Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. CWE List

CWE-36 - Absolute Path Traversal

Latest vulnerabilities for CWE-36

Remote code execution in Barracuda Service Center 2025-12-23
Critical Yes
Multiple vulnerabilities in IBM QRadar Deployment Intelligence App 2025-01-23
Medium Yes
Multiple vulnerabilities in IBM Cloud Pak System 2025-01-20
Medium Yes
Multiple vulnerabilities in Ivanti Endpoint Manager 2025-01-15
High Yes Public exploit
Multiple vulnerabilities in Honeywell Experion PKS, Experion LX, PlantCruise by Experion, Safety Manager and Safety Manager SC 2024-04-26
High Yes
Multiple vulnerabilities in Microsoft Defender for IoT 2024-04-09
Medium Yes
Multiple vulnerabilities in IBM Watson Machine Learning Accelerator on Cloud Pak for Data 2024-02-27
High Yes
Absolute path traversal in IBM InfoSphere Information Server 2024-02-22
Low Yes
Multiple vulnerabilities in IBM QRadar Suite software 2023-11-20
High Yes
Multiple vulnerabilities in IBM QRadar User Behavior Analytics 2023-10-24
Critical Yes

References

Description of CWE-36 on Mitre website

Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Evelyn Stealer targets developers via malicious VS Code extensions
  • Illegal Telegram marketplace Tudou Guarantee winds down operations
  • North Korea-linked hackers abuse Google, Naver ads to spread malware
  • TamperedChef campaign delivers backdoor via malicious PDFs
  • Malicious Chrome extension triggers browser crashes in new CrashFix attack
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2026 Cybersecurity Help s.r.o.