Vulnerabilities (CVE)

Filtered by CWE-22
Total 7028 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-5764 1 Mxplayer 1 Mx Player 2024-11-21 5.8 MEDIUM 8.8 HIGH
MX Player Android App versions prior to v1.24.5, are vulnerable to a directory traversal vulnerability when user is using the MX Transfer feature in "Receive" mode. An attacker can exploit this by connecting to the MX Transfer session as a "sender" and sending a MessageType of "FILE_LIST" with a "name" field containing directory traversal characters (../). This will result in the file being transferred to the victim's phone, but being saved outside of the intended "/sdcard/MXshare" directory. In some instances, an attacker can achieve remote code execution by writing ".odex" and ".vdex" files in the "oat" directory of the MX Player application.
CVE-2020-5752 1 Druva 1 Insync Client 2024-11-21 7.2 HIGH 7.8 HIGH
Relative path traversal in Druva inSync Windows Client 6.6.3 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges.
CVE-2020-5744 1 Tecnick 1 Tcexam 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
Relative Path Traversal in TCExam 14.2.2 allows a remote, authenticated attacker to read the contents of arbitrary files on disk.
CVE-2020-5720 1 Mikrotik 1 Winbox 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
MikroTik WinBox before 3.21 is vulnerable to a path traversal vulnerability that allows creation of arbitrary files wherevere WinBox has write permissions. WinBox is vulnerable to this attack if it connects to a malicious endpoint or if an attacker mounts a man in the middle attack.
CVE-2020-5683 1 Weseek 1 Growi 2024-11-21 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to alter the data by uploading a specially crafted file.
CVE-2020-5639 1 Soliton 1 Filezen 2024-11-21 10.0 HIGH 9.8 CRITICAL
Directory traversal vulnerability in FileZen versions from V3.0.0 to V4.2.2 allows remote attackers to upload an arbitrary file in a specific directory via unspecified vectors. As a result, an arbitrary OS command may be executed.
CVE-2020-5614 1 Kujirahand 1 Konawiki 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Directory traversal vulnerability in KonaWiki 3.1.0 and earlier allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2020-5609 1 Yokogawa 8 B\/m9000cs, B\/m9000cs Firmware, B\/m9000vp and 5 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to create or overwrite arbitrary files and run arbitrary commands via unspecified vectors.
CVE-2020-5605 1 Buffalo 2 Airstation Whr-g54s, Airstation Whr-g54s Firmware 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Directory traversal vulnerability in WHR-G54S firmware 1.43 and earlier allows an attacker to access sensitive information such as setting values via unspecified vectors.
CVE-2020-5590 1 Ec-cube 1 Ec-cube 2024-11-21 5.5 MEDIUM 8.1 HIGH
Directory traversal vulnerability in EC-CUBE 3.0.0 to 3.0.18 and 4.0.0 to 4.0.3 allows remote authenticated attackers to delete arbitrary files and/or directories on the server via unspecified vectors.
CVE-2020-5588 1 Cybozu 1 Garoon 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
Path traversal vulnerability in Cybozu Garoon 5.0.0 to 5.0.1 allows attacker with administrator rights to obtain unintended information via unspecified vectors.
CVE-2020-5581 1 Cybozu 1 Garoon 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Path traversal vulnerability in Cybozu Garoon 4.0.0 to 5.0.1 allows remote authenticated attackers to obtain unintended information via unspecified vectors.
CVE-2020-5554 1 Shihonkanri Plus Goout Project 1 Shihonkanri Plus Goout 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
Directory traversal vulnerability in Shihonkanri Plus GOOUT Ver1.5.8 and Ver2.2.10 allows remote attackers to read and write arbitrary files via unspecified vectors.
CVE-2020-5513 1 Gilacms 1 Gila Cms 2024-11-21 6.8 MEDIUM 6.8 MEDIUM
Gila CMS 1.11.8 allows /cm/delete?t=../ Directory Traversal.
CVE-2020-5512 1 Gilacms 1 Gila Cms 2024-11-21 6.8 MEDIUM 6.8 MEDIUM
Gila CMS 1.11.8 allows /admin/media?path=../ Path Traversal.
CVE-2020-5405 1 Vmware 1 Spring Cloud Config 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
CVE-2020-5377 1 Dell 1 Emc Openmanage Server Administrator 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
Dell EMC OpenManage Server Administrator (OMSA) versions 9.4 and prior contain multiple path traversal vulnerabilities. An unauthenticated remote attacker could potentially exploit these vulnerabilities by sending a crafted Web API request containing directory traversal character sequences to gain file system access on the compromised management station.
CVE-2020-5370 1 Dell 1 Emc Openmanage Enterprise 2024-11-21 6.0 MEDIUM 7.9 HIGH
Dell EMC OpenManage Enterprise (OME) versions prior to 3.4 contain an arbitrary file overwrite vulnerability. A remote authenticated malicious user with high privileges could potentially exploit this vulnerability to overwrite arbitrary files via directory traversal sequences using a crafted tar file to inject malicious RPMs which may cause a denial of service or perform unauthorized actions.
CVE-2020-5366 1 Dell 2 Idrac9, Idrac9 Firmware 2024-11-21 4.0 MEDIUM 7.1 HIGH
Dell EMC iDRAC9 versions prior to 4.20.20.20 contain a Path Traversal Vulnerability. A remote authenticated malicious user with low privileges could potentially exploit this vulnerability by manipulating input parameters to gain unauthorized read access to the arbitrary files.
CVE-2020-5284 1 Zeit 1 Next.js 2024-11-21 5.0 MEDIUM 4.4 MEDIUM
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.