Total
7067 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-43382 | 1 Iteachyou | 1 Dreamer Cms | 2024-11-21 | 8.8 High |
Directory Traversal vulnerability in itechyou dreamer CMS v.4.1.3 allows a remote attacker to execute arbitrary code via the themePath in the uploaded template function. | ||||
CVE-2023-43256 | 1 Gladysassistant | 1 Gladys Assistant | 2024-11-21 | 6.5 Medium |
A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input. | ||||
CVE-2023-43216 | 1 Seacms | 1 Seacms | 2024-11-21 | 9.8 Critical |
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ip.php. | ||||
CVE-2023-43121 | 1 Extremenetworks | 1 Exos | 2024-11-21 | 7.5 High |
A Directory Traversal vulnerability discovered in Chalet application in Extreme Networks Switch Engine (EXOS) before 32.5.1.5, before 22.7, and before 31.7.2 allows attackers to read arbitrary files. | ||||
CVE-2023-43070 | 1 Dell | 1 Smartfabric Storage Software | 2024-11-21 | 6.3 Medium |
Dell SmartFabric Storage Software v1.4 (and earlier) contains a Path Traversal Vulnerability in the HTTP interface. A remote authenticated attacker could potentially exploit this vulnerability, leading to modify or write arbitrary files to arbitrary locations in the license container. | ||||
CVE-2023-43044 | 1 Ibm | 1 License Metric Tool | 2024-11-21 | 5.3 Medium |
IBM License Metric Tool 9.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 266893. | ||||
CVE-2023-42819 | 1 Fit2cloud | 1 Jumpserver | 2024-11-21 | 8.9 High |
JumpServer is an open source bastion host. Logged-in users can access and modify the contents of any file on the system. A user can use the 'Job-Template' menu and create a playbook named 'test'. Get the playbook id from the detail page, like 'e0adabef-c38f-492d-bd92-832bacc3df5f'. An attacker can exploit the directory traversal flaw using the provided URL to access and retrieve the contents of the file. `https://jumpserver-ip/api/v1/ops/playbook/e0adabef-c38f-492d-bd92-832bacc3df5f/file/?key=../../../../../../../etc/passwd` a similar method to modify the file content is also present. This issue has been addressed in version 3.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | ||||
CVE-2023-42804 | 1 Bigbluebutton | 1 Bigbluebutton | 2024-11-21 | 3.1 Low |
BigBlueButton is an open-source virtual classroom. BigBlueButton prior to version 2.6.0-beta.1 has a path traversal vulnerability that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png). In version 2.6.0-beta.1, input validation was added on the parameters being passed and dangerous characters are stripped. There are no known workarounds. | ||||
CVE-2023-42657 | 1 Progress | 1 Ws Ftp Server | 2024-11-21 | 9.9 Critical |
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a directory traversal vulnerability was discovered. An attacker could leverage this vulnerability to perform file operations (delete, rename, rmdir, mkdir) on files and folders outside of their authorized WS_FTP folder path. Attackers could also escape the context of the WS_FTP Server file structure and perform the same level of operations (delete, rename, rmdir, mkdir) on file and folder locations on the underlying operating system. | ||||
CVE-2023-42488 | 1 Busbaer | 1 Eisbaer Scada | 2024-11-21 | 7.5 High |
EisBaer Scada - CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | ||||
CVE-2023-42487 | 1 Soundminer | 1 Soundminer | 2024-11-21 | 7.5 High |
Soundminer – CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | ||||
CVE-2023-42462 | 1 Glpi-project | 1 Glpi | 2024-11-21 | 7.7 High |
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The document upload process can be diverted to delete some files. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. | ||||
CVE-2023-42428 | 1 Cubecart | 1 Cubecart | 2024-11-21 | 6.5 Medium |
Directory traversal vulnerability in CubeCart prior to 6.5.3 allows a remote authenticated attacker with an administrative privilege to delete directories and files in the system. | ||||
CVE-2023-42280 | 1 Springernature | 1 Mee-admin | 2024-11-21 | 7.5 High |
mee-admin 1.5 is vulnerable to Directory Traversal. The download method in the CommonFileController.java file does not verify the incoming data, resulting in arbitrary file reading. | ||||
CVE-2023-42130 | 1 A10networks | 1 Thunder Adc | 2024-11-21 | N/A |
A10 Thunder ADC FileMgmtExport Directory Traversal Arbitrary File Read and Deletion Vulnerability. This vulnerability allows remote attackers to read and delete arbitrary files on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability. The specific flaw exists within the FileMgmtExport class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to read and delete files in the context of the service account. . Was ZDI-CAN-17905. | ||||
CVE-2023-42129 | 1 A10networks | 1 Thunder Adc | 2024-11-21 | N/A |
A10 Thunder ADC ShowTechDownloadView Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability. The specific flaw exists within the ShowTechDownloadView class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account. . Was ZDI-CAN-17899. | ||||
CVE-2023-42033 | 2024-11-21 | N/A | ||
Visualware MyConnection Server doPostUploadfiles Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Visualware MyConnection Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the doPostUploadfiles method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21612. | ||||
CVE-2023-42000 | 1 Arcserve | 1 Udp | 2024-11-21 | 9.8 Critical |
Arcserve UDP prior to 9.2 contains a path traversal vulnerability in com.ca.arcflash.ui.server.servlet.FileHandlingServlet.doUpload(). An unauthenticated remote attacker can exploit it to upload arbitrary files to any location on the file system where the UDP agent is installed. | ||||
CVE-2023-41973 | 2024-11-21 | 7.3 High | ||
ZSATray passes the previousInstallerName as a config parameter to TrayManager, and TrayManager constructs the path and appends previousInstallerName to get the full path of the exe. Fixed Version: Win ZApp 4.3.0.121 and later. | ||||
CVE-2023-41930 | 1 Jenkins | 1 Job Configuration History | 2024-11-21 | 4.3 Medium |
Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict the 'name' query parameter when rendering a history entry, allowing attackers to have Jenkins render a manipulated configuration history that was not created by the plugin. |