specially crafted input such as `../../../channels/{id}` being normalized into the url `/api/v10/channels/{id}`, and deleting a channel rather than removing a ban. Version 1.10.4 fixes this issue. Some workarounds are available. One may sanitize user input, ensuring strings are valid for the purpose they are being used for. One may also encode input with `encodeURIComponent` before providing it to the library.
CVE-2024-0549 2024-04-16 N/A 8.1 HIGH
mintplex-labs/anything-llm is vulnerable to a relative path traversal attack, allowing unauthorized attackers with a default role account to delete files and folders within the filesystem, including critical database files such as 'anythingllm.db'. The vulnerability stems from insufficient input validation and normalization in the handling of file and folder deletion requests. Successful exploitation results in the compromise of data integrity and availability.
CVE-2024-32005 2024-04-15 N/A 8.2 HIGH
NiceGUI is an easy-to-use, Python-based UI framework. A local file inclusion is present in the NiceUI leaflet component when requesting resource files under the `/_nicegui/{__version__}/resources/{key}/{path:path}` route. As a result any file on the backend filesystem which the web server has access to can be read by an attacker with access to the NiceUI leaflet website. This vulnerability has been addressed in version 1.4.21. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-3025 2024-04-10 N/A 9.9 CRITICAL
mintplex-labs/anything-llm is vulnerable to path traversal attacks due to insufficient validation of user-supplied input in the logo filename functionality. Attackers can exploit this vulnerability by manipulating the logo filename to reference files outside of the restricted directory. This can lead to unauthorized reading or deletion of files by utilizing the `/api/system/upload-logo` and `/api/system/logo` endpoints. The issue stems from the lack of filtering or validation on the logo filename, allowing attackers to target sensitive files such as the application's database.