Vulnerabilities (CVE)

Filtered by CWE-36
Total 108 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-68472 1 Mindsdb 1 Mindsdb 2026-01-27 N/A 8.1 HIGH
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage, exposing sensitive data. The PUT handler in file.py directly joins user-controlled data into a filesystem path when the request body is JSON and source_type is not "url". Only multipart uploads and URL-sourced uploads receive sanitization; JSON uploads lack any call to clear_filename or equivalent checks. This vulnerability is fixed in 25.11.1.
CVE-2026-1330 2026-01-26 N/A 7.5 HIGH
MeetingHub developed by HAMASTAR Technology has an Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files.
CVE-2026-1018 1 Gotac 1 Police Statistics Database System 2026-01-23 N/A 7.5 HIGH
Police Statistics Database System developed by Gotac has an Arbitrary File Read vulnerability, allowing Unauthenticated remote attacker to exploit Absolute Path Traversal to download arbitrary system files.
CVE-2026-1020 1 Gotac 1 Police Statistics Database System 2026-01-23 N/A 5.3 MEDIUM
Police Statistics Database System developed by Gotac has a Absolute Path Traversal vulnerability, allowing unauthenticated remote attackers to enumerate the system file directory.
CVE-2025-15236 1 Quantatw 1 Qoca Aim 2026-01-20 N/A 4.3 MEDIUM
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a Path Traversal vulnerability, allowing authenticated remote attackers to read folder names under the specified path by exploiting an Absolute Path Traversal vulnerability.
CVE-2025-15237 1 Quantatw 1 Qoca Aim 2026-01-20 N/A 4.3 MEDIUM
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a Path Traversal vulnerability, allowing authenticated remote attackers to read folder names under the specified path by exploiting an Absolute Path Traversal vulnerability.
CVE-2026-20834 1 Microsoft 14 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 11 more 2026-01-15 N/A 4.6 MEDIUM
Absolute path traversal in Windows Shell allows an unauthorized attacker to perform spoofing with a physical attack.
CVE-2025-14253 1 Gss 1 Vitalsesp 2026-01-15 N/A 4.9 MEDIUM
Vitals ESP developed by Galaxy Software Services has an Arbitrary File Read vulnerability, allowing privileged remote attackers to exploit Absolute Path Traversal to download arbitrary system files.
CVE-2025-15227 1 Welltend 1 Bpmflowwebkit 2025-12-31 N/A 7.5 HIGH
BPMFlowWebkit developed by WELLTEND TECHNOLOGY has a Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files.
CVE-2025-14848 1 Advantech 1 Webaccess\/scada 2025-12-31 N/A 4.3 MEDIUM
Advantech WebAccess/SCADA is vulnerable to absolute directory traversal, which may allow an attacker to determine the existence of arbitrary files.
CVE-2025-34392 1 Barracuda 1 Rmm 2025-12-23 N/A 9.8 CRITICAL
Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not verify the URL defined in an attacker-controlled WSDL that is later loaded by the application. This can lead to arbitrary file write and remote code execution via webshell upload.
CVE-2025-13282 1 Cht 1 Tenderdoctransfer 2025-12-19 N/A 8.1 HIGH
TenderDocTransfer developed by Chunghwa Telecom has a Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system.
CVE-2025-13283 1 Cht 1 Tenderdoctransfer 2025-12-19 N/A 7.1 HIGH
TenderDocTransfer developed by Chunghwa Telecom has a Arbitrary File Copy and Paste vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability. Attackers can copy arbitrary files on the user's system and paste them into any path, which poses a potential risk of information leakage or could consume hard drive space by copying files in large volumes.
CVE-2025-67898 2025-12-15 N/A 4.5 MEDIUM
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
CVE-2025-36357 1 Ibm 2 Planning Analytics Local, Planning Analytics Workspace 2025-11-19 N/A 8.0 HIGH
IBM Planning Analytics Local 2.1.0 through 2.1.14 could allow a remote authenticated user to traverse directories on the system. An attacker could send a specially crafted URL request containing absolute path sequences to view, read, or write arbitrary files on the system.
CVE-2025-9256 1 Uniong 1 Webitr 2025-11-06 N/A 6.5 MEDIUM
WebITR developed by Uniong has an Arbitrary File Reading vulnerability, allowing remote attackers with regular privileges to exploit Absolute Path Traversal to download arbitrary system files.
CVE-2025-9257 1 Uniong 1 Webitr 2025-11-06 N/A 6.5 MEDIUM
WebITR developed by Uniong has an Arbitrary File Reading vulnerability, allowing remote attackers with regular privileges to exploit Absolute Path Traversal to download arbitrary system files.
CVE-2025-9258 1 Uniong 1 Webitr 2025-11-06 N/A 6.5 MEDIUM
WebITR developed by Uniong has an Arbitrary File Reading vulnerability, allowing remote attackers with regular privileges to exploit Absolute Path Traversal to download arbitrary system files.
CVE-2025-9259 1 Uniong 1 Webitr 2025-11-06 N/A 6.5 MEDIUM
WebITR developed by Uniong has an Arbitrary File Reading vulnerability, allowing remote attackers with regular privileges to exploit Absolute Path Traversal to download arbitrary system files.
CVE-2024-48248 1 Nakivo 1 Backup \& Replication Director 2025-11-05 N/A 8.6 HIGH
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).