cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-47556,https://securityvulnerability.io/vulnerability/CVE-2024-47556,Remote Code Execution Vulnerability in Xerox FreeFlow Core,"The vulnerability identified presents the possibility of pre-authentication remote code execution through a path traversal technique. This security flaw enables unauthorized access to system files and executing commands on the server, posing a serious risk to organizations using the affected product. The improper validation of user-supplied input allows attackers to manipulate file paths, potentially leading to a full compromise of the system hosting Xerox FreeFlow Core. Companies relying on this software should promptly apply security patches provided in the relevant security bulletin to mitigate the risk.",Xerox,Freeflow Core,9.8,CRITICAL,0.000910000002477318,false,,false,false,false,,,false,false,,2024-10-07T19:15:00.000Z,0 CVE-2024-47557,https://securityvulnerability.io/vulnerability/CVE-2024-47557,Path Traversal Vulnerability in Xerox FreeFlow Core,"A path traversal vulnerability exists in Xerox FreeFlow Core, which may allow an attacker to execute remote code on the affected system without prior authentication. By exploiting this flaw, unauthorized users can traverse directories to access sensitive files and potentially gain control over the system. It is crucial for organizations utilizing this product to apply any available patches and implement security measures to mitigate the risk associated with this vulnerability.",Xerox,Freeflow Core,9.8,CRITICAL,0.000910000002477318,false,,false,false,false,,,false,false,,2024-10-07T19:15:00.000Z,0 CVE-2024-47558,https://securityvulnerability.io/vulnerability/CVE-2024-47558,Authenticated Remote Code Execution Vulnerability in Xerox FreeFlow Core,"An authenticated remote code execution vulnerability exists in Xerox FreeFlow Core, allowing for potential exploitation through a path traversal issue. Attackers with valid credentials could manipulate input paths to gain unauthorized access to system resources, potentially leading to malicious code execution. It is crucial for users of affected versions to apply the security updates provided in the Xerox Security Bulletin to mitigate this risk.",Xerox,Freeflow Core,8.8,HIGH,0.0004900000058114529,false,,false,false,false,,,false,false,,2024-10-07T19:15:00.000Z,0 CVE-2024-47559,https://securityvulnerability.io/vulnerability/CVE-2024-47559,Authenticated Remote Code Execution Vulnerability in Xerox FreeFlow Core,"The vulnerability in Xerox FreeFlow Core (v7.0) allows for authenticated remote code execution through a path traversal flaw. This issue occurs when improper validation of user-supplied input enables an attacker to alter file paths in a way that may lead to unauthorized access and execution of malicious code on the server. If exploited, this vulnerability poses significant risks to the confidentiality, integrity, and availability of the system. Users are strongly advised to apply available patches and enhancements to safeguard their environments.",Xerox,Freeflow Core,8.8,HIGH,0.0004900000058114529,false,,false,false,false,,,false,false,,2024-10-07T19:15:00.000Z,0