CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,867 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,925 Nuclei templates 37,802 vendors 42,500 researchers
370 results Clear all
CVE-2024-20352 4.9 MEDIUM EPSS 0.00
Cisco Emergency Responder - Path Traversal
A vulnerability in Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a directory traversal attack, which could allow the attacker to perform arbitrary actions on an affected device. This vulnerability is due to insufficient protections for the web UI of an affected system. An attacker could exploit this vulnerability by sending crafted requests to the web UI. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user, such as accessing password or log files or uploading and deleting existing files from the system.
CWE-22 Apr 03, 2024
CVE-2024-20310 6.1 MEDIUM EPSS 0.00
Cisco Unified CM IM&P - XSS
A vulnerability in the web-based interface of Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against an authenticated user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
CWE-23 Apr 03, 2024
CVE-2024-25944 5.7 MEDIUM EPSS 0.00
Dell Openmanage Enterprise < 4.0.1 - Path Traversal
Dell OpenManage Enterprise, v4.0 and prior, contain(s) a path traversal vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, to gain unauthorized access to the files stored on the server filesystem, with the privileges of the running web application.
CWE-22 Mar 29, 2024
CVE-2024-2053 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.38
Articatech Artica Proxy - Path Traversal
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
CWE-23 Mar 21, 2024
CVE-2024-24578 10.0 CRITICAL 1 PoC Analysis EPSS 0.64
RaspberryMatic unauthenticated Remote Code Execution vulnerability through HMServer File Upload.
RaspberryMatic is an open-source operating system for HomeMatic internet-of-things devices. RaspberryMatic / OCCU prior to version 3.75.6.20240316 contains a unauthenticated remote code execution (RCE) vulnerability, caused by multiple issues within the Java based `HMIPServer.jar` component. RaspberryMatric includes a Java based `HMIPServer`, that can be accessed through URLs starting with `/pages/jpages`. The `FirmwareController` class does however not perform any session id checks, thus this feature can be accessed without a valid session. Due to this issue, attackers can gain remote code execution as root user, allowing a full system compromise. Version 3.75.6.20240316 contains a patch.
CWE-306 Mar 18, 2024
CVE-2024-27770 8.8 HIGH EPSS 0.00
Unitronics Unistream Unilogic <1.35.227 - Path Traversal
Unitronics Unistream Unilogic – Versions prior to 1.35.227 - CWE-23: Relative Path Traversal
CWE-22 Mar 18, 2024
CVE-2024-22398 4.9 MEDIUM EPSS 0.00
SonicWall Email Security Appliance - Path Traversal
An improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability in SonicWall Email Security Appliance could allow a remote attacker with administrative privileges to conduct a directory traversal attack and delete arbitrary files from the appliance file system.
CWE-22 Mar 14, 2024
CVE-2024-2318 4.3 MEDIUM EPSS 0.00
Zkteco Zkbio Media - Path Traversal
A vulnerability was found in ZKTeco ZKBio Media 2.0.0_x64_2024-01-29-1028. It has been classified as problematic. Affected is an unknown function of the file /pro/common/download of the component Service Port 9999. The manipulation of the argument fileName with the input ../../../../zkbio_media.sql leads to path traversal: '../filedir'. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.3 Build 2025-05-26-1605 is able to address this issue. It is recommended to upgrade the affected component.
CWE-22 Mar 08, 2024
CVE-2024-27199 7.3 HIGH EXPLOITED RANSOMWARE 2 PoCs 1 Writeup Analysis NUCLEI EPSS 0.94
TeamCity < 2023.11.4 - Authentication Bypass
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
CWE-22 Mar 04, 2024
CVE-2024-0550 6.5 MEDIUM 1 Writeup EPSS 0.01
Privileged User - Info Disclosure
A user who is privileged already `manager` or `admin` can set their profile picture via the frontend API using a relative filepath to then user the PFP GET API to download any valid files. The attacker would have to have been granted privileged permissions to the system before executing this attack.
CWE-23 Feb 28, 2024
CVE-2023-42791 8.8 HIGH 1 PoC Analysis EPSS 0.14
Fortinet Fortimanager < 6.2.12 - Path Traversal
A relative path traversal in Fortinet FortiManager version 7.4.0 and 7.2.0 through 7.2.3 and 7.0.0 through 7.0.8 and 6.4.0 through 6.4.12 and 6.2.0 through 6.2.11 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
CWE-22 Feb 20, 2024
CVE-2024-22226 3.3 LOW EPSS 0.00
Dell Unity <5.4 - Path Traversal
Dell Unity, versions prior to 5.4, contain a path traversal vulnerability in its svc_supportassist utility. An authenticated attacker could potentially exploit this vulnerability, to gain unauthorized write access to the files stored on the server filesystem, with elevated privileges.
CWE-22 Feb 12, 2024
CVE-2024-24942 5.3 MEDIUM EPSS 0.00
JetBrains TeamCity <2023.11.3 - Path Traversal
In JetBrains TeamCity before 2023.11.3 path traversal allowed reading data within JAR archives
CWE-22 Feb 06, 2024
CVE-2024-24940 2.8 LOW EPSS 0.00
JetBrains IntelliJ IDEA <2023.3.3 - Path Traversal
In JetBrains IntelliJ IDEA before 2023.3.3 path traversal was possible when unpacking archives
CWE-22 Feb 06, 2024
CVE-2024-24938 5.3 MEDIUM EPSS 0.00
JetBrains TeamCity <2023.11.2 - Path Traversal
In JetBrains TeamCity before 2023.11.2 limited directory traversal was possible in the Kotlin DSL documentation
CWE-22 Feb 06, 2024
CVE-2021-22281 6.3 MEDIUM EPSS 0.00
Br-automation Automation Studio < 4.12 - Path Traversal
: Relative Path Traversal vulnerability in B&R Industrial Automation Automation Studio allows Relative Path Traversal.This issue affects Automation Studio: from 4.0 through 4.12.
CWE-22 Feb 02, 2024
CVE-2024-22096 6.5 MEDIUM EPSS 0.00
Rapid SCADA <5.8.4 - Path Traversal
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system.
CWE-22 Feb 02, 2024
CVE-2024-22421 7.6 HIGH 1 Writeup EPSS 0.00
JupyterLab <4.1.0b2-3.6.7 - Info Disclosure
JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.
CWE-200 Jan 19, 2024
CVE-2024-22415 7.3 HIGH 1 Writeup EPSS 0.00
jupyter-lsp - Privilege Escalation
jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp.
CWE-284 Jan 18, 2024
CVE-2023-49801 4.2 MEDIUM 1 Writeup EPSS 0.00
Lifplatforms Lif Auth Server < 1.4.0 - Path Traversal
Lif Auth Server is a server for validating logins, managing information, and account recovery for Lif Accounts. The issue relates to the `get_pfp` and `get_banner` routes on Auth Server. The issue is that there is no check to ensure that the file that Auth Server is receiving through these URLs is correct. This could allow an attacker access to files they shouldn't have access to. This issue has been patched in version 1.4.0.
CWE-22 Jan 12, 2024