Vulnerabilities (CVE)

Filtered by CWE-22
Total 7200 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-43795 1 Linecorp 1 Armeria 2024-11-21 5.0 MEDIUM 7.5 HIGH
Armeria is an open source microservice framework. In affected versions an attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly. This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path.
CVE-2021-43788 1 Nodebb 1 Nodebb 2024-11-21 4.0 MEDIUM 5.0 MEDIUM
Nodebb is an open source Node.js based forum software. Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory. The vulnerability has been patched as of v1.18.5. Users are advised to upgrade as soon as possible.
CVE-2021-43778 1 Glpi-project 1 Barcode 2024-11-21 5.0 MEDIUM 9.1 CRITICAL
Barcode is a GLPI plugin for printing barcodes and QR codes. GLPI instances version 2.x prior to version 2.6.1 with the barcode plugin installed are vulnerable to a path traversal vulnerability. This issue was patched in version 2.6.1. As a workaround, delete the `front/send.php` file.
CVE-2021-43775 1 Aimstack 1 Aim 2024-11-21 5.0 MEDIUM 8.6 HIGH
Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0.
CVE-2021-43741 1 Cmsimple 1 Cmsimple 2024-11-21 7.5 HIGH 9.8 CRITICAL
CMSimple 5.4 is vulnerable to Directory Traversal. The vulnerability exists when a user changes the file name to malicious file on config.php leading to remote code execution.
CVE-2021-43734 1 Keking 1 Kkfileview 2024-11-21 5.0 MEDIUM 7.5 HIGH
kkFileview v4.0.0 has arbitrary file read through a directory traversal vulnerability which may lead to sensitive file leak on related host.
CVE-2021-43691 1 Tripexpress Project 1 Tripexpress 2024-11-21 7.5 HIGH 9.8 CRITICAL
tripexpress v1.1 is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability.
CVE-2021-43676 1 Swoole 1 Swoole Php Framework 2024-11-21 7.5 HIGH 9.8 CRITICAL
matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php.
CVE-2021-43674 1 Thinkupapp 1 Thinkup 2024-11-21 7.5 HIGH 9.8 CRITICAL
ThinkUp 2.0-beta.10 is affected by a path manipulation vulnerability in Smarty.class.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2021-43555 1 Myscada 1 Mydesigner 2024-11-21 6.8 MEDIUM 7.3 HIGH
mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution.
CVE-2021-43496 1 Clustering Project 1 Clustering 2024-11-21 5.0 MEDIUM 7.5 HIGH
Clustering master branch as of commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
CVE-2021-43495 1 Alquistai 1 Alquist 2024-11-21 5.0 MEDIUM 7.5 HIGH
AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
CVE-2021-43494 1 Codingforentrepreneurs 1 Opencv Rest Api 2024-11-21 5.0 MEDIUM 7.5 HIGH
OpenCV-REST-API master branch as of commit 69be158c05d4dd5a4aff38fdc680a162dd6b9e49 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
CVE-2021-43493 1 Servermanagement Project 1 Servermanagement 2024-11-21 5.0 MEDIUM 7.5 HIGH
ServerManagement master branch as of commit 49491cc6f94980e6be7791d17be947c27071eb56 is affected by a directory traversal vulnerability. This vulnerability can be used to extract credentials which can in turn be used to execute code.
CVE-2021-43492 1 Alquistai 1 Alquist 2024-11-21 5.0 MEDIUM 7.5 HIGH
AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system andcan significantly aid in getting remote code access.
CVE-2021-43358 1 Sun 1 Ehrd 2024-11-21 7.8 HIGH 7.5 HIGH
Sunnet eHRD has inadequate filtering for special characters in URLs, which allows a remote attacker to perform path traversal attacks without authentication, access restricted paths and download system files.
CVE-2021-43290 1 Thoughtworks 1 Gocd 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into a directory of a GoCD server. They can control the filename but the directory is placed inside of a directory that they can't control.
CVE-2021-43289 1 Thoughtworks 1 Gocd 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into an arbitrary directory of a GoCD server, but does not control the filename.
CVE-2021-43264 1 Mahara 1 Mahara 2024-11-21 2.1 LOW 3.3 LOW
In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, adjusting the path component for the page help file allows attackers to bypass the intended access control for HTML files via directory traversal. It replaces the - character with the / character.
CVE-2021-43176 1 Goautodial 2 Goautodial, Goautodial Api 2024-11-21 6.5 MEDIUM 8.8 HIGH
The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 takes a user-supplied “action” parameter and appends a .php file extension to locate and load the correct PHP file to implement the API call. Vulnerable versions of GOautodial do not sanitize the user input that specifies the action. This permits an attacker to execute any PHP source file with a .php extension that is present on the disk and readable by the GOautodial web server process. Combined with CVE-2021-43175, it is possible for the attacker to do this without valid credentials. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C