Vulnerabilities > Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-04-09 | CVE-2024-29053 | Path Traversal vulnerability in Microsoft Defender for IOT Microsoft Defender for IoT Remote Code Execution Vulnerability | 8.8 |
2024-03-01 | CVE-2024-2045 | Session version 1.17.5 allows obtaining internal application files and public files from the user's device without the user's consent. | 4.4 |
2024-02-21 | CVE-2024-1708 | Path Traversal vulnerability in Connectwise Screenconnect 22.7/23.8.4/23.8.5 ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems. | 8.4 |
2024-02-15 | CVE-2024-23476 | Path Traversal vulnerability in Solarwinds Access Rights Manager The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. | 9.6 |
2024-02-15 | CVE-2024-23477 | Path Traversal vulnerability in Solarwinds Access Rights Manager The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. | 9.6 |
2024-02-15 | CVE-2024-23479 | Path Traversal vulnerability in Solarwinds Access Rights Manager SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. | 9.6 |
2024-02-15 | CVE-2024-26261 | The functionality for file download in HGiga OAKlouds' certain modules contains an Arbitrary File Read and Delete vulnerability. | 9.8 |
2024-02-14 | CVE-2023-35003 | Path Traversal vulnerability in Intel Virtual Raid on CPU 8.0.0.4035 Path transversal in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access. | 7.8 |
2024-02-14 | CVE-2024-25125 | Path Traversal vulnerability in Treasuredata Digdag Digdag is an open source tool that to build, run, schedule, and monitor complex pipelines of tasks across various platforms. | 5.3 |
2024-02-14 | CVE-2024-1485 | Path Traversal vulnerability in multiple products A flaw was found in the decompression function of registry-support. | 9.3 |