Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-9939

Summary
Assigner-Wordfence
Assigner Org ID-b15e7b5b-3da4-40ae-a43c-f7aa60e62599
Published At-08 Jan, 2025 | 08:18
Updated At-08 Jan, 2025 | 14:06
Rejected At-
Credits

WordPress File Upload <= 4.24.13 - Unauthenticated Path Traversal to Arbitrary File Read in wfu_file_downloader.php

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Wordfence
Assigner Org ID:b15e7b5b-3da4-40ae-a43c-f7aa60e62599
Published At:08 Jan, 2025 | 08:18
Updated At:08 Jan, 2025 | 14:06
Rejected At:
▼CVE Numbering Authority (CNA)
WordPress File Upload <= 4.24.13 - Unauthenticated Path Traversal to Arbitrary File Read in wfu_file_downloader.php

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory.

Affected Products
Vendor
nickboss
Product
WordPress File Upload
Default Status
unaffected
Versions
Affected
  • From * through 4.24.13 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-22CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Type: CWE
CWE ID: CWE-22
Description: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
abrahack
Timeline
EventDate
Vendor Notified2024-10-14 00:00:00
Disclosed2025-01-07 00:00:00
Event: Vendor Notified
Date: 2024-10-14 00:00:00
Event: Disclosed
Date: 2025-01-07 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/threat-intel/vulnerabilities/id/5e51f301-026d-4ed7-82f8-96c1623bf95c?source=cve
N/A
https://plugins.trac.wordpress.org/changeset/3188857/wp-file-upload
N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/5e51f301-026d-4ed7-82f8-96c1623bf95c?source=cve
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/changeset/3188857/wp-file-upload
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@wordfence.com
Published At:08 Jan, 2025 | 09:15
Updated At:13 Mar, 2025 | 16:27

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

iptanus
iptanus
>>wordpress_file_upload>>Versions before 4.24.14(exclusive)
cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarysecurity@wordfence.com
CWE ID: CWE-22
Type: Primary
Source: security@wordfence.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://plugins.trac.wordpress.org/changeset/3188857/wp-file-uploadsecurity@wordfence.com
Patch
https://www.wordfence.com/threat-intel/vulnerabilities/id/5e51f301-026d-4ed7-82f8-96c1623bf95c?source=cvesecurity@wordfence.com
Third Party Advisory
Hyperlink: https://plugins.trac.wordpress.org/changeset/3188857/wp-file-upload
Source: security@wordfence.com
Resource:
Patch
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/5e51f301-026d-4ed7-82f8-96c1623bf95c?source=cve
Source: security@wordfence.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

893Records found

CVE-2023-34843
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-90.48% / 99.59%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-27 Nov, 2024 | 14:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Traggo Server 0.3.0 is vulnerable to directory traversal via a crafted GET request.

Action-Not Available
Vendor-traggon/a
Product-traggon/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-3512
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-7.5||HIGH
EPSS-0.10% / 27.36%
||
7 Day CHG~0.00%
Published-04 Oct, 2023 | 10:53
Updated-19 Sep, 2024 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Relative path traversal in Setelsa Security ConacWin CB

Relative path traversal vulnerability in Setelsa Security's ConacWin CB, in its 3.8.2.2 version and earlier, the exploitation of which could allow an attacker to perform an arbitrary download of files from the system via the "Download file" parameter.

Action-Not Available
Vendor-setelsa-securitySetelsa Security
Product-conacwinConacWin CB
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-35843
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-93.26% / 99.80%
||
7 Day CHG~0.00%
Published-19 Jun, 2023 | 00:00
Updated-12 Dec, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NocoDB through 0.106.0 (or 0.109.1) has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /download route. This vulnerability could allow an attacker to access sensitive files and data on the server, including configuration files, source code, and other sensitive information.

Action-Not Available
Vendor-nocodbn/a
Product-nocodbn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-33756
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.55% / 66.77%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 00:00
Updated-15 Oct, 2024 | 18:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the SpreadSheetPlugin component of Foswiki v2.1.7 and below allows attackers to execute a directory traversal.

Action-Not Available
Vendor-foswikin/a
Product-foswikin/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-33510
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-72.30% / 98.70%
||
7 Day CHG~0.00%
Published-07 Jun, 2023 | 00:00
Updated-07 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters.

Action-Not Available
Vendor-jeecg_p3_biz_chat_projectn/a
Product-jeecg_p3_biz_chatn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2023-34407
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.89% / 74.59%
||
7 Day CHG~0.00%
Published-05 Jun, 2023 | 00:00
Updated-08 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OfflinePlayerService.exe in Harbinger Offline Player 4.0.6.0.2 allows directory traversal as LocalSystem via ..\ in a URL.

Action-Not Available
Vendor-harbingergroupn/a
Product-office_playern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-1565
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.97%
||
7 Day CHG+0.02%
Published-25 Apr, 2025 | 09:21
Updated-29 Apr, 2025 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mayosis Core <= 5.4.1 - Unauthenticated Arbitrary File Read

The Mayosis Core plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.4.1 via the library/wave-audio/peaks/remote_dl.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

Action-Not Available
Vendor-TeconceTheme
Product-Mayosis Core
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-33411
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.33% / 79.15%
||
7 Day CHG~0.00%
Published-07 Dec, 2023 | 00:00
Updated-26 Nov, 2024 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A web server in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions up to 3.17.02, allows remote unauthenticated users to perform directory traversal, potentially disclosing sensitive information.

Action-Not Available
Vendor-supermicron/a
Product-x11swn-h_firmwarex11sdd-18c-fx12dpfr-an6x11sba-ln4f_firmwarex11sdv-16c-tp8fx11spw-ctfc9x299-pg300_firmwarex12spt-gc_firmwarex11sdw-4c-tp13f\+b12spe-cpu-25gx13dsf-a_firmwarex11sdv-4c-tp8f-01_firmwarex11sdv-16c-tln2f_firmwarex13sefr-a_firmwarec9x299-rpgf_firmwarex11ssn-e-001m11sdv-8c-ln4f_firmwarex11dpi-n_firmwarex11saah12ssl-cx12dgu_firmwarex13dei-t_firmwarex13san-c-wohsx13set-gc_firmwarex12stw-tfx11opi-cpuh13ssw_firmwareh12ssff-an6_firmwareh13ssl-n_firmwarex11sca-wx11qph\+_firmwarex13sae_firmwarex12sth-fx11sds-12ch13sra-tf_firmwarex12dpl-i6x11sse-fx11spm-fx13deg-oadx11ssn-l-001_firmwarex11sdv-16c-tp8f_firmwareh12ssl-ntx11sdw-12c-tp13fx11sph-nctfb12dpt-6_firmwarex12spg-nf_firmwarex11dpd-lx12dgq-rx12sca-5f_firmwarex12stn-c_firmwarex11scm-ln8f_firmwarex11ssv-m4f_firmwarex11sse-f_firmwarex11ssz-tln4fx11sdv-8c-tp8f_firmwarex13saqh12dsg-o-cpu_firmwarex12sdv-8c-sp6f_firmwarex12spw-fx12dpg-u6_firmwarex11ddw-nt_firmwarex11dpt-bhx13san-l-wohs_firmwarex11dsn-ts_firmwarem11sdv-8c\+-ln4fh12dsi-nt6x11dpi-ntx12scz-tln4f_firmwareh13svw-n_firmwarex11dpuh12dgo-6x12dpt-b6x11sdw-16c-tp13f\+x12sdv-8c-spt4f_firmwarex13san-lx13seed-f_firmwarex11dpi-nt_firmwarex11ssw-4tf_firmwarex12dpg-arx11sds-16c_firmwarex12sdv-16c-spt8f_firmwarex13swa-tf_firmwarex11sae_firmwarex11sdv-8c\+-tln2fx13dgu_firmwarex12spo-ntf_firmwarex11dpfr-sc9x299-pgf-lc9x299-rpgf-l_firmwarex12stn-h_firmwarex11scq-lx12spt-pt_firmwarex11sdw-4c-tp13f\+_firmwareh13sst-gch12ssw-inlx13sem-fx11ssl-nfx11scv-q_firmwareh13dsg-o-cpu-dx12stl-if_firmwarex13sedw-f_firmwarex11san_firmwarex11sph-nctf_firmwareh12dsi-n6_firmwarex11sae-fx12stw-fx11spi-tf_firmwarex12sca-f_firmwarex11sdv-12c-tp8f_firmwareb13deeh13ssl-nx12qch\+_firmwarec9x299-pg_firmwareh12dsg-o-cpux11dsn-tsqx11dpt-psx11ssqx11dpu-xll_firmwareb13segx11sch-ln4f_firmwarex11dph-i_firmwarex12dgo-6_firmwarex11dscx11ssmc9x299-pgf_firmwarex12dpt-pt46x11dgo-t_firmwarex13det-b_firmwarex12spg-nfx12dpg-qbt6x12spl-ln4f_firmwarex11sba-ln4fh12ssl-c_firmwarex11sdw-14c-tp13f_firmwarex12dai-n6_firmwareh13sra-fx12sth-ln4fx11sds-8c_firmwarex12stn-e_firmwarex11dai-nx12sdv-10c-sp6f_firmwarex11sri-if_firmwarex11scl-ifx11sdv-12c-tln2f_firmwarex11sdd-8c-fh12ssw-ntx12dpg-oa6-gd2_firmwarex11srm-vf_firmwareh13ssfx11dpff-snrx11sdw-14cn-tp13f\+_firmwarem11sdv-4ct-ln4fx12sth-sys_firmwarex13qeh\+_firmwarex13san-h_firmwarex12spi-tf_firmwarex11satx11spg-tf_firmwarex12sca-fh12ssw-in_firmwarex11sdv-4c-tln2fx11ssh-ln4f_firmwareh12ssff-an6x11dpu-xllx13det-bh12ssw-an6_firmwareh12ssl-ct_firmwarex11ssw-tfx11ssn-l-vdcx11sdc-16cx11ssn-e-wohsh12ssw-inx11swn-c-wohs_firmwarex11swn-l-wohs_firmwareh13svw-ntx12dgux12stn-h-wohs_firmwarex11dpff-sn_firmwareh12dgq-nt6_firmwarex11sdv-12c-tp8fx13sew-fx12sae_firmwarex11sdd-18c-f_firmwarec9x299-pg300f_firmwareh13ssl-nt_firmwarex13sei-tfx11dpl-i_firmwarex11opi-cpu_firmwarex13deg-pvcx11ssn-h-wohsx12dpd-a6m25_firmwarex12dsc-6x12ste-f_firmwarex11scz-q_firmwarex12spz-ln4f_firmwarex11ssw-4tfx13saz-q_firmwarex12ddw-a6_firmwarex12stl-fx11sch-f_firmwarex11sdw-14cnt-tp13f_firmwarex13san-cx12spo-fx11scz-f_firmwareh12ssw-ntlm11sdv-8ct-ln4fh13dsh_firmwarex11sdw-14cn-tp13f\+x11saex11srm-fc9x299-rpgf-lx11sdw-16c-tp13fx11dpu-rx11spm-tpfx13sei-f_firmwarex11dpt-brb12dpe-6x12scv-wx11dsf-e_firmwarem11sdv-8c-ln4fx11ssw-fx11sca-f_firmwarex11sdc-8c_firmwarex13dai-tx13sew-tf_firmwarex13set-gcx13deg-pvc_firmwarex12scv-lvds_firmwarex12stn-c-wohsx11scw-f_firmwarex11sdw-16c-tp13f_firmwarex13seed-sf_firmwarex12dpl-nt6x11sds-14cx12stl-f_firmwarex11sch-ln4fx11swn-h-wohs_firmwarex13sra-tfx11ssh-ctfx11swn-l-wohsx11san-wohs_firmwarex11scz-fh12ssl-i_firmwarec9x299-pgb13seg_firmwareh13svw-nt_firmwarex12spt-gx11dac_firmwarex12dpg-oa6h12sst-psx11sra-rfx11ssh-gf-1585lx11ssn-ex11scl-ln4fx11dpt-lx11sdc-8cx11swn-c-wohsx11dpff-snx11sat-fh12dsu-in_firmwarex11ssz-tln4f_firmwarex11sdv-4c-tln2f_firmwarex11dpd-m25x11ssl-cf_firmwarex11sat-f_firmwarex11scq_firmwarex11spa-tf_firmwarex11ssl-cfx11dgq_firmwarex11spw-ctf_firmwareh13sae-mfh13sshx13dem_firmwarex12stn-hx11dsf-ex13sav-lvdsx11scl-f_firmwarex11sdw-4c-tp13f_firmwareh13sra-tfx12spt-ptx11dph-tqx12qch\+m11sdv-4c-ln4f_firmwarex11ssz-fx12spm-tf_firmwareh13ssl-nth13sst-gh12dst-b_firmwarex12sdv-4c-spt4fx12dpu-6_firmwarex11sba-fx11scv-lx12stn-l-wohsx12spw-f_firmwarex11ssd-fx11ssv-q_firmwarex11spw-tf_firmwarex12spm-ln6tf_firmwarex11dsc\+x13sew-f_firmwarex13san-c_firmwarex12sdv-10c-spt4f_firmwarex13dehx12spl-ln4fx11ssv-lvdsx12stn-l_firmwarex12stn-c-wohs_firmwarex11dpu-vx11dpi-nx12dpi-nt6_firmwarex11swn-e_firmwarex12dpg-qbt6_firmwarex11ssl-fx11dpfr-s_firmwarex11sdv-4c-tp8fh12ssw-ntr_firmwarex11ssm_firmwareh13svw-nx11ssn-h_firmwarex11spa-tfx12dhm-6x13srn-ex11ssq_firmwarex11swn-e-wohsc9x299-pgf-l_firmwareh13sra-f_firmwarex13srn-hx12dpg-oa6_firmwarex12sdv-4c-spt8fx12scq_firmwarex11scm-ln8fx11spd-f_firmwarex11san-wohsx13dgux12std-f_firmwareh12ssw-an6x12std-fx11spw-tfx13deix11ssv-qx11ssw-tf_firmwarex11sri-ifx13srn-h_firmwarec9x299-pg300x13sei-fx11srm-f_firmwarex12sdv-20c-spt8f_firmwarex13sedw-fx11ddw-ntx11ssh-gf-1585_firmwarex11dpt-bh_firmwarex11dpx-tx13set-gx11dpl-ix11dpt-l_firmwarex12dpi-n6_firmwarex11ssh-gtf-1585_firmwareh13srd-f_firmwarex12dpg-oa6-gd2x11ssz-f_firmwarex12dpu-6x12stn-h-wohsx13saz-qb13det_firmwarex11scl-if_firmwarex12sdv-14c-spt8fh12dgo-6_firmwareh12dsi-nt6_firmwarex11dph-t_firmwarex11scm-fx11dpg-ot-cpu_firmwarex12stl-ifx11ssn-h-001x12spw-tfx12scz-f_firmwarex12sae-5_firmwarex11ssh-gtf-1585l_firmwarex12spi-tfx11sdv-16c\+-tln2fx13saex11dpu-r_firmwarex11sdv-4c-tp8f_firmwarex11scd-fx11ssn-e-vdc_firmwarex11sdv-16c-tln2fx13dei_firmwarex12spm-ln4fx11sdv-8c-tln2fx11ssl-nf_firmwarex11scax11scd-f_firmwarex12scqx12sdv-20c-spt8fx11sds-12c_firmwarex11srl-fx13srn-e_firmwareh12dsu-inr_firmwareh12ssg-an6x11scl-ln4f_firmwarec9x299-pgfx11dph-tx11dpu-ze\+_firmwarex11ssz-qf_firmwarex11ssn-l-wohs_firmwarex11sds-14c_firmwarex11sdw-8c-tp13fx11swn-lx12sae-5x12spz-ln4fx12spz-spln6f_firmwarex12dpd-a6m25x11ssh-gtf-1585x12spa-tfx12spa-tf_firmwarex11swn-cx11dach12ssl-ix11ssn-hx11ssn-l_firmwarex11sra_firmwareh13srd-fx11dpu-z\+h12ssw-ntl_firmwarex11opi-cpu-cl_firmwarex12stn-l-wohs_firmwarex11dpg-hgx2_firmwarex12spo-ntfx13seed-sfx11ssn-l-wohsx11swn-ex12sth-ln4f_firmwarex11ssh-tf_firmwarex13seed-fx11ssn-lx12dpt-b6_firmwarex11swn-e-wohs_firmwarex13san-e-wohs_firmwareh12ssg-anp6_firmwarex11sds-16cx11ssn-l-vdc_firmwarex11sae-mx11dpt-ps_firmwareh13dsg-o-cpu-d_firmwarex12dai-n6x12sdv-14c-spt8f_firmwarex11dai-n_firmwarex11sce-fx11ssn-e-001_firmwarex11ddw-lx11sdv-8c-tp8fh12ssw-ntrx11sdc-16c_firmwarex13sae-fx11dgqx11ssi-ln4f_firmwarex13deg-oa_firmwarex12ste-fx13swa-tfx11ssa-f_firmwarex11sdw-8c-tp13f_firmwarex11ssv-m4x11dps-re_firmwarex11dsn-tsq_firmwarex12sdv-8ce-sp4fx11dph-ib12dpe-6_firmwarex11dpt-bx11dpu_firmwarec9x299-rpgfh13ssh_firmwarex11spg-tfx13deh_firmwarex13ddw-a_firmwarex13sae-f_firmwarex11spm-tfh12ssw-nt_firmwarex11ssn-h-vdcx11ssz-qfh13sae-mf_firmwarex12dhm-6_firmwarex11sch-fx11ssa-fx12dgo-6x11srax12dpg-u6x11ssh-f_firmwarex12spm-ln4f_firmwarex11sra-rf_firmwareb13see-cpu-25g_firmwareh13sst-gc_firmwarex12spt-gch12ssg-anp6x12sth-sysx11srm-vfx11swn-hx12dpg-qrx12dsc-6_firmwareh12sst-ps_firmwarex11dpd-m25_firmwarex12stn-lx11sdw-14cnt-tp13fx11ssv-lvds_firmwarex11sdc-4c_firmwarex12scv-w_firmwarex13san-l-wohsx11ssl_firmwarex11dpg-ot-cpuh13sswx12dpg-qt6_firmwarex12dpg-qt6h12dsu-inrx11sdv-4c-tp8f-01x11srl-f_firmwarem11sdv-8c\+-ln4f_firmwareb13dee_firmwarex11scm-f_firmwarex13dei-tx12stn-e-wohsx11spa-t_firmwarex11sdw-4c-tp13fx12scz-qf_firmwarex11ssm-f_firmwarex11sdc-4cx12dpl-i6_firmwarex11ssv-m4fx11swn-l_firmwarex11swn-c_firmwarex13saq_firmwarex11dpfr-snx11ssh-fx12scz-tln4fx12sped-f_firmwarex11dpt-br_firmwarex11scqx12dpg-ar_firmwarex11sds-8cx11ssq-l_firmwarex11sslx12sdv-16c-spt8fh12ssw-inl_firmwarex11ssv-m4_firmwarex13san-h-wohs_firmwareh12dsi-n6h12ssl-nt_firmwarex11ssh-tfx11ssq-lx12spz-spln6fh13dsg-om_firmwarex11dpu-z\+_firmwarex11dpg-qtx11ssn-l-001h12dgq-nt6x11sca_firmwarex11dpff-snr_firmwarex11spm-f_firmwarex13san-h-wohsx11sdv-8c\+-tln2f_firmwarem11sdv-4ct-ln4f_firmwarex11scw-fx11ssn-h-001_firmwarex12spo-f_firmwareh13sst-g_firmwarex11dpu-ze\+x13deg-oad_firmwarec9x299-pg300fx12sdv-10c-spt4fx13san-hx11dph-tq_firmwarex12ddw-a6h12ssl-ctx11qph\+x13sem-f_firmwarex11spa-tx13san-e_firmwarex12scz-fx11ssn-e-wohs_firmwarex12sped-fx13sei-tf_firmwarex12scv-lvdsh12ssw-inr_firmwarex11dgo-tx12stw-f_firmwarex13srn-h-wohsx12stn-e-wohs_firmwarex11opi-cpu-clx11dpx-t_firmwareh13dsg-o-cpu_firmwarex12sdv-8c-spt8f_firmwarex12sca-5fh13ssf_firmwarex11sae-m_firmwarex13sem-tfx11dsc_firmwarex11dsc\+_firmwarex11sdv-8c-tln2f_firmwarex11sdw-12c-tp13f_firmwarex11sra-f_firmwarex11spm-tpf_firmwarex11qpl_firmwarex12sdv-4c-sp6f_firmwarex11sca-w_firmwarex11spl-fx11spm-tf_firmwarem11sdv-4c-ln4fx11dpg-qt_firmwarex11ddw-l_firmwarex12sdv-8c-spt8fx12dgq-r_firmwarex11qplx11dpfr-sn_firmwarex11sdd-8c-f_firmwarex12stn-cx11saa_firmwarex11ssn-h-wohs_firmwarex13ddw-ax11sae-f_firmwareh12dsg-q-cpu6x11ssn-h-vdc_firmwareh12dsu-inx12dpt-pt6_firmwarex13set-g_firmwarex12dpt-pt6x11sdv-12c-tln2fx11ssm-fh13dsg-omx11spl-f_firmwarex13demx13dsf-ah13dsg-o-cpux13saz-f_firmwarex11dps-rex11scq-l_firmwarex11scl-fh12dsg-q-cpu6_firmwarex13srn-e-wohs_firmwarex12sdv-4c-spt4f_firmwarex12spt-g_firmwarex13dai-t_firmwarex12dpg-qr_firmwareh12ssw-inrx13sav-psx11ssh-ctf_firmwarex13sra-tf_firmwarex11dpg-hgx2x11ssi-ln4fx11dsn-tsx11sdw-14c-tp13fx12sdv-8c-sp6fx13deg-qtx12dpl-nt6_firmwarex11ssd-f_firmwareb12spe-cpu-25g_firmwareh12ssg-an6_firmwarex11ssl-f_firmwarex13san-ex12spm-tfx13srn-h-wohs_firmwarex12sth-f_firmwarex12sdv-8c-spt4fx11ssn-e_firmwareh13dshx11dpd-l_firmwareh12ssfr-an6x13sefr-ax13san-e-wohsx13deg-qt_firmwarex13deg-oax11spd-fx12sdv-8ce-sp4f_firmwarex11scz-qx12sdv-4c-sp6fb13detx13sav-lvds_firmwarex12stw-tf_firmwarex11dpg-snx11ssh-gf-1585h12dst-bx11sce-f_firmwareh12ssfr-an6_firmwarex13sew-tfx11ssw-f_firmwarex11swn-h-wohsx13sem-tf_firmwarex11sph-nctpf_firmwareb12dpt-6x12spl-fx11sdv-16c\+-tln2f_firmwarex11ssn-e-vdcx12saex11dpt-b_firmwarem11sdv-8ct-ln4f_firmwarex11sba-f_firmwarex12dpt-pt46_firmwarex11scv-qx11ssh-ln4fx13san-c-wohs_firmwarex13saz-fx11sdw-16c-tp13f\+_firmwarex11sca-fx11spi-tfx12sdv-10c-sp6fx11sra-fx12sdv-4c-spt8f_firmwarex12spm-ln6tfx11dpg-sn_firmwarex13san-l_firmwarex11sanx12stn-ex12scz-qfb13see-cpu-25gx12dpi-n6x11scv-l_firmwarex12spl-f_firmwarex11sat_firmwarex11sph-nctpfx11ssh-gtf-1585lx12dpi-nt6x13srn-e-wohsx12spw-tf_firmwarex12dpfr-an6_firmwarex11ssh-gf-1585l_firmwarex11dpu-v_firmwarex13qeh\+x13sav-ps_firmwaren/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-3241
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-3.5||LOW
EPSS-0.11% / 29.82%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 09:00
Updated-02 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OTCMS path traversal

A vulnerability was found in OTCMS up to 6.62 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/read.php?mudi=announContent. The manipulation of the argument url leads to path traversal. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231512.

Action-Not Available
Vendor-otcmsn/a
Product-otcmsOTCMS
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-48931
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.40% / 59.87%
||
7 Day CHG~0.00%
Published-24 Oct, 2024 | 20:49
Updated-06 Nov, 2024 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZimaOS Arbitrary File Read via Parameter Manipulation

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http://<Zima_Server_IP:PORT>/v3/file?token=<token>&files=<file_path>` is vulnerable to arbitrary file reading due to improper input validation. By manipulating the `files` parameter, authenticated users can read sensitive system files, including `/etc/shadow`, which contains password hashes for all users. This vulnerability exposes critical system data and poses a high risk for privilege escalation or system compromise. The vulnerability occurs because the API endpoint does not validate or restrict file paths provided via the `files` parameter. An attacker can exploit this by manipulating the file path to access sensitive files outside the intended directory. As of time of publication, no known patched versions are available.

Action-Not Available
Vendor-zimaspaceIceWhaleTechicewhaletech
Product-zimaosZimaOSzimaos
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-32756
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.46%
||
7 Day CHG~0.00%
Published-25 Aug, 2023 | 07:14
Updated-02 Oct, 2024 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
e-Excellence U-Office Force - Path Traversal

e-Excellence U-Office Force has a path traversal vulnerability within its file uploading and downloading functions. An unauthenticated remote attacker can exploit this vulnerability to read arbitrary system files, but can’t control system or disrupt service.

Action-Not Available
Vendor-edetwe-Excellence
Product-u-office_forceU-Office Force
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-32309
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-4.50% / 88.70%
||
7 Day CHG~0.00%
Published-15 May, 2023 | 20:42
Updated-22 Jan, 2025 | 21:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary file inclusion with the pymdowm-snippets extension

PyMdown Extensions is a set of extensions for the `Python-Markdown` markdown project. In affected versions an arbitrary file read is possible when using include file syntax. By using the syntax `--8<--"/etc/passwd"` or `--8<--"/proc/self/environ"` the content of these files will be rendered in the generated documentation. Additionally, a path relative to a specified, allowed base path can also be used to render the content of a file outside the specified base paths: `--8<-- "../../../../etc/passwd"`. Within the Snippets extension, there exists a `base_path` option but the implementation is vulnerable to Directory Traversal. The vulnerable section exists in `get_snippet_path(self, path)` lines 155 to 174 in snippets.py. Any readable file on the host where the plugin is executing may have its content exposed. This can impact any use of Snippets that exposes the use of Snippets to external users. It is never recommended to use Snippets to process user-facing, dynamic content. It is designed to process known content on the backend under the control of the host, but if someone were to accidentally enable it for user-facing content, undesired information could be exposed. This issue has been addressed in version 10.0. Users are advised to upgrade. Users unable to upgrade may restrict relative paths by filtering input.

Action-Not Available
Vendor-pymdown_extensions_projectfacelessuser
Product-pymdown_extensionspymdown-extensions
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-9935
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-92.81% / 99.75%
||
7 Day CHG~0.00%
Published-16 Nov, 2024 | 03:20
Updated-19 Nov, 2024 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download

The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5 via the rtw_pgaepb_dwnld_pdf() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

Action-Not Available
Vendor-redefiningthewebredefiningtheweb
Product-PDF Generator Addon for Elementor Page Builderpdf_generator_addon_for_elementor_page_builder
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-30196
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.12%
||
7 Day CHG~0.00%
Published-30 May, 2023 | 00:00
Updated-13 Jan, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Prestashop salesbooster <= 1.10.4 is vulnerable to Incorrect Access Control via modules/salesbooster/downloads/download.php.

Action-Not Available
Vendor-webbaxn/a
Product-salesboostern/a
CWE ID-CWE-346
Origin Validation Error
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-30380
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.66% / 70.24%
||
7 Day CHG~0.00%
Published-27 Apr, 2023 | 00:00
Updated-31 Jan, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the component /dialog/select_media.php of DedeCMS v5.7.107 allows attackers to execute a directory traversal.

Action-Not Available
Vendor-n/aDedeCMS
Product-dedecmsn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-9983
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.40% / 60.20%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 08:12
Updated-16 Oct, 2024 | 22:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ragic Enterprise Cloud Database - Arbitrary File Read through Path Traversal

Enterprise Cloud Database from Ragic does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.

Action-Not Available
Vendor-Ragic Corporation
Product-enterprise_cloud_databaseEnterprise Cloud Databaseenterprise_cloud_database
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-30198
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.01% / 89.31%
||
7 Day CHG~0.00%
Published-12 Jun, 2023 | 00:00
Updated-06 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Prestashop winbizpayment <= 1.0.2 is vulnerable to Incorrect Access Control via modules/winbizpayment/downloads/download.php.

Action-Not Available
Vendor-webbaxn/a
Product-winbizpaymentn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-30199
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 29.20%
||
7 Day CHG~0.00%
Published-19 May, 2023 | 00:00
Updated-21 Jan, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Prestashop customexporter <= 1.7.20 is vulnerable to Incorrect Access Control via modules/customexporter/downloads/download.php.

Action-Not Available
Vendor-webbaxn/a
Product-customexportern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-28465
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.55% / 66.97%
||
7 Day CHG~0.00%
Published-12 Dec, 2023 | 00:00
Updated-27 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The package-decompression feature in HL7 (Health Level 7) FHIR Core Libraries before 5.6.106 allows attackers to copy arbitrary files to certain directories via directory traversal, if an allowed directory name is a substring of the directory name chosen by the attacker. NOTE: this issue exists because of an incomplete fix for CVE-2023-24057.

Action-Not Available
Vendor-hapifhirn/a
Product-hl7_fhir_coren/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-41163
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-17.77% / 94.87%
||
7 Day CHG~0.00%
Published-03 Oct, 2024 | 15:16
Updated-18 Dec, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A directory traversal vulnerability exists in the archive functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-veertuVeertuveertu
Product-anka_build_cloudAnka Buildanka_build
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-8752
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.3||CRITICAL
EPSS-86.07% / 99.35%
||
7 Day CHG~0.00%
Published-16 Sep, 2024 | 15:42
Updated-20 Sep, 2024 | 22:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WebIQ 2.15.9 Runtime on Windows - Directory Traversal Vulnerability

The Windows version of WebIQ 2.15.9 is affected by a directory traversal vulnerability that allows remote attackers to read any file on the system.

Action-Not Available
Vendor-smart-hmiSmart HMIbeijerelectronicsMicrosoft Corporation
Product-webiqwindowsWebIQwebiq
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-27640
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-76.83% / 98.91%
||
7 Day CHG~0.00%
Published-01 Jun, 2023 | 00:00
Updated-08 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the tshirtecommerce (aka Custom Product Designer) component 2.1.4 for PrestaShop. An HTTP request can be forged with the POST parameter type in the /tshirtecommerce/fonts.php endpoint, to allow a remote attacker to traverse directories on the system in order to open files (without restriction on the extension and path). The content of the file is returned with base64 encoding. This is exploited in the wild in March 2023.

Action-Not Available
Vendor-tshirtecommercen/a
Product-custom_product_designern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-45845
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 12.00%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 00:00
Updated-12 Sep, 2024 | 20:15
Rejected-12 Sep, 2024 | 00:00
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DO NOT USE THIS CVE RECORD. Consult IDs: CVE-2024-45593. Reason: This record is a reservation duplicate of CVE-2024-45593. Notes: All CVE users should reference CVE-2024-45593 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.

Action-Not Available
Vendor-nix
Product-nix
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-4779
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.62%
||
7 Day CHG~0.00%
Published-28 Dec, 2022 | 14:20
Updated-10 Apr, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
authentication bypass in elvexys StreamX using StreamView HTML component with public web server feature

StreamX applications from versions 6.02.01 to 6.04.34 are affected by a logic bug that allows to bypass the implemented authentication scheme. StreamX applications using StreamView HTML component with the public web server feature activated are affected.

Action-Not Available
Vendor-elvexyselvexys
Product-streamxStreamX
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-48483
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.11%
||
7 Day CHG~0.00%
Published-02 May, 2023 | 00:00
Updated-30 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005.

Action-Not Available
Vendor-3cxn/a
Product-3cxn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-47747
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.97%
||
7 Day CHG~0.00%
Published-20 Jan, 2023 | 00:00
Updated-03 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

kraken <= 0.1.4 has an arbitrary file read vulnerability via the component testfs.

Action-Not Available
Vendor-ubern/a
Product-krakenn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-8941
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-7.5||HIGH
EPSS-0.57% / 67.51%
||
7 Day CHG~0.00%
Published-24 Sep, 2024 | 11:50
Updated-26 Sep, 2024 | 13:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path Traversal vulnerability on Scriptcase

Path traversal vulnerability in Scriptcase version 9.4.019, in /scriptcase/devel/compat/nm_edit_php_edit.php (in the “subpage” parameter), which allows unauthenticated remote users to bypass SecurityManager's intended restrictions and list and/or read a parent directory via a “/...” or directly into a path used in the POST parameter “field_file” by a web application.

Action-Not Available
Vendor-Scriptcasescriptcase
Product-Scriptcasescriptcase
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-48482
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.58% / 68.00%
||
7 Day CHG~0.00%
Published-02 May, 2023 | 00:00
Updated-30 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

3CX before 18 Update 2 Security Hotfix build 18.0.2.315 on Windows allows unauthenticated remote attackers to read certain files via /Electron/download directory traversal. Files may have credentials, full backups, call recordings, and chat logs.

Action-Not Available
Vendor-3cxn/aMicrosoft Corporation
Product-3cxwindowsn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-46420
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.32% / 88.46%
||
7 Day CHG~0.00%
Published-27 Apr, 2022 | 10:37
Updated-04 Aug, 2024 | 05:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Franklin Fueling Systems FFS TS-550 evo 2.23.4.8936 is affected by an unauthenticated directory traversal vulnerability, which allows an attacker to obtain sensitive information.

Action-Not Available
Vendor-franklinfuelingn/a
Product-ts-550_evots-550_evo_firmwaren/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-7926
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.26% / 49.29%
||
7 Day CHG~0.00%
Published-19 Aug, 2024 | 19:31
Updated-04 Sep, 2024 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZZCMS about_edit.php path traversal

A vulnerability classified as critical has been found in ZZCMS 2023. Affected is an unknown function of the file /admin/about_edit.php?action=modify. The manipulation of the argument skin leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-zzcmsn/azzcms
Product-zzcmsZZCMSzzcms
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-8409
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-1.09% / 77.10%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 14:31
Updated-05 Sep, 2024 | 14:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ABCD ABCD2 show_image.php path traversal

A vulnerability classified as problematic has been found in ABCD ABCD2 up to 2.2.0-beta-1. This affects an unknown part of the file /common/show_image.php. The manipulation of the argument image leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-abcd-communityABCDabcd
Product-abcdABCD2abcd2
CWE ID-CWE-24
Path Traversal: '../filedir'
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-7928
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-90.64% / 99.60%
||
7 Day CHG~0.00%
Published-19 Aug, 2024 | 21:31
Updated-13 Sep, 2024 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FastAdmin lang path traversal

A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.

Action-Not Available
Vendor-fastadminn/afastadmin
Product-fastadminFastAdminfastadmin
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-7924
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.66% / 70.26%
||
7 Day CHG~0.00%
Published-19 Aug, 2024 | 18:00
Updated-21 Aug, 2024 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZZCMS list.php path traversal

A vulnerability was found in ZZCMS 2023. It has been declared as critical. This vulnerability affects unknown code of the file /I/list.php. The manipulation of the argument skin leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-zzcmsn/azzcms
Product-zzcmsZZCMSzzcms
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-7927
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.26% / 49.29%
||
7 Day CHG~0.00%
Published-19 Aug, 2024 | 20:00
Updated-04 Sep, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZZCMS class.php path traversal

A vulnerability classified as critical was found in ZZCMS 2023. Affected by this vulnerability is an unknown functionality of the file /admin/class.php?dowhat=modifyclass. The manipulation of the argument skin[] leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-zzcmsn/azzcms
Product-zzcmsZZCMSzzcms
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-46639
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.28% / 51.27%
||
7 Day CHG~0.00%
Published-23 Jan, 2023 | 00:00
Updated-03 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the descarga_etiqueta.php component of Correos Prestashop 1.7.x allows attackers to execute a directory traversal.

Action-Not Available
Vendor-correosn/a
Product-correosn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-37728
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.21%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 00:00
Updated-11 Sep, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arbitrary File Read vulnerability in Xi'an Daxi Information Technology Co., Ltd OfficeWeb365 v.7.18.23.0 and v8.6.1.0 allows a remote attacker to obtain sensitive information via the "Pic/Indexes" interface

Action-Not Available
Vendor-n/aofficeweb365
Product-n/aofficeweb365
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2024-7962
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.13%
||
7 Day CHG+0.03%
Published-29 Oct, 2024 | 12:47
Updated-01 Nov, 2024 | 14:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary File Read via Insufficient Validation in gaizhenbiao/chuanhuchatgpt

An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for the first line, every other line must contain commas. This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials.

Action-Not Available
Vendor-gaizhenbiaogaizhenbiaogaizhenbiao
Product-chuanhuchatgptgaizhenbiao/chuanhuchatgptgaizhenbiao\/chuanhuchatgpt
CWE ID-CWE-29
Path Traversal: '\..\filename'
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-46835
Matching Score-4
Assigner-SailPoint Technologies
ShareView Details
Matching Score-4
Assigner-SailPoint Technologies
CVSS Score-8.8||HIGH
EPSS-0.76% / 72.37%
||
7 Day CHG~0.00%
Published-31 Jan, 2023 | 00:00
Updated-27 Mar, 2025 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SailPoint IdentityIQ JavaServer File Path Traversal Vulnerability

IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p2, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p5, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6 allow access to arbitrary files in the application server filesystem due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950.

Action-Not Available
Vendor-sailpointSailPoint
Product-identityiqIdentityIQ
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-7609
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-9.2||CRITICAL
EPSS-0.25% / 48.37%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 11:38
Updated-23 Sep, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Directory Traversal in Vidco Software's VOC TESTER

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Vidco Software VOC TESTER allows Path Traversal.This issue affects VOC TESTER: before 12.34.8.

Action-Not Available
Vendor-vidcoVidco Software
Product-voc_testerVOC TESTER
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-46902
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.08% / 24.69%
||
7 Day CHG~0.00%
Published-25 Jul, 2023 | 00:00
Updated-30 Oct, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is a Path Traversal for an Unzip operation. The Vocera Report Console contains a websocket function that allows for the restoration of the database from a ZIP archive that expects a SQL import file. During the unzip operation, the code takes file paths from the ZIP archive and writes them to a Vocera temporary directory. Unfortunately, the code does not properly check if the file paths include directory traversal payloads that would escape the intended destination.

Action-Not Available
Vendor-voceran/a
Product-report_servervoice_servern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-47501
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-83.49% / 99.23%
||
7 Day CHG~0.00%
Published-14 Apr, 2023 | 15:01
Updated-13 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache OFBiz: Arbitrary file reading vulnerability

Arbitrary file reading vulnerability in Apache Software Foundation Apache OFBiz when using the Solr plugin. This is a  pre-authentication attack. This issue affects Apache OFBiz: before 18.12.07.

Action-Not Available
Vendor-The Apache Software Foundation
Product-ofbizApache OFBizofbiz
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-6648
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-8.7||HIGH
EPSS-0.10% / 28.03%
||
7 Day CHG~0.00%
Published-08 May, 2025 | 12:16
Updated-13 May, 2025 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path Traversal in AP Page Builder

Absolute Path Traversal vulnerability in AP Page Builder versions prior to 4.0.0 could allow an unauthenticated remote user to modify the 'product_item_path' within the 'config' JSON file, allowing them to read any file on the system.

Action-Not Available
Vendor-apollothemeApollo Theme
Product-ap_pagebuilderAP Page Builder
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-6781
Matching Score-4
Assigner-STAR Labs SG Pte. Ltd.
ShareView Details
Matching Score-4
Assigner-STAR Labs SG Pte. Ltd.
CVSS Score-7.5||HIGH
EPSS-93.62% / 99.83%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 03:38
Updated-19 Aug, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Calibre Arbitrary File Read

Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.

Action-Not Available
Vendor-calibre-ebookCalibrecalibre
Product-calibreCalibrecalibre
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-6445
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-10||CRITICAL
EPSS-0.25% / 48.37%
||
7 Day CHG~0.00%
Published-06 Sep, 2024 | 13:33
Updated-12 Sep, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticated Local File Inclusion (LFI) in DataFlowX's DataDiodeX

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DataFlowX Technology DataDiodeX allows Path Traversal.This issue affects DataDiodeX: from v3.0.0 before v3.1.7.

Action-Not Available
Vendor-dataflowxDataFlowX Technologydataflowx
Product-datadiodexDataDiodeXdatadiodex
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-4511
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.19% / 40.72%
||
7 Day CHG~0.00%
Published-15 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RainyGao DocSys path traversal

A vulnerability has been found in RainyGao DocSys and classified as critical. Affected by this vulnerability is an unknown functionality of the component com.DocSystem.controller.UserController#getUserImg. The manipulation leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215851.

Action-Not Available
Vendor-docsys_projectRainyGao
Product-docsysDocSys
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-57451
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.82%
||
7 Day CHG+0.04%
Published-03 Feb, 2025 | 00:00
Updated-19 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ChestnutCMS <=1.5.0 has a directory traversal vulnerability in contentcore.controller.FileController#getFileList, which allows attackers to view any directory.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-18665
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-57.18% / 98.05%
||
7 Day CHG~0.00%
Published-02 Nov, 2019 | 14:28
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Log module in SECUDOS DOMOS before 5.6 allows local file inclusion.

Action-Not Available
Vendor-secudosn/a
Product-domosn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-6768
Matching Score-4
Assigner-Robert Bosch GmbH
ShareView Details
Matching Score-4
Assigner-Robert Bosch GmbH
CVSS Score-8.6||HIGH
EPSS-1.60% / 80.99%
||
7 Day CHG~0.00%
Published-07 Feb, 2020 | 20:01
Updated-17 Sep, 2024 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path Traversal in Bosch Video Management System (BVMS)

A path traversal vulnerability in the Bosch Video Management System (BVMS) NoTouch deployment allows an unauthenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed.

Action-Not Available
Vendor-Robert Bosch GmbH
Product-video_management_system_viewerdivar_ip_7000divar_ip_all-in-one_5000divar_ip_3000video_management_systemDIVAR IP all-in-one 5000DIVAR IP 7000Bosch Video Management SystemDIVAR IP 3000BVMS Viewer
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-57669
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.67% / 70.37%
||
7 Day CHG+0.08%
Published-03 Feb, 2025 | 00:00
Updated-18 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory Traversal vulnerability in Zrlog backup-sql-file.jar v.3.0.31 allows a remote attacker to obtain sensitive information via the BackupController.java file.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-57727
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-93.92% / 99.87%
||
7 Day CHG~0.00%
Published-15 Jan, 2025 | 00:00
Updated-30 Jul, 2025 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-03-06||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.

Action-Not Available
Vendor-simple-helpn/aSimpleHelp
Product-simplehelpn/aSimpleHelp
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • Previous
  • 1
  • 2
  • ...
  • 8
  • 9
  • 10
  • ...
  • 17
  • 18
  • Next
Details not found