Vulnerabilities (CVE)

Filtered by CWE-22
Total 6979 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-13780 1 Eyesofnetwork 1 Eyesofnetwork 2025-04-20 5.0 MEDIUM 7.5 HIGH
The EyesOfNetwork web interface (aka eonweb) 5.1-0 allows directory traversal attacks for reading arbitrary files via the module/admin_conf/download.php file parameter.
CVE-2017-6527 1 Dnatools 1 Dnalims 2025-04-20 5.0 MEDIUM 7.5 HIGH
An issue was discovered in dnaTools dnaLIMS 4-2015s13. dnaLIMS is vulnerable to a NUL-terminated directory traversal attack allowing an unauthenticated attacker to access system files readable by the web server user (by using the viewAppletFsa.cgi seqID parameter).
CVE-2017-9024 1 Secure-bytes 1 Secure Cisco Auditor 2025-04-20 5.0 MEDIUM 7.5 HIGH
Secure Bytes Cisco Configuration Manager, as bundled in Secure Bytes Secure Cisco Auditor (SCA) 3.0, has a Directory Traversal issue in its TFTP Server, allowing attackers to read arbitrary files via ../ sequences in a pathname.
CVE-2016-10330 1 Synology 1 Photo Station 2025-04-20 4.6 MEDIUM 7.1 HIGH
Directory traversal vulnerability in synophoto_dsm_user, a SUID program, as used in Synology Photo Station before 6.5.3-3226 allows local users to write to arbitrary files via unspecified vectors.
CVE-2016-6126 1 Ibm 1 Kenexa Lms On Cloud 2025-04-20 4.0 MEDIUM 6.5 MEDIUM
IBM Kenexa LMS on Cloud 13.1 and 13.2 - 13.2.4 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
CVE-2017-10861 1 Qualitysoft 1 Qnd Advance\/standard 2025-04-20 6.4 MEDIUM 9.1 CRITICAL
Directory traversal vulnerability in QND Advance/Standard allows an attacker to read arbitrary files via a specially crafted command.
CVE-2016-8211 1 Dell 1 Emc Data Protection Advisor 2025-04-20 5.0 MEDIUM 7.5 HIGH
EMC Data Protection Advisor 6.1.x, EMC Data Protection Advisor 6.2, EMC Data Protection Advisor 6.2.1, EMC Data Protection Advisor 6.2.2, EMC Data Protection Advisor 6.2.3 prior to patch 446 has a path traversal vulnerability that may potentially be exploited by malicious users to compromise the affected system.
CVE-2016-6896 1 Wordpress 1 Wordpress 2025-04-20 5.5 MEDIUM 7.1 HIGH
Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
CVE-2017-6510 1 Efssoft 1 Easy File Sharing Ftp Server 2025-04-20 5.0 MEDIUM 7.5 HIGH
Easy File Sharing FTP Server version 3.6 is vulnerable to a directory traversal vulnerability which allows an attacker to list and download any file from any folder outside the FTP root Directory.
CVE-2017-8853 1 Fiyo 1 Fiyo Cms 2025-04-20 6.4 MEDIUM 7.5 HIGH
Fiyo CMS v2.0.7 has an arbitrary file delete vulnerability in dapur/apps/app_config/controller/backuper.php via directory traversal in the file parameter during an act=db action.
CVE-2016-4986 1 Jenkins 1 Tap 2025-04-20 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in the TAP plugin before 1.25 in Jenkins allows remote attackers to read arbitrary files via an unspecified parameter.
CVE-2017-11512 1 Manageengine 1 Servicedesk 2025-04-20 5.0 MEDIUM 7.5 HIGH
The ManageEngine ServiceDesk 9.3.9328 is vulnerable to arbitrary file downloads due to improper restrictions of the pathname used in the name parameter for the download-snapshot URL. An unauthenticated remote attacker can use this vulnerability to download arbitrary files.
CVE-2017-16788 1 Meinbergglobal 2 Lantime, Lantime Firmware 2025-04-20 9.0 HIGH 7.2 HIGH
Directory traversal vulnerability in the "Upload Groupkey" functionality in the Web Configuration Utility in Meinberg LANTIME devices with firmware before 6.24.004 allows remote authenticated users with Admin-User access to write to arbitrary files and consequently gain root privileges by uploading a file, as demonstrated by storing a file in the cron.d directory.
CVE-2015-2856 1 Accellion 1 File Transfer Appliance 2025-04-20 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in the template function in function.inc in Accellion File Transfer Appliance devices before FTA_9_11_210 allows remote attackers to read arbitrary files via a .. (dot dot) in the statecode cookie.
CVE-2017-14614 1 Gridgain 1 Gridgain 2025-04-20 4.0 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in the Visor GUI Console in GridGain before 1.7.16, 1.8.x before 1.8.12, 1.9.x before 1.9.7, and 8.x before 8.1.5 allows remote authenticated users to read arbitrary files on remote cluster nodes via a crafted path.
CVE-2016-7569 1 Docker2aci Project 1 Docker2aci 2025-04-20 4.3 MEDIUM 5.5 MEDIUM
Directory traversal vulnerability in docker2aci before 0.13.0 allows remote attackers to write to arbitrary files via a .. (dot dot) in the embedded layer data in an image.
CVE-2016-10184 1 Dlink 2 Dwr-932b, Dwr-932b Firmware 2025-04-20 5.0 MEDIUM 7.5 HIGH
An issue was discovered on the D-Link DWR-932B router. qmiweb allows file reading with ..%2f traversal.
CVE-2017-10841 1 Webcalendar Project 1 Webcalendar 2025-04-20 4.0 MEDIUM 4.9 MEDIUM
Directory traversal vulnerability in WebCalendar 1.2.7 and earlier allows authenticated attackers to read arbitrary files via unspecified vectors.
CVE-2017-7675 1 Apache 1 Tomcat 2025-04-20 5.0 MEDIUM 7.5 HIGH
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.
CVE-2015-7888 1 Samsung 2 Galaxy S6 Edge, Galaxy S6 Edge Firmware 2025-04-20 7.8 HIGH 7.5 HIGH
Directory traversal vulnerability in the WifiHs20UtilityService on the Samsung S6 Edge LRX22G.G925VVRU1AOE2 allows remote attackers to overwrite or create arbitrary files as the system-level user via a .. (dot dot) in the name of a file, compressed into a zipped file named cred.zip, and downloaded to /sdcard/Download.