CVE-2024-46649

eNMS up to 4.7.1 is vulnerable to Directory Traversal via download/folder.
References
Link Resource
https://github.com/skit-cyber-security/eNMS_vulnerabilities Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:enms:enms:*:*:*:*:*:*:*:*

History

16 Apr 2025, 19:17

Type Values Removed Values Added
CPE cpe:2.3:a:enms:enms:*:*:*:*:*:*:*:*
References () https://github.com/skit-cyber-security/eNMS_vulnerabilities - () https://github.com/skit-cyber-security/eNMS_vulnerabilities - Exploit, Third Party Advisory
First Time Enms enms
Enms

23 Sep 2024, 14:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-22
Summary
  • (es) eNMS hasta 4.7.1 es vulnerable a Directory Traversal a través de descarga/carpeta.

20 Sep 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-20 21:15

Updated : 2025-04-16 19:17


NVD link : CVE-2024-46649

Mitre link : CVE-2024-46649

CVE.ORG link : CVE-2024-46649


JSON object : View

Products Affected

enms

  • enms
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')