Vulnerabilities (CVE)

Filtered by CWE-22
Total 6658 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-4993 1 Ibm 1 Qradar Security Information And Event Manager 2021-05-07 4.0 MEDIUM 4.9 MEDIUM
IBM QRadar SIEM 7.3 and 7.4 when decompressing or verifying signature of zip files processes data in a way that may be vulnerable to path traversal attacks. IBM X-Force ID: 192905.
CVE-2021-20714 1 Wpfastestcache 1 Wp Fastest Cache 2021-05-06 5.5 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in WP Fastest Cache versions prior to 0.9.1.7 allows a remote attacker with administrator privileges to delete arbitrary files on the server via unspecified vectors.
CVE-2020-36321 1 Vaadin 2 Flow, Vaadin 2021-05-05 5.0 MEDIUM 7.5 HIGH
Improper URL validation in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
CVE-2021-30635 1 Sonatype 1 Nexus Repository Manager 2021-05-04 5.0 MEDIUM 5.3 MEDIUM
Sonatype Nexus Repository Manager 3.x before 3.30.1 allows a remote attacker to get a list of files and directories that exist in a UI-related folder via directory traversal (no customer-specific data is exposed).
CVE-2020-18070 1 Idreamsoft 1 Icms 2021-05-03 6.4 MEDIUM 9.1 CRITICAL
Path Traversal in iCMS v7.0.13 allows remote attackers to delete folders by injecting commands into a crafted HTTP request to the "do_del()" method of the component "database.admincp.php".
CVE-2017-1000026 1 Progress 1 Mixlib-archive 2021-04-30 5.0 MEDIUM 7.5 HIGH
Chef Software's mixlib-archive versions 0.3.0 and older are vulnerable to a directory traversal attack allowing attackers to overwrite arbitrary files by using ".." in tar archive entries
CVE-2020-7858 2 Cdnetworks, Microsoft 2 Aquanplayer, Windows 2021-04-29 5.0 MEDIUM 8.6 HIGH
There is a directory traversing vulnerability in the download page url of AquaNPlayer 2.0.0.92. The IP of the download page url is localhost and an attacker can traverse directories using "dot dot" sequences(../../) to view host file on the system. This vulnerability can cause information leakage.
CVE-2013-4668 2 Canonical, File Roller Project 2 Ubuntu Linux, File Roller 2021-04-28 5.0 MEDIUM N/A
Directory traversal vulnerability in File Roller 3.6.x before 3.6.4, 3.8.x before 3.8.3, and 3.9.x before 3.9.3, when libarchive is used, allows remote attackers to create arbitrary files via a crafted archive that is not properly handled in a "Keep directory structure" action, related to fr-archive-libarchive.c and fr-window.c.
CVE-2020-17564 1 Feifeicms 1 Feifeicms 2021-04-28 6.4 MEDIUM 9.1 CRITICAL
Path Traversal in FeiFeiCMS v4.0 allows remote attackers to delete arbitrary files by sending a crafted HTTP request to the " Admin/DataAction.class.php" component.
CVE-2020-17563 1 Feifeicms 1 Feifeicms 2021-04-28 6.4 MEDIUM 9.1 CRITICAL
Path Traversal in FeiFeiCMS v4.0 allows remote attackers to delete arbitrary files by sending a crafted HTTP request to " /index.php?s=/admin-tpl-del&id=".
CVE-2021-29466 1 Discord 1 Discord-recon 2021-04-27 5.0 MEDIUM 7.5 HIGH
Discord-Recon is a bot for the Discord chat service. In versions of Discord-Recon 0.0.3 and prior, a remote attacker is able to read local files from the server that can disclose important information. As a workaround, a bot maintainer can locate the file `app.py` and add `.replace('..', '')` into the `Path` variable inside of the `recon` function. The vulnerability is patched in version 0.0.4.
CVE-2021-0231 1 Juniper 15 Junos, Srx1500, Srx300 and 12 more 2021-04-27 6.8 MEDIUM 6.5 MEDIUM
A path traversal vulnerability in the Juniper Networks SRX and vSRX Series may allow an authenticated J-web user to read sensitive system files. This issue affects Juniper Networks Junos OS on SRX and vSRX Series: 19.3 versions prior to 19.3R2-S6, 19.3R3-S1; 19.4 versions prior to 19.4R2-S4, 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S3, 20.2R2; This issue does not affect Juniper Networks Junos OS versions prior to 19.3R1.
CVE-2020-7861 2 Anysupport, Microsoft 2 Anysupport, Windows 2021-04-26 7.5 HIGH 9.8 CRITICAL
AnySupport (Remote support solution) before 2019.3.21.0 allows directory traversing because of swprintf function to copy file from a management PC to a client PC. This can be lead to arbitrary file execution.
CVE-2021-27278 1 Parallels 1 Parallels Desktop 2021-04-26 4.6 MEDIUM 8.2 HIGH
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.1-49141. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the current user on the host system. Was ZDI-CAN-12130.
CVE-2015-2060 2 Cabextract Project, Linux 2 Cabextract, Linux Kernel 2021-04-26 5.0 MEDIUM 5.3 MEDIUM
cabextract before 1.6 does not properly check for leading slashes when extracting files, which allows remote attackers to conduct absolute directory traversal attacks via a malformed UTF-8 character that is changed to a UTF-8 encoded slash.
CVE-2016-10183 1 Dlink 2 Dwr-932b, Dwr-932b Firmware 2021-04-23 5.0 MEDIUM 7.5 HIGH
An issue was discovered on the D-Link DWR-932B router. qmiweb allows directory listing with ../ traversal.
CVE-2016-10184 1 Dlink 2 Dwr-932b, Dwr-932b Firmware 2021-04-23 5.0 MEDIUM 7.5 HIGH
An issue was discovered on the D-Link DWR-932B router. qmiweb allows file reading with ..%2f traversal.
CVE-2017-15363 1 Luracast 1 Restler 2021-04-21 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter.
CVE-2021-22190 1 Gitlab 1 Gitlab 2021-04-20 4.0 MEDIUM 6.5 MEDIUM
A path traversal vulnerability via the GitLab Workhorse in all versions of GitLab could result in the leakage of a JWT token
CVE-2020-24136 1 Wcms 1 Wcms 2021-04-19 7.8 HIGH 8.6 HIGH
Directory traversal in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the pagename parameter to wex/html.php.