CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
370 results Clear all
CVE-2024-43399 8.0 HIGH 1 Writeup EPSS 0.00
Opensecurity Mobile Security Framework < 4.0.7 - Path Traversal
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7.
CWE-22 Aug 19, 2024
CVE-2024-7693 7.5 HIGH EPSS 0.01
Raidenmaild < 5.0.2 - Path Traversal
Raiden MAILD Remote Management System from Team Johnlong Software has a Relative Path Traversal vulnerability, allowing unauthenticated remote attackers to read arbitrary file on the remote server.
CWE-22 Aug 12, 2024
CVE-2024-6433 7.5 HIGH EPSS 0.00
Application <version> - Info Disclosure
The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter.
CWE-23 Jul 10, 2024
CVE-2024-3122 4.9 MEDIUM EPSS 0.00
CHANGING Mobile - Info Disclosure
CHANGING Mobile One Time Password does not properly filter parameters for the file download functionality, allowing remote attackers with administrator privilege to read arbitrary file on the system.
CWE-23 Jul 01, 2024
CVE-2024-5547 7.5 HIGH 1 Writeup EPSS 0.01
Stitionai Devika - Path Traversal
A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.
CWE-23 Jun 27, 2024
CVE-2024-37138 4.1 MEDIUM EPSS 0.00
Dell Data Domain Operating System < 7.7.5.40 - Path Traversal
Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 on DDMC contain a relative path traversal vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the application sending over an unauthorized file to the managed system.
CWE-23 Jun 26, 2024
CVE-2024-3497 8.8 HIGH EPSS 0.00
Toshiba Printer - Path Traversal
Path traversal vulnerability in the web server of the Toshiba printer enables attacker to overwrite orginal files or add new ones to the printer. As for the affected products/models/versions, see the reference URL.
CWE-23 Jun 14, 2024
CVE-2024-2461 EPSS 0.00
Unknown Product <Unknown Version - Path Traversal
If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible
CWE-23 Jun 11, 2024
CVE-2024-4330 3.3 LOW EPSS 0.00
Lollms Web UI < 9.8 - Path Traversal
A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.
CWE-23 May 30, 2024
CVE-2024-36362 6.5 MEDIUM EPSS 0.00
JetBrains TeamCity <2022.04.7-2024.03.2 - Path Traversal
In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5, 2024.03.2 path traversal allowing to read files from server was possible
CWE-22 May 29, 2024
CVE-2024-35186 8.8 HIGH EPSS 0.00
Crates.io Gix-worktree-state < 0.11.0 - Path Traversal
gitoxide is a pure Rust implementation of Git. During checkout, `gix-worktree-state` does not verify that paths point to locations in the working tree. A specially crafted repository can, when cloned, place new files anywhere writable by the application. This vulnerability leads to a major loss of confidentiality, integrity, and availability, but creating files outside a working tree without attempting to execute code can directly impact integrity as well. This vulnerability has been patched in version(s) 0.36.0.
CWE-23 May 23, 2024
CVE-2023-3941 10.0 CRITICAL 1 Writeup EPSS 0.01
ZkTeco-based OEM devices <1.8.25-7354-Ver1.0.0 - Path Traversal
Relative Path Traversal vulnerability in ZkTeco-based OEM devices allows an attacker to write any file on the system with root privileges. This issue affects ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others) with the ZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly others.
CWE-23 May 21, 2024
CVE-2023-3940 7.5 HIGH 1 Writeup EPSS 0.01
ZkTeco-based OEM devices <1.8.25-7354-Ver1.0.0 - Path Traversal
Relative Path Traversal vulnerability in ZkTeco-based OEM devices allows an attacker to access any file on the system. This issue affects ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others) with the ZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly others.
CWE-23 May 21, 2024
CVE-2024-33615 8.8 HIGH EPSS 0.01
CyberPower PowerPanel - Path Traversal
A specially crafted Zip file containing path traversal characters can be imported to the CyberPower PowerPanel server, which allows file writing to the server outside the intended scope, and could allow an attacker to achieve remote code execution.
CWE-23 May 15, 2024
CVE-2024-30010 8.8 HIGH EPSS 0.10
Windows Hyper-V < - RCE
Windows Hyper-V Remote Code Execution Vulnerability
CWE-23 May 14, 2024
CVE-2024-34712 6.5 MEDIUM 1 Writeup EPSS 0.00
NPM Oceanic.js < 1.10.4 - Path Traversal
Oceanic is a NodeJS library for interfacing with Discord. Prior to version 1.10.4, input to functions such as `Client.rest.channels.removeBan` is not url-encoded, resulting in specially crafted input such as `../../../channels/{id}` being normalized into the url `/api/v10/channels/{id}`, and deleting a channel rather than removing a ban. Version 1.10.4 fixes this issue. Some workarounds are available. One may sanitize user input, ensuring strings are valid for the purpose they are being used for. One may also encode input with `encodeURIComponent` before providing it to the library.
CWE-22 May 14, 2024
CVE-2024-0549 8.1 HIGH 1 Writeup EPSS 0.00
mintplex-labs/anything-llm - Path Traversal
mintplex-labs/anything-llm is vulnerable to a relative path traversal attack, allowing unauthorized attackers with a default role account to delete files and folders within the filesystem, including critical database files such as 'anythingllm.db'. The vulnerability stems from insufficient input validation and normalization in the handling of file and folder deletion requests. Successful exploitation results in the compromise of data integrity and availability.
CWE-23 Apr 16, 2024
CVE-2024-32005 8.2 HIGH 1 Writeup EPSS 0.00
NiceGUI <1.4.21 - Local File Inclusion
NiceGUI is an easy-to-use, Python-based UI framework. A local file inclusion is present in the NiceUI leaflet component when requesting resource files under the `/_nicegui/{__version__}/resources/{key}/{path:path}` route. As a result any file on the backend filesystem which the web server has access to can be read by an attacker with access to the NiceUI leaflet website. This vulnerability has been addressed in version 1.4.21. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-22 Apr 12, 2024
CVE-2024-3025 9.9 CRITICAL 1 Writeup EPSS 0.00
Mintplexlabs Anythingllm < 1.0.0 - Path Traversal
mintplex-labs/anything-llm is vulnerable to path traversal attacks due to insufficient validation of user-supplied input in the logo filename functionality. Attackers can exploit this vulnerability by manipulating the logo filename to reference files outside of the restricted directory. This can lead to unauthorized reading or deletion of files by utilizing the `/api/system/upload-logo` and `/api/system/logo` endpoints. The issue stems from the lack of filtering or validation on the logo filename, allowing attackers to target sensitive files such as the application's database.
CWE-23 Apr 10, 2024
CVE-2024-0335 7.5 HIGH EPSS 0.00
ABB VPNI - Unknown Vuln
ABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may be used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst) This issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2.
CWE-23 Apr 03, 2024