CWE-36: CWE-36
Yearly Trend
Top Affected Vendors
All CWE-36 CVEs (61)
This vulnerability allows attackers to perform absolute path traversal attacks in MLflow deployments prior to version 2.5.0. Attackers can potentially...
Jul 19, 2023This vulnerability in Barracuda Service Center allows attackers to upload malicious WSDL files that bypass URL validation, leading to arbitrary file w...
Dec 10, 2025A path traversal vulnerability in Deep Java Library's ZipUtils.unzip and TarUtils.untar functions allows attackers to write files to arbitrary locatio...
Jan 29, 2025CVE-2024-13159 is an absolute path traversal vulnerability in Ivanti Endpoint Manager (EPM) that allows remote unauthenticated attackers to access sen...
Jan 14, 2025This vulnerability allows remote unauthenticated attackers to perform absolute path traversal attacks on Ivanti Endpoint Manager (EPM) systems, potent...
Jan 14, 2025This vulnerability allows remote unauthenticated attackers to perform absolute path traversal attacks on Ivanti Endpoint Manager (EPM) systems, potent...
Jan 14, 2025This vulnerability allows unauthenticated remote attackers to download arbitrary system files from OAKlouds software by Hgiga, potentially leading to ...
Oct 14, 2024This critical vulnerability in Cisco Secure Email Gateway allows unauthenticated remote attackers to overwrite arbitrary files on the underlying opera...
Jul 17, 2024This vulnerability allows attackers to upload arbitrary files to any location on the server by exploiting path traversal in the file upload endpoint. ...
Mar 20, 2025This vulnerability in the OpenRefine fork of MIT Simile Butterfly server allows attackers to exploit improper URL validation to access files from remo...
Oct 24, 2024A path traversal vulnerability in parisneo/lollms-webui version 9.3 on Windows allows attackers to delete any file on the system by exploiting imprope...
Jun 6, 2024The WordPress User Extra Fields plugin has an arbitrary file deletion vulnerability in all versions up to 16.7. Authenticated attackers with Subscribe...
Oct 31, 2025This CVE describes a path traversal vulnerability that allows remote attackers to access files outside intended directories, potentially leading to re...
Aug 20, 2025This vulnerability allows any user to download arbitrary files from the rpc_agent's host system by exploiting the download_file method in modelscope/a...
Mar 20, 2025This vulnerability allows remote attackers to execute arbitrary code on Microsoft Defender for IoT systems without authentication. It affects organiza...
Apr 9, 2024CVE-2024-48248 is an absolute path traversal vulnerability in NAKIVO Backup & Replication that allows unauthenticated attackers to read arbitrary file...
Mar 4, 2025An absolute path traversal vulnerability in ID Link Manager and FUJITSU Software TIME CREATOR allows unauthenticated remote attackers to read arbitrar...
Jun 18, 2024CVE-2026-26337 is an absolute path traversal vulnerability in Hyland Alfresco Transformation Service that allows unauthenticated attackers to read arb...
Feb 19, 2026Dell Wyse Management Suite versions before 5.2 contain an absolute path traversal vulnerability that allows unauthenticated remote attackers to access...
Jun 10, 2025TenderDocTransfer software from Chunghwa Telecom has two critical vulnerabilities: lack of CSRF protection allows unauthenticated remote attackers to ...
Nov 17, 2025The tbm-client from Chunghwa Telecom has two vulnerabilities: lack of CSRF protection in APIs allowing unauthenticated remote attacks via phishing, an...
Dec 16, 2024The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability due to missing CSRF protection and an Absolute Path Traversal flaw in...
Dec 16, 2024CVE-2025-36357 is a directory traversal vulnerability in IBM Planning Analytics Local that allows authenticated remote attackers to access arbitrary f...
Nov 17, 2025This vulnerability allows attackers to exploit absolute path traversal in Splunk Enterprise to execute arbitrary code from separate disks. It affects ...
Aug 30, 2023An absolute path traversal vulnerability in Navtor NavBox allows unauthenticated remote attackers to read arbitrary files from the filesystem. This af...
Mar 6, 2026MeetingHub software from HAMASTAR Technology contains an absolute path traversal vulnerability that allows unauthenticated remote attackers to read ar...
Jan 22, 2026The Police Statistics Database System developed by Gotac contains an unauthenticated arbitrary file read vulnerability via absolute path traversal. Th...
Jan 16, 2026CVE-2025-15227 is an arbitrary file read vulnerability in BPMFlowWebkit developed by WELLTEND TECHNOLOGY. Unauthenticated remote attackers can exploit...
Dec 29, 2025CVE-2025-8912 is an arbitrary file reading vulnerability in WellChoose's Organization Portal System that allows unauthenticated remote attackers to ex...
Aug 13, 2025This vulnerability allows attackers to read a file containing administrator credentials on Franklin Fueling Systems TS-550 EVO devices. Attackers can ...
Sep 25, 2024An absolute path traversal vulnerability in parisneo/lollms-webui v9.6 allows attackers to read arbitrary files and list directories on Windows system...
Jun 27, 2024A path traversal vulnerability in parisneo/lollms allows attackers to read or delete any file on Windows systems by exploiting improper path validatio...
Jun 6, 2024A path traversal vulnerability in parisneo/lollms-webui allows attackers to read arbitrary files on Windows systems by exploiting inadequate path vali...
Jun 6, 2024This vulnerability allows unauthenticated remote attackers to conduct directory traversal attacks and overwrite restricted files on affected Cisco Sma...
Feb 4, 2021The NinjaScanner WordPress plugin contains an arbitrary file deletion vulnerability that allows authenticated attackers with Administrator privileges ...
Jul 31, 2025The WP-DownloadManager plugin for WordPress has a vulnerability allowing authenticated attackers with Administrator privileges to delete arbitrary fil...
Jun 11, 2025CVE-2023-36786 is a remote code execution vulnerability in Skype for Business that allows an attacker to execute arbitrary code on a target system by ...
Oct 10, 2023TenderDocTransfer software has two critical vulnerabilities: lack of CSRF protection allows unauthenticated remote attackers to trigger API calls via ...
Nov 17, 2025This vulnerability in h2oai/h2o-3 version 3.46.0 allows attackers to export trained models to arbitrary locations on the server's filesystem, overwrit...
Mar 20, 2025CVE-2025-9256 is an arbitrary file reading vulnerability in WebITR software developed by Uniong. Remote attackers with regular user privileges can exp...
Aug 22, 2025CVE-2025-9257 is an arbitrary file reading vulnerability in WebITR software developed by Uniong. Remote attackers with regular user privileges can exp...
Aug 22, 2025CVE-2025-9258 is an arbitrary file reading vulnerability in WebITR software developed by Uniong. Remote attackers with regular user privileges can exp...
Aug 22, 2025CVE-2025-9259 is an arbitrary file reading vulnerability in WebITR software developed by Uniong. Remote attackers with regular user privileges can exp...
Aug 22, 2025A local file inclusion vulnerability in automatic1111/stable-diffusion-webui allows attackers to read arbitrary files on the system by sending special...
Mar 20, 2025This vulnerability allows authenticated remote attackers to read arbitrary files from the underlying operating system of Cisco Secure Firewall Managem...
Oct 23, 2024Digiwin EasyFlow .NET has an access control vulnerability combined with insufficient input filtering, allowing authenticated remote attackers to downl...
Aug 2, 2024This CVE describes an improper absolute path traversal vulnerability in Motorola's Ready For application that allows local applications to access file...
May 3, 2024PHPSpreadsheet has a vulnerability where attackers can create malicious XLSX files that cause arbitrary file reads and Server-Side Request Forgery whe...
Oct 7, 2024The Police Statistics Database System developed by Gotac contains an absolute path traversal vulnerability that allows unauthenticated remote attacker...
Jan 16, 2026This vulnerability allows attackers to list arbitrary directories on Windows systems running vulnerable versions of lollms-webui. By sending a special...
Mar 20, 2025About CWE-36 (CWE-36)
Our database tracks 61 CVEs classified as CWE-36, with 11 rated critical and 28 rated high severity. The average CVSS score for CWE-36 vulnerabilities is 7.3.
External reference: View CWE-36 on MITRE CWE →
Monitor CWE-36 Vulnerabilities
Get alerted when new CWE-36 CVEs affect your infrastructure.
Start Monitoring Free