Total
6174 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2009-0325 | 1 Ninjadesigns | 1 Ninja Blog | 2024-02-14 | 4.3 MEDIUM | N/A |
Directory traversal vulnerability in entries/index.php in Ninja Blog 4.8, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the cat parameter. | |||||
CVE-2013-6226 | 1 Ajaxplorer | 1 Ajaxplorer | 2024-02-14 | 8.5 HIGH | N/A |
Directory traversal vulnerability in plugins/editor.zoho/agent/save_zoho.php in the Zoho plugin in Pydio (formerly AjaXplorer) before 5.0.4 allows remote attackers to read or delete arbitrary files via unspecified vectors. | |||||
CVE-2020-36142 | 1 Bloofox | 1 Bloofoxcms | 2024-02-14 | 4.0 MEDIUM | 6.5 MEDIUM |
BloofoxCMS 0.5.2.1 allows Directory traversal vulnerability by inserting '../' payloads within the 'fileurl' parameter. | |||||
CVE-2008-7064 | 1 Quicksilver Forums | 1 Quicksilver Forums | 2024-02-14 | 7.5 HIGH | N/A |
Directory traversal vulnerability in the get_lang function in global.php in Quicksilver Forums 1.4.2 and earlier, as used in QSF Portal before 1.4.5, when running on Windows, allows remote attackers to include and execute arbitrary local files via a "\" (backslash) in the lang parameter to index.php, which bypasses a protection mechanism that only checks for "/" (forward slash), as demonstrated by uploading and including PHP code in an avatar file. | |||||
CVE-2018-18713 | 1 Phpyun | 1 Phpyun | 2024-02-14 | 5.0 MEDIUM | 7.5 HIGH |
The function down_sql_action() in /admin/model/database.class.php in PHPYun 4.6 allows remote attackers to read arbitrary files via directory traversal in an m=database&c=down_sql&name=../ URI. | |||||
CVE-2019-16123 | 1 Kartatopia | 1 Piluscart | 2024-02-14 | 5.0 MEDIUM | 7.5 HIGH |
In Kartatopia PilusCart 1.4.1, the parameter filename in the file catalog.php is mishandled, leading to ../ Local File Disclosure. | |||||
CVE-2011-0966 | 1 Cisco | 1 Ciscoworks Common Services | 2024-02-14 | 6.8 MEDIUM | N/A |
Directory traversal vulnerability in cwhp/auditLog.do in the Homepage Auditing component in Cisco CiscoWorks Common Services 3.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, aka Bug ID CSCto35577. | |||||
CVE-2009-0288 | 1 Windows Tftp Utility | 1 Tftputil | 2024-02-14 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in k23productions TFTPUtil GUI 1.2.0 and 1.3.0 allows remote attackers to read arbitrary files outside the TFTP root directory via directory traversal sequences in a GET request. | |||||
CVE-2018-16457 | 1 Open Source Real-estate Script Project | 1 Open Source Real-estate Script | 2024-02-14 | 5.0 MEDIUM | 5.3 MEDIUM |
PHP Scripts Mall Open Source Real-estate Script 3.6.2 allows remote attackers to list the wp-content/themes/template_dp_dec2015/img directory. | |||||
CVE-2024-23673 | 1 Apache | 1 Sling Servlets Resolver | 2024-02-14 | N/A | 7.5 HIGH |
Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system. If the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script. Users are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not. | |||||
CVE-2023-6831 | 1 Lfprojects | 1 Mlflow | 2024-02-13 | N/A | 8.1 HIGH |
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | |||||
CVE-2024-22514 | 1 Ispyconnect | 1 Agent Dvr | 2024-02-13 | N/A | 8.8 HIGH |
An issue discovered in iSpyConnect.com Agent DVR 5.1.6.0 allows attackers to run arbitrary files by restoring a crafted backup file. | |||||
CVE-2024-1082 | 2024-02-13 | N/A | 6.3 MEDIUM | ||
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.15, 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program. | |||||
CVE-2024-0849 | 1 Leanote | 1 Desktop | 2024-02-13 | N/A | 5.5 MEDIUM |
Leanote version 2.7.0 allows obtaining arbitrary local files. This is possible because the application is vulnerable to LFR. | |||||
CVE-2024-0221 | 1 10web | 1 Photo Gallery | 2024-02-13 | N/A | 7.2 HIGH |
The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.8.19 via the rename_item function. This makes it possible for authenticated attackers to rename arbitrary files on the server. This can lead to site takeovers if the wp-config.php file of a site can be renamed. By default this can be exploited by administrators only. In the premium version of the plugin, administrators can give gallery management permissions to lower level users, which might make this exploitable by users as low as contributors. | |||||
CVE-2024-0964 | 1 Gradio Project | 1 Gradio | 2024-02-13 | N/A | 9.4 CRITICAL |
A local file include could be remotely triggered in Gradio due to a vulnerable user-supplied JSON value in an API request. | |||||
CVE-2021-21972 | 1 Vmware | 2 Cloud Foundation, Vcenter Server | 2024-02-13 | 10.0 HIGH | 9.8 CRITICAL |
The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). | |||||
CVE-2024-24398 | 1 Stimulsoft | 1 Dashboards.php | 2024-02-13 | N/A | 9.8 CRITICAL |
Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function. | |||||
CVE-2023-6989 | 1 Getshieldsecurity | 1 Shield Security | 2024-02-13 | N/A | 9.8 CRITICAL |
The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files. | |||||
CVE-2024-23833 | 2024-02-13 | N/A | 7.5 HIGH | ||
OpenRefine is a free, open source power tool for working with messy data and improving it. A jdbc attack vulnerability exists in OpenRefine(version<=3.7.7) where an attacker may construct a JDBC query which may read files on the host filesystem. Due to the newer MySQL driver library in the latest version of OpenRefine (8.0.30), there is no associated deserialization utilization point, so original code execution cannot be achieved, but attackers can use this vulnerability to read sensitive files on the target server. This issue has been addressed in version 3.7.8. Users are advised to upgrade. There are no known workarounds for this vulnerability. |