CVE-2020-6105

CVSS v3 Score
8.2
High
CVSS v2 Score
6.8
Medium

Vulnerability Description

An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS:8.2(High)

An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or co...

CWE-732023
CVSS:8.2(High)

paddlepaddle/paddle 2.6.0 allows arbitrary file read via paddle.vision.ops.read_file.

CWE-732024
CVSS:8.2(High)

Proxmox Virtual Environment is an open-source server management platform for enterprise virtualization. Insufficient safeguards against malicious API response values allow authenticated attackers with...

CWE-732024
CVSS:8.2(High)

In h2oai/h2o-3 version 3.46.0, the `/99/Models/{name}/json` endpoint allows for arbitrary file overwrite on the target server. The vulnerability arises from the `exportModelDetails` function in `Model...

CWE-732024
CVSS:8.2(High)

eosphoros-ai/DB-GPT version latest is vulnerable to arbitrary file deletion on Windows systems via the '/v1/agent/hub/update' endpoint. The application fails to properly filter the '\' character, whic...

CWE-732025
CVSS:8.1(High)

Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local files.

CWE-732023