Vulnerabilities (CVE)

Filtered by CWE-22
Total 6658 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-23119 2 Linux, Trendmicro 2 Linux Kernel, Deep Security Agent 2022-01-27 4.3 MEDIUM 7.5 HIGH
A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.
CVE-2020-19858 1 Plutinosoft 1 Platinum 2022-01-27 5.0 MEDIUM 7.5 HIGH
Platinum Upnp SDK through 1.2.0 has a directory traversal vulnerability. The attack could remote attack victim by sending http://ip:port/../privacy.avi URL to compromise a victim's privacy.
CVE-2021-46203 1 Taogogo 1 Taocms 2022-01-25 4.0 MEDIUM 6.5 MEDIUM
Taocms v3.0.2 was discovered to contain an arbitrary file read vulnerability via the path parameter.
CVE-2021-46104 1 Webp 1 Webp Server Go 2022-01-25 5.0 MEDIUM 7.5 HIGH
An issue was discovered in webp_server_go 0.4.0. There is a directory traversal vulnerability that can read arbitrary file information on the server.
CVE-2022-21693 1 Onionshare 1 Onionshare 2022-01-24 4.0 MEDIUM 6.5 MEDIUM
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions an adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. This can be mitigated by usage of the flatpak release.
CVE-2021-32674 1 Zope 1 Zope 2022-01-21 6.5 MEDIUM 8.8 HIGH
Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. The problem has been fixed in Zope 5.2.1 and 4.6.1. The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
CVE-2022-22054 1 Asus 2 Rt-ax56u, Rt-ax56u Firmware 2022-01-21 3.3 LOW 6.5 MEDIUM
ASUS RT-AX56U’s login function contains a path traversal vulnerability due to its inadequate filtering for special characters in URL parameters, which allows an unauthenticated local area network attacker to access restricted system paths and download arbitrary files.
CVE-2021-23514 1 Crowcpp 1 Crow 2022-01-19 5.0 MEDIUM 7.5 HIGH
This affects the package Crow before 0.3+4. It is possible to traverse directories to fetch arbitrary files from the server.
CVE-2022-22836 1 Coreftp 1 Core Ftp 2022-01-19 4.0 MEDIUM 6.5 MEDIUM
CoreFTP Server before 727 allows directory traversal (for file creation) by an authenticated attacker via ../ in an HTTP PUT request.
CVE-2022-22821 1 Nvidia 1 Nemo 2022-01-18 2.1 LOW 4.4 MEDIUM
NVIDIA NeMo before 1.6.0 contains a vulnerability in ASR WebApp, in which ../ Path Traversal may lead to deletion of any directory when admin privileges are available.
CVE-2021-28377 1 Chronoengine 1 Chronoforums 2022-01-18 5.0 MEDIUM 5.3 MEDIUM
ChronoForums 2.0.11 allows av Directory Traversal to read arbitrary files.
CVE-2021-28376 1 Chronoengine 1 Chronoforums 2022-01-18 4.0 MEDIUM 2.7 LOW
ChronoForms 7.0.7 allows fname Directory Traversal to read arbitrary files.
CVE-2021-39143 1 Linuxfoundation 1 Spinnaker 2022-01-18 3.6 LOW 7.1 HIGH
Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. For users unable to update disable Google AppEngine deployments and/or disable artifacts that provide TARs.
CVE-2021-40001 1 Huawei 1 Harmonyos 2022-01-13 5.0 MEDIUM 5.3 MEDIUM
The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable.
CVE-2021-40003 1 Huawei 1 Harmonyos 2022-01-13 5.0 MEDIUM 5.3 MEDIUM
HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
CVE-2021-39970 1 Huawei 1 Harmonyos 2022-01-13 5.0 MEDIUM 7.5 HIGH
HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission.
CVE-2021-44351 1 Naviwebs 1 Navigate Cms 2022-01-12 5.0 MEDIUM 7.5 HIGH
An arbitrary file read vulnerability exists in NavigateCMS 2.9 via /navigate/navigate_download.php id parameter.
CVE-2021-20133 1 Dlink 2 Dir-2640-us, Dir-2640-us Firmware 2022-01-12 7.1 HIGH 6.1 MEDIUM
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credentials, hardcoded plaintext passwords for other services, configuration files, and private keys can be disclosed in this fashion. Improper handling of filenames that identify virtual resources, such as "/dev/urandom" allows an attacker to effect a denial of service attack against the command line interfaces of the Quagga services (zebra and ripd).
CVE-2021-20134 1 Dlink 2 Dir-2640-us, Dir-2640-us Firmware 2022-01-12 7.4 HIGH 8.4 HIGH
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by either Quagga service (zebra or ripd). Subsequent log messages will be appended to the file, prefixed by a timestamp and some logging metadata. Remote code execution can be achieved by using this vulnerability to append to a shell script on the router's filesystem, and then awaiting or triggering the execution of that script. A remote, unauthenticated root shell can easily be obtained on the device in this fashion.
CVE-2021-37128 1 Huawei 1 Harmonyos 2022-01-11 7.5 HIGH 9.8 CRITICAL
HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file.