Vulnerabilities (CVE)

Filtered by CWE-22
Total 8484 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-1483 1 Lfprojects 1 Mlflow 2025-02-03 N/A 7.5 HIGH
A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.
CVE-2024-57728 1 Simple-help 1 Simplehelp 2025-01-31 N/A 7.2 HIGH
SimpleHelp remote support software v5.5.7 and before allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.
CVE-2023-31483 1 Cauldrondevelopment 1 Cbang 2025-01-31 N/A 7.5 HIGH
tar/TarFileReader.cpp in Cauldron cbang before bastet-v8.1.17 has a directory traversal during extraction that allows the attacker to create or write to files outside the current directory via a crafted tar archive.
CVE-2023-30380 1 Dedecms 1 Dedecms 2025-01-31 N/A 7.5 HIGH
An issue in the component /dialog/select_media.php of DedeCMS v5.7.107 allows attackers to execute a directory traversal.
CVE-2017-20184 1 Gavazzionline 1 Powersoft 2025-01-31 N/A 7.5 HIGH
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Carlo Gavazzi Powersoft up to version 2.1.1.1 allows an unauthenticated, remote attacker to download any file from the affected device.
CVE-2024-46664 1 Fortinet 1 Fortirecorder 2025-01-31 N/A 5.5 MEDIUM
A relative path traversal in Fortinet FortiRecorder [CWE-23] version 7.2.0 through 7.2.1 and before 7.0.4 allows a privileged attacker to read files from the underlying filesystem via crafted HTTP or HTTPs requests.
CVE-2024-36512 1 Fortinet 2 Fortianalyzer, Fortimanager 2025-01-31 N/A 7.2 HIGH
An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiManager, FortiAnalyzer 7.4.0 through 7.4.3 and 7.2.0 through 7.2.5 and 7.0.2 through 7.0.12 and 6.2.10 through 6.2.13 allows attacker to execute unauthorized code or commands via crafted HTTP or HTTPS requests.
CVE-2024-47566 1 Fortinet 1 Fortirecorder 2025-01-31 N/A 5.1 MEDIUM
A improper limitation of a pathname to a restricted directory ('path traversal') [CWE-23] in Fortinet FortiRecorder version 7.2.0 through 7.2.1 and before 7.0.4 allows a privileged attacker to delete files from the underlying filesystem via crafted CLI requests.
CVE-2023-30507 1 Arubanetworks 1 Edgeconnect Enterprise 2025-01-31 N/A 4.9 MEDIUM
Multiple authenticated path traversal vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface. Successful exploitation of these vulnerabilities result in the ability to read arbitrary files on the underlying operating system, including sensitive system files.
CVE-2024-54154 1 Jetbrains 1 Youtrack 2025-01-31 N/A 8.0 HIGH
In JetBrains YouTrack before 2024.3.51866 system takeover was possible through path traversal in plugin sandbox
CVE-2023-28413 1 Snow Monkey Forms Project 1 Snow Monkey Forms 2025-01-31 N/A 9.8 CRITICAL
Directory traversal vulnerability in Snow Monkey Forms versions v5.0.6 and earlier allows a remote unauthenticated attacker to obtain sensitive information, alter the website, or cause a denial-of-service (DoS) condition.
CVE-2023-27507 1 Microengine 1 Mailform 2025-01-31 N/A 9.8 CRITICAL
MicroEngine Mailform version 1.1.0 to 1.1.8 contains a path traversal vulnerability. If the product's file upload function and server save option are enabled, a remote attacker may save an arbitrary file on the server and execute it.
CVE-2023-27067 1 Sitecore 1 Experience Platform 2025-01-31 N/A 7.5 HIGH
Directory Traversal vulnerability in Sitecore Experience Platform through 10.2 allows remote attackers to download arbitrary files via crafted command to download.aspx
CVE-2023-27066 1 Sitecore 1 Experience Platform 2025-01-31 N/A 6.5 MEDIUM
Directory Traversal vulnerability in Site Core Experience Platform 10.2 and earlier allows authenticated remote attackers to download arbitrary files via Urlhandle.
CVE-2024-13720 1 Ivanm 1 Wp Image Uploader 2025-01-30 N/A 8.8 HIGH
The WP Image Uploader plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the gky_image_uploader_main_function() function in all versions up to, and including, 1.0.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CVE-2022-48483 1 3cx 1 3cx 2025-01-30 N/A 7.5 HIGH
3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005.
CVE-2022-48482 2 3cx, Microsoft 2 3cx, Windows 2025-01-30 N/A 7.5 HIGH
3CX before 18 Update 2 Security Hotfix build 18.0.2.315 on Windows allows unauthenticated remote attackers to read certain files via /Electron/download directory traversal. Files may have credentials, full backups, call recordings, and chat logs.
CVE-2022-47875 1 Jedox 2 Cloud, Jedox 2025-01-30 N/A 8.8 HIGH
A Directory Traversal vulnerability in /be/erpc.php in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to execute arbitrary code.
CVE-2024-34033 1 Deltaww 1 Diaenergie 2025-01-30 N/A 8.8 HIGH
Delta Electronics DIAEnergie has insufficient input validation which makes it possible to perform a path traversal attack and write outside of the intended directory. If a file name is specified that already exists on the file system, then the original file will be overwritten.
CVE-2024-40422 1 Stitionai 1 Devika 2025-01-29 N/A 9.1 CRITICAL
The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system.