Tag
OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)
2 rules 2 TTPs 1 CVECVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.
OpenClaw Symlink Vulnerability in SSH Sandbox Tar Upload (CVE-2026-41364)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files by uploading a malicious tar archive containing symlinks, leading to arbitrary file write on the remote host.
ByteDance DeerFlow Path Traversal and Arbitrary File Write Vulnerability
2 rules 1 TTP 1 CVEByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed, allowing attackers to write files outside the intended custom-agent directory.
Unauthenticated Arbitrary File Write in Saltcorn
2 rules 1 TTP 1 CVEUnauthenticated attackers can exploit a vulnerability in Saltcorn versions prior to 1.4.5, 1.5.5, and 1.6.0-beta.4 to write arbitrary files and list directory contents on the server.
BugSink Authenticated File Write Vulnerability (CVE-2026-40162)
2 rules 1 TTP 1 CVE 1 IOCBugSink 2.1.0 is vulnerable to an authenticated file write vulnerability (CVE-2026-40162) allowing an attacker with a valid authentication token to write arbitrary content to the filesystem, potentially leading to code execution or data compromise.
prompts.chat Path Traversal Vulnerability (CVE-2026-22661)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.
@mobilenext/mobile-mcp Path Traversal Vulnerability
2 rules 2 TTPsThe @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.