Vulnerabilities (CVE)

Filtered by CWE-29
Total 49 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-6977 1 Lfprojects 1 Mlflow 2024-11-21 N/A 7.5 HIGH
This vulnerability enables malicious users to read sensitive files on the server.
CVE-2023-6975 1 Lfprojects 1 Mlflow 2024-11-21 N/A 9.8 CRITICAL
A malicious user could use this issue to get command execution on the vulnerable machine and get access to data & models information.
CVE-2023-6909 1 Lfprojects 1 Mlflow 2024-11-21 N/A 7.5 HIGH
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
CVE-2023-2984 2 Microsoft, Pimcore 2 Windows, Pimcore 2024-11-21 N/A 8.8 HIGH
Path Traversal: '\..\filename' in GitHub repository pimcore/pimcore prior to 10.5.22.
CVE-2023-2780 1 Lfprojects 1 Mlflow 2024-11-21 N/A 9.8 CRITICAL
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1.
CVE-2023-1177 1 Lfprojects 1 Mlflow 2024-11-21 N/A 9.3 CRITICAL
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
CVE-2023-1034 1 Salesagility 1 Suitecrm 2024-11-21 N/A 8.8 HIGH
Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.12.9.
CVE-2023-0316 1 Froxlor 1 Froxlor 2024-11-21 N/A 5.5 MEDIUM
Path Traversal: '\..\filename' in GitHub repository froxlor/froxlor prior to 2.0.0.
CVE-2024-7962 1 Gaizhenbiao 1 Chuanhuchatgpt 2024-11-01 N/A 7.5 HIGH
An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for the first line, every other line must contain commas. This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials.