Vulnerabilities (CVE)

Filtered by CWE-73
Total 138 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-125059 1 Sternenblog Project 1 Sternenblog 2024-11-21 4.6 MEDIUM 5.0 MEDIUM
A vulnerability, which was classified as problematic, has been found in sternenseemann sternenblog. This issue affects the function blog_index of the file main.c. The manipulation of the argument post_path leads to file inclusion. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 0.1.0 is able to address this issue. The identifier of the patch is cf715d911d8ce17969a7926dea651e930c27e71a. It is recommended to upgrade the affected component. The identifier VDB-217613 was assigned to this vulnerability. NOTE: This case is rather theoretical and probably won't happen. Maybe only on obscure Web servers.
CVE-2024-10672 1 Themeisle 1 Multiple Page Generator 2024-11-14 N/A 2.7 LOW
The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the mpg_upsert_project_source_block() function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with editor-level access and above, to delete limited files on the server.
CVE-2024-43451 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-14 N/A 6.5 MEDIUM
NTLM Hash Disclosure Spoofing Vulnerability
CVE-2023-5816 1 Bowo 1 Code Explorer 2024-11-06 N/A 4.9 MEDIUM
The Code Explorer plugin for WordPress is vulnerable to arbitrary external file reading in all versions up to, and including, 1.4.5. This is due to the fact that the plugin does not restrict accessing files to those outside of the WordPress instance, though the intention of the plugin is to only access WordPress related files. This makes it possible for authenticated attackers, with administrator-level access, to read files outside of the WordPress instance.
CVE-2024-5823 1 Gaizhenbiao 1 Chuanhuchatgpt 2024-10-31 N/A 9.1 CRITICAL
A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt versions <= 20240410. This vulnerability allows an attacker to gain unauthorized access to overwrite critical configuration files within the system. Exploiting this vulnerability can lead to unauthorized changes in system behavior or security settings. Additionally, tampering with these configuration files can result in a denial of service (DoS) condition, disrupting normal system operation.
CVE-2024-43615 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2024-10-21 N/A 7.1 HIGH
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
CVE-2024-43581 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2024-10-16 N/A 7.1 HIGH
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
CVE-2024-38029 1 Microsoft 1 Windows Server 2022 23h2 2024-10-16 N/A 7.5 HIGH
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
CVE-2024-9142 2024-10-14 N/A 9.8 CRITICAL
External Control of File Name or Path, : Incorrect Permission Assignment for Critical Resource vulnerability in Olgu Computer Systems e-Belediye allows Manipulating Web Input to File System Calls.This issue affects e-Belediye: before 2.0.642.
CVE-2024-9275 2024-09-30 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in jeanmarc77 123solar up to 1.8.4.5. It has been rated as critical. This issue affects some unknown processing of the file /admin/admin_invt2.php. The manipulation of the argument PROTOCOLx leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-21545 2024-09-26 N/A 8.2 HIGH
Proxmox Virtual Environment is an open-source server management platform for enterprise virtualization. Insufficient safeguards against malicious API response values allow authenticated attackers with 'Sys.Audit' or 'VM.Monitor' privileges to download arbitrary host files via the API. When handling the result from a request handler before returning it to the user, the handle_api2_request function will check for the ‘download’ or ‘data’->’download’ objects inside the request handler call response object. If present, handle_api2_request will read a local file defined by this object and return it to the user. Two endpoints were identified which can control the object returned by a request handler sufficiently that the ’download’ object is defined and user controlled. This results in arbitrary file read. The privileges of this file read can result in full compromise of the system by various impacts such as disclosing sensitive files allowing for privileged session forgery.
CVE-2024-7626 1 Wpdelicious 1 Wp Delicious 2024-09-25 N/A 8.1 HIGH
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file movement and reading due to insufficient file path validation in the save_edit_profile_details() function in all versions up to, and including, 1.6.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). This can also lead to the reading of arbitrary files that may contain sensitive information like wp-config.php.
CVE-2024-7744 1 Progress 1 Ws Ftp Server 2024-09-04 N/A 6.5 MEDIUM
In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal.   An authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)
CVE-2024-7911 1 Oretnom23 1 Simple Online Bidding System 2024-08-19 6.5 MEDIUM 9.8 CRITICAL
A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as critical. This affects an unknown part of the file /simple-online-bidding-system/bidding/index.php. The manipulation of the argument page leads to file inclusion. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-7497 1 Angeljudesuarez 1 Airline Reservation System 2024-08-19 6.5 MEDIUM 8.8 HIGH
A vulnerability was found in itsourcecode Airline Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273623.
CVE-2024-7496 1 Angeljudesuarez 1 Airline Reservation System 2024-08-19 6.5 MEDIUM 8.8 HIGH
A vulnerability has been found in itsourcecode Airline Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument page leads to file inclusion. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273622 is the identifier assigned to this vulnerability.
CVE-2024-38173 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2024-08-16 N/A 6.7 MEDIUM
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-38165 1 Microsoft 2 Windows 11 22h2, Windows 11 23h2 2024-08-16 N/A 6.5 MEDIUM
Windows Compressed Folder Tampering Vulnerability