CVE-2024-46644

eNMS 4.4.0 to 4.7.1 is vulnerable to Directory Traversal via edit_file.
References
Link Resource
https://github.com/skit-cyber-security/eNMS_vulnerabilities Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:enms:enms:*:*:*:*:*:*:*:*

History

16 Apr 2025, 19:28

Type Values Removed Values Added
References () https://github.com/skit-cyber-security/eNMS_vulnerabilities - () https://github.com/skit-cyber-security/eNMS_vulnerabilities - Exploit, Third Party Advisory
First Time Enms enms
Enms
CPE cpe:2.3:a:enms:enms:*:*:*:*:*:*:*:*

23 Sep 2024, 14:35

Type Values Removed Values Added
CWE CWE-22
Summary
  • (es) eNMS 4.4.0 a 4.7.1 es vulnerable a Directory Traversal a través de edit_file.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

20 Sep 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-20 21:15

Updated : 2025-04-16 19:28


NVD link : CVE-2024-46644

Mitre link : CVE-2024-46644

CVE.ORG link : CVE-2024-46644


JSON object : View

Products Affected

enms

  • enms
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')