Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file::path vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv3
CVE-2023-24455
Jenkins visualexpert Plugin 1.3 and previous versions does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file syste...
Jenkins Visual Expert 1.0
Jenkins Visual Expert 1.3
NA
CVE-2006-3534
Directory traversal vulnerability in Nullsoft SHOUTcast DSP prior to 1.9.6 filters directory traversal sequences before decoding, which allows remote malicious users to read arbitrary files via encoded dot dot (%2E%2E) sequences in an HTTP GET request for a file path containing &...
Nullsoft Shoutcast Server 1.8.3
Nullsoft Shoutcast Server 1.9.2
Nullsoft Shoutcast Server 1.8.9
Nullsoft Shoutcast Server 1.9.4
Nullsoft Shoutcast Server 1.9.5
Nullsoft Shoutcast Server 1.7.1
Nullsoft Shoutcast Server 1.8.2
Nullsoft Shoutcast Server
4.3
CVSSv3
CVE-2023-32985
Jenkins Sidebar Link Plugin 2.2.1 and previous versions does not restrict the path of files in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file syste...
Jenkins Sidebar Link
NA
CVE-2007-0468
Stack-based buffer overflow in rcdll.dll in msdev.exe in Visual C++ (MSVC) in Microsoft Visual Studio 6.0 SP6 allows user-assisted remote malicious users to execute arbitrary code via a long file path in the "1 TYPELIB MOVEABLE PURE" option in an RC file.
Microsoft Visual Studio 6.0
4.3
CVSSv3
CVE-2022-36914
Jenkins Files Found Trigger Plugin 1.5 and previous versions does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file ...
Jenkins Files Found Trigger
4.3
CVSSv3
CVE-2023-24449
Jenkins PWauth Security Realm Plugin 0.4 and previous versions does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller fil...
Jenkins Pwauth Security Realm
4.3
CVSSv3
CVE-2022-36890
Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and previous versions does not restrict the name of files in methods implementing form validation, allowing attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controll...
Jenkins Deployer Framework
4.3
CVSSv3
CVE-2022-36904
Jenkins Repository Connector Plugin 2.2.0 and previous versions does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller fi...
Jenkins Repository Connector
6.7
CVSSv3
CVE-2020-9072
Huawei OSD product with versions earlier than OSD_uwp_9.0.32.0 have a local privilege escalation vulnerability. An authenticated, local attacker can constructs a specific file path to exploit this vulnerability. Successful exploitation may cause the malicious user to obtain a hig...
Huawei Osd Firmware
7.2
CVSSv3
CVE-2020-23765
A file upload vulnerability exists in the file path /bl-plugins/backup/plugin.php on Bludit version 3.12.0. If an attacker is able to gain Administrator rights they will be able to use unsafe plugins to upload a backup file and control the server.
Bludit Bludit 3.12.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »