Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file::path vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2021-36233
The function AdminGetFirstFileContentByFilePath in MIK.starlight 7.9.5.24363 allows (by design) an authenticated malicious user to read arbitrary files from the filesystem by specifying the file path.
Unit4 Mik.starlight 7.9.5.24363
NA
CVE-2007-4734
Buffer overflow in Ots Labs OTSTurntables 1.00 allows user-assisted remote malicious users to execute arbitrary code via a long file path in an m3u file.
Ots Labs Otsturntables 1.00
2 EDB exploits
7.5
CVSSv3
CVE-2021-20030
SonicWall GMS is vulnerable to file path manipulation resulting that an unauthenticated attacker can gain access to web directory containing application's binaries and configuration files.
Sonicwall Global Management System
7.5
CVSSv3
CVE-2020-25842
The encryption function of NHIServiSignAdapter fail to verify the file path input by users. Remote attacker can access arbitrary files through the flaw without privilege.
Panorama Nhiservisignadapter 1.0.20.0218
7.5
CVSSv3
CVE-2023-6750
The Clone WordPress plugin prior to 2.4.3 uses buffer files to store in-progress backup informations, which is stored at a publicly accessible, statically defined file path.
Backupbliss Clone
5.4
CVSSv3
CVE-2023-35145
Jenkins Sonargraph Integration Plugin 5.0.1 and previous versions does not escape the file path and the project name for the Log file field form validation, resulting in a stored cross-site scripting vulnerability exploitable by attackers with Item/Configure permission.
Jenkins Sonargraph Integration
8.1
CVSSv3
CVE-2021-21686
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and previous versions, LTS 2.303.2 and previous versions do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
Jenkins Jenkins
5.3
CVSSv3
CVE-2023-5514
The response messages received from the eSOMS report generation using certain parameter queries with full file path can be abused for enumerating the local file system structure.
Hitachienergy Esoms
NA
CVE-2014-3771
TeamPass prior to 2.1.20 allows remote malicious users to bypass access restrictions via the language file path in a (1) request to index.php or (2) "change_user_language" request to sources/main.queries.php.
Teampass Teampass 2.1.4
Teampass Teampass 2.1.2
Teampass Teampass 2.1.13
Teampass Teampass 2.1
Teampass Teampass 2.1.5
Teampass Teampass
Teampass Teampass 2.1.19
Teampass Teampass 2.1.18
Teampass Teampass 2.1.15
Teampass Teampass 2.1.3
Teampass Teampass 2.1.1
Teampass Teampass 2.1.14
Teampass Teampass 2.1.10
NA
CVE-2007-4735
Buffer overflow in Next Generation Software Virtual DJ (VDJ) 5.0 allows user-assisted remote malicious users to execute arbitrary code via a long file path in an m3u file.
Next Generation Software Virtual Dj \\(vdj\\) 5.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »