Vulnerabilities (CVE)

Filtered by CWE-22
Total 7244 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-2090 1 Cubecart 1 Cubecart 2025-04-20 4.0 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in CubeCart versions prior to 6.1.4 allows remote authenticated attackers to read arbitrary files via unspecified vectors.
CVE-2017-7442 1 Gonitro 1 Nitro Pro 2025-04-20 6.8 MEDIUM 8.8 HIGH
Nitro Pro 11.0.3.173 allows remote attackers to execute arbitrary code via saveAs and launchURL calls with directory traversal sequences.
CVE-2017-8921 1 Flightgear 1 Flightgear 2025-04-20 5.0 MEDIUM 7.5 HIGH
In FlightGear before 2017.2.1, the FGCommand interface allows overwriting any file the user has write access to, but not with arbitrary data: only with the contents of a FlightGear flightplan (XML). A resource such as a malicious third-party aircraft could exploit this to damage files belonging to the user. Both this issue and CVE-2016-9956 are directory traversal vulnerabilities in Autopilot/route_mgr.cxx - this one exists because of an incomplete fix for CVE-2016-9956.
CVE-2015-4074 1 Helpdesk Pro Project 1 Helpdesk Pro 2025-04-20 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in the Helpdesk Pro plugin before 1.4.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter in a ticket.download_attachment task.
CVE-2017-4980 1 Emc 1 Isilon Onefs 2025-04-20 5.0 MEDIUM 7.5 HIGH
EMC Isilon OneFS is affected by a path traversal vulnerability that may potentially be exploited by attackers to compromise the affected system. Affected versions are 7.1.0 - 7.1.1.10, 7.2.0 - 7.2.1.3, and 8.0.0 - 8.0.0.1.
CVE-2017-8115 1 Modx 1 Modx Revolution 2025-04-20 5.0 MEDIUM 5.3 MEDIUM
Directory traversal in setup/processors/url_search.php (aka the search page of an unused processor) in MODX Revolution 2.5.7 might allow remote attackers to obtain system directory information.
CVE-2017-12285 1 Cisco 1 Prime Network Analysis Module 2025-04-20 6.4 MEDIUM 5.3 MEDIUM
A vulnerability in the web interface of Cisco Network Analysis Module Software could allow an unauthenticated, remote attacker to delete arbitrary files from an affected system, aka Directory Traversal. The vulnerability exists because the affected software does not perform proper input validation of HTTP requests that it receives and the software does not apply role-based access controls (RBACs) to requested HTTP URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to delete arbitrary files from the affected system. Cisco Bug IDs: CSCvf41365.
CVE-2017-7577 1 Xiongmaitech 1 Uc-httpd 2025-04-20 5.0 MEDIUM 9.8 CRITICAL
XiongMai uc-httpd has directory traversal allowing the reading of arbitrary files via a "GET ../" HTTP request.
CVE-2017-11162 1 Synology 1 Photo Station 2025-04-20 4.0 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in synphotoio in Synology Photo Station before 6.7.4-3433 and 6.3-2968 allows remote authenticated users to read arbitrary files via unspecified vectors.
CVE-2015-1199 1 Ppmd Project 1 Ppmd 2025-04-20 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in ppmd 10.1-5.
CVE-2017-2706 1 Huawei 2 Mate 9, Mate 9 Firmware 2025-04-20 5.8 MEDIUM 7.1 HIGH
Mate 9 smartphones with software MHA-AL00AC00B125 have a directory traversal vulnerability in Push module. Since the system does not verify the file name during decompression, system directories are traversed. It could be exploited to cause the attacker to replace files and impact the service.
CVE-2017-15363 1 Luracast 1 Restler 2025-04-20 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter.
CVE-2016-5941 1 Ibm 1 Kenexa Lms 2025-04-20 3.5 LOW 5.7 MEDIUM
IBM Kenexa LMS on Cloud could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing dot dot sequences (/../) to view arbitrary files on the system.
CVE-2017-16903 1 Lvyecms Project 1 Lvyecms 2025-04-20 7.5 HIGH 9.8 CRITICAL
LvyeCMS through 3.1 allows remote attackers to upload and execute arbitrary PHP code via directory traversal sequences in the dir parameter, in conjunction with PHP code in the content parameter, within a template Style add request to index.php.
CVE-2016-6600 1 Zohocorp 1 Webnms Framework 2025-04-20 7.5 HIGH 9.8 CRITICAL
Directory traversal vulnerability in the file upload functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to upload and execute arbitrary JSP files via a .. (dot dot) in the fileName parameter to servlets/FileUploadServlet.
CVE-2016-8205 1 Brocade 1 Network Advisor 2025-04-20 10.0 HIGH 9.8 CRITICAL
A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed.
CVE-2017-7565 1 Splunk 1 Hadoop Connect 2025-04-20 6.5 MEDIUM 8.8 HIGH
Splunk Hadoop Connect App has a path traversal vulnerability that allows remote authenticated users to execute arbitrary code, aka ERP-2041.
CVE-2017-9067 2 Modx, Php 2 Modx Revolution, Php 2025-04-20 4.4 MEDIUM 7.0 HIGH
In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
CVE-2016-4986 1 Jenkins 1 Tap 2025-04-20 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in the TAP plugin before 1.25 in Jenkins allows remote attackers to read arbitrary files via an unspecified parameter.
CVE-2016-7135 1 Plone 1 Plone 2025-04-20 4.0 MEDIUM 4.9 MEDIUM
Directory traversal vulnerability in Plone CMS 5.x through 5.0.6 and 4.2.x through 4.3.11 allows remote administrators to read arbitrary files via a .. (dot dot) in the path parameter in a getFile action to Plone/++theme++barceloneta/@@plone.resourceeditor.filemanager-actions.