Vulnerabilities (CVE)

Filtered by CWE-23
Total 269 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-37288 1 Smartsoft 1 Smartbpm.net 2024-11-21 N/A 6.5 MEDIUM
SmartBPM.NET component has a vulnerability of path traversal within its file download function. An unauthenticated remote attacker can exploit this vulnerability to access arbitrary system files.
CVE-2023-34394 1 Keysight 1 Geolocation Server 2024-11-21 N/A 7.8 HIGH
In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition.
CVE-2023-34117 1 Zoom 1 Zoom Software Development Kit 2024-11-21 N/A 3.3 LOW
Relative path traversal in the Zoom Client SDK before version 5.15.0 may allow an unauthorized user to enable information disclosure via local access.
CVE-2023-33144 1 Microsoft 1 Visual Studio Code 2024-11-21 N/A 6.6 MEDIUM
Visual Studio Code Spoofing Vulnerability
CVE-2023-31036 3 Linux, Microsoft, Nvidia 3 Linux Kernel, Windows, Triton Inference Server 2024-11-21 N/A 7.5 HIGH
NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
CVE-2023-2913 1 Rockwellautomation 1 Thinmanager 2024-11-21 N/A 7.5 HIGH
An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.
CVE-2023-2356 1 Lfprojects 1 Mlflow 2024-11-21 N/A 7.5 HIGH
Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1.
CVE-2023-29189 1 Sap 2 Customer Relationship Management S4fnd, Customer Relationship Management Webclient Ui 2024-11-21 N/A 5.4 MEDIUM
SAP CRM (WebClient UI) - versions S4FND 102, 103, 104, 105, 106, 107, WEBCUIF, 700, 701, 731, 730, 746, 747, 748, 800, 801, allows an authenticated attacker to modify HTTP verbs used in requests to the web server. This application is exposed over the network and successful exploitation can lead to exposure of form fields
CVE-2023-27993 1 Fortinet 1 Fortiadc 2024-11-21 N/A 6.0 MEDIUM
A relative path traversal [CWE-23] in Fortinet FortiADC version 7.2.0 and before 7.1.1 allows a privileged attacker to delete arbitrary directories from the underlying file system via crafted CLI commands.
CVE-2023-23784 1 Fortinet 1 Fortiweb 2024-11-21 N/A 5.7 MEDIUM
A relative path traversal in Fortinet FortiWeb version 7.0.0 through 7.0.2, FortiWeb version 6.3.6 through 6.3.20, FortiWeb 6.4 all versions allows attacker to information disclosure via specially crafted web requests.
CVE-2023-23778 1 Fortinet 1 Fortiweb 2024-11-21 N/A 4.9 MEDIUM
A relative path traversal vulnerability [CWE-23] in FortiWeb version 7.0.1 and below, 6.4 all versions, 6.3 all versions, 6.2 all versions may allow an authenticated user to obtain unauthorized access to files and data via specifically crafted web requests.
CVE-2023-23391 1 Microsoft 1 Office 2024-11-21 N/A 5.5 MEDIUM
Office for Android Spoofing Vulnerability
CVE-2023-23379 1 Microsoft 1 Defender For Iot 2024-11-21 N/A 7.8 HIGH
Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVE-2023-20066 1 Cisco 271 1000 Integrated Services Router, 1100-4g Integrated Services Router, 1100-4p Integrated Services Router and 268 more 2024-11-21 N/A 6.5 MEDIUM
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform a directory traversal and access resources that are outside the filesystem mountpoint of the web UI. This vulnerability is due to an insufficient security configuration. An attacker could exploit this vulnerability by sending a crafted request to the web UI. A successful exploit could allow the attacker to gain read access to files that are outside the filesystem mountpoint of the web UI. Note: These files are located on a restricted filesystem that is maintained for the web UI. There is no ability to write to any files on this filesystem.
CVE-2023-20040 1 Cisco 1 Network Services Orchestrator 2024-11-21 N/A 5.5 MEDIUM
A vulnerability in the NETCONF service of Cisco Network Services Orchestrator (NSO) could allow an authenticated, remote attacker to cause a denial of service (DoS) on an affected system that is running as the root user. To exploit this vulnerability, the attacker must be a member of the admin group. This vulnerability exists because user-supplied input is not properly validated when NETCONF is used to upload packages to an affected device. An attacker could exploit this vulnerability by uploading a specially crafted package file. A successful exploit could allow the attacker to write crafted files to arbitrary locations on the filesystem or delete arbitrary files from the filesystem of an affected device, resulting in a DoS condition. Note: By default, during install, Cisco NSO will be set up to run as the root user unless the --run-as-user option is used.
CVE-2023-1112 1 Codedropz 1 Drag And Drop Multiple File Upload - Contact Form 7 2024-11-21 5.8 MEDIUM 4.7 MEDIUM
A vulnerability was found in Drag and Drop Multiple File Upload Contact Form 7 5.0.6.1 on WordPress. It has been classified as critical. Affected is an unknown function of the file admin-ajax.php. The manipulation of the argument upload_name leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222072.
CVE-2023-1045 1 Muyucms 1 Muyucms 2024-11-21 4.7 MEDIUM 3.8 LOW
A vulnerability was found in MuYuCMS 2.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin.php/accessory/filesdel.html. The manipulation of the argument filedelur leads to relative path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221804.
CVE-2023-1044 1 Muyucms 1 Muyucms 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A vulnerability was found in MuYuCMS 2.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /editor/index.php. The manipulation of the argument file_path leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221803.
CVE-2023-1043 1 Muyucms 1 Muyucms 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A vulnerability was found in MuYuCMS 2.2. It has been classified as problematic. Affected is an unknown function of the file /editor/index.php. The manipulation of the argument dir_path leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221802 is the identifier assigned to this vulnerability.
CVE-2023-0745 1 Yugabyte 1 Yugabytedb Managed 2024-11-21 N/A 6.7 MEDIUM
The High Availability functionality of Yugabyte Anywhere can be abused to write arbitrary files through the backup upload endpoint by using path traversal characters. This vulnerability is associated with program files PlatformReplicationManager.Java. This issue affects YugabyteDB Anywhere: from 2.0.0.0 through 2.13.0.0