Vulnerabilities (CVE)

Filtered by CWE-22
Total 6658 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-13241 2 Canonical, Flightcrew Project 2 Ubuntu Linux, Flightcrew 2023-02-28 6.8 MEDIUM 7.8 HIGH
FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
CVE-2019-1010257 1 Article2pdf Project 1 Article2pdf 2023-02-28 7.5 HIGH 9.1 CRITICAL
An Information Disclosure / Data Modification issue exists in article2pdf_getfile.php in the article2pdf Wordpress plugin 0.24, 0.25, 0.26, 0.27. A URL can be constructed which allows overriding the PDF file's path leading to any PDF whose path is known and which is readable to the web server can be downloaded. The file will be deleted after download if the web server has permission to do so. For PHP versions before 5.3, any file can be read by null terminating the string left of the file extension.
CVE-2018-3714 1 Node-srv Project 1 Node-srv 2023-02-28 4.0 MEDIUM 6.5 MEDIUM
node-srv node module suffers from a Path Traversal vulnerability due to lack of validation of url, which allows a malicious user to read content of any file with known path.
CVE-2018-3713 1 Angular-http-server Project 1 Angular-http-server 2023-02-28 4.0 MEDIUM 6.5 MEDIUM
angular-http-server node module suffers from a Path Traversal vulnerability due to lack of validation of possibleFilename, which allows a malicious user to read content of any file with known path.
CVE-2018-3733 1 Crud-file-server Project 1 Crud-file-server 2023-02-28 5.0 MEDIUM 7.5 HIGH
crud-file-server node module before 0.9.0 suffers from a Path Traversal vulnerability due to incorrect validation of url, which allows a malicious user to read content of any file with known path.
CVE-2018-3710 2 Debian, Gitlab 2 Debian Linux, Gitlab 2023-02-28 6.8 MEDIUM 7.8 HIGH
Gitlab Community and Enterprise Editions version 10.3.3 is vulnerable to an Insecure Temporary File in the project import component resulting remote code execution.
CVE-2018-3787 1 Simplehttpserver Project 1 Simplehttpserver 2023-02-28 5.0 MEDIUM 7.5 HIGH
Path traversal in simplehttpserver <v0.2.1 allows listing any file on the server.
CVE-2018-3770 1 Markdown-pdf Project 1 Markdown-pdf 2023-02-28 2.1 LOW 5.5 MEDIUM
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3766 1 Buttle Project 1 Buttle 2023-02-28 5.0 MEDIUM 7.5 HIGH
Path traversal in buttle module versions <= 0.2.0 allows to read any file in the server.
CVE-2018-3732 1 Resolve-path Project 1 Resolve-path 2023-02-28 5.0 MEDIUM 7.5 HIGH
resolve-path node module before 1.4.0 suffers from a Path Traversal vulnerability due to lack of validation of paths with certain special characters, which allows a malicious user to read content of any file with known path.
CVE-2018-3729 1 Localhost-now Project 1 Localhost-now 2023-02-28 5.0 MEDIUM 7.5 HIGH
localhost-now node module suffers from a Path Traversal vulnerability due to lack of validation of file, which allows a malicious user to read content of any file with known path.
CVE-2018-3727 1 626 Project 1 626 2023-02-28 5.0 MEDIUM 7.5 HIGH
626 node module suffers from a Path Traversal vulnerability due to lack of validation of file, which allows a malicious user to read content of any file with known path.
CVE-2022-33892 1 Intel 1 Quartus Prime 2023-02-27 N/A 7.8 HIGH
Path traversal in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-11557 1 Web-dorado 1 Wp Form Builder 2023-02-27 6.8 MEDIUM 8.8 HIGH
The WebDorado Contact Form Builder plugin before 1.0.69 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsanitized.
CVE-2019-11591 1 Web-dorado 1 Contact Form 2023-02-27 6.8 MEDIUM 8.8 HIGH
The WebDorado Contact Form plugin before 1.13.5 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsanitized.
CVE-2022-31836 1 Beego 1 Beego 2023-02-24 7.5 HIGH 9.8 CRITICAL
The leafInfo.match() function in Beego v2.0.3 and below uses path.join() to deal with wildcardvalues which can lead to cross directory risk.
CVE-2019-14206 1 Nevma 1 Adaptive Images 2023-02-24 6.4 MEDIUM 7.5 HIGH
An Arbitrary File Deletion vulnerability in the Nevma Adaptive Images plugin before 0.6.67 for WordPress allows remote attackers to delete arbitrary files via the $REQUEST['adaptive-images-settings'] parameter in adaptive-images-script.php.
CVE-2019-15323 1 Ad Inserter Project 1 Ad Inserter 2023-02-24 5.0 MEDIUM 7.5 HIGH
The ad-inserter plugin before 2.4.20 for WordPress has path traversal.
CVE-2022-23457 3 Netapp, Oracle, Owasp 4 Active Iq Unified Manager, Oncommand Workflow Automation, Weblogic Server and 1 more 2023-02-23 7.5 HIGH 9.8 CRITICAL
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
CVE-2021-37712 5 Debian, Microsoft, Npmjs and 2 more 5 Debian Linux, Windows, Tar and 2 more 2023-02-23 4.4 MEDIUM 8.6 HIGH
The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.