Total
7026 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-18665 | 1 Webport | 1 Web Port | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
Directory Traversal vulnerability in WebPort <=1.19.1 in tags of system settings. | |||||
CVE-2020-18438 | 1 Phpok | 1 Phpok | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Directory traversal vulnerability in qinggan phpok 5.1, allows attackers to disclose sensitive information, via the title parameter to admin.php. | |||||
CVE-2020-18191 | 1 Get-simple | 1 Getsimplecms | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
GetSimpleCMS-3.3.15 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php | |||||
CVE-2020-18190 | 1 Bludit | 1 Bludit | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
Bludit v3.8.1 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /admin/ajax/upload-profile-picture. | |||||
CVE-2020-18178 | 1 Hongcms Project | 1 Hongcms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Path Traversal in HongCMS v4.0.0 allows remote attackers to view, edit, and delete arbitrary files via a crafted POST request to the component "/hcms/admin/index.php/language/ajax." | |||||
CVE-2020-18127 | 1 Indexhibit | 1 Indexhibit | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
An issue in the /config/config.php component of Indexhibit 2.1.5 allows attackers to arbitrarily view files. | |||||
CVE-2020-18070 | 1 Idreamsoft | 1 Icms | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
Path Traversal in iCMS v7.0.13 allows remote attackers to delete folders by injecting commands into a crafted HTTP request to the "do_del()" method of the component "database.admincp.php". | |||||
CVE-2020-17564 | 1 Feifeicms | 1 Feifeicms | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
Path Traversal in FeiFeiCMS v4.0 allows remote attackers to delete arbitrary files by sending a crafted HTTP request to the " Admin/DataAction.class.php" component. | |||||
CVE-2020-17563 | 1 Feifeicms | 1 Feifeicms | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
Path Traversal in FeiFeiCMS v4.0 allows remote attackers to delete arbitrary files by sending a crafted HTTP request to " /index.php?s=/admin-tpl-del&id=". | |||||
CVE-2020-17518 | 1 Apache | 1 Flink | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master. | |||||
CVE-2020-17389 | 1 Marvell | 1 Qconvergeconsole | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the decryptFile method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10502. | |||||
CVE-2020-17387 | 1 Marvell | 1 Qconvergeconsole | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the writeObjectToConfigFile method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10565. | |||||
CVE-2020-17383 | 1 Telosalliance | 2 Z\/ip One, Z\/ip One Firmware | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI. | |||||
CVE-2020-16245 | 1 Advantech | 1 Iview | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Advantech iView, Versions 5.7 and prior. The affected product is vulnerable to path traversal vulnerabilities that could allow an attacker to create/download arbitrary files, limit system availability, and remotely execute code. | |||||
CVE-2020-16136 | 1 Tgstation13 | 1 Tgstation-server | 2024-11-21 | 6.8 MEDIUM | 7.7 HIGH |
In tgstation-server 4.4.0 and 4.4.1, an authenticated user with permission to download logs can download any file on the server machine (accessible by the owner of the server process) via directory traversal ../ sequences in /Administration/Logs/ requests. The attacker is unable to enumerate files, however. | |||||
CVE-2020-16116 | 5 Canonical, Debian, Fedoraproject and 2 more | 5 Ubuntu Linux, Debian Linux, Fedora and 2 more | 2024-11-21 | 4.3 MEDIUM | 3.3 LOW |
In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal. | |||||
CVE-2020-15941 | 1 Fortinet | 1 Forticlient Endpoint Management Server | 2024-11-21 | 5.5 MEDIUM | 5.4 MEDIUM |
A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages. | |||||
CVE-2020-15929 | 1 Ortussolutions | 1 Testbox | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In Ortus TestBox 2.4.0 through 4.1.0, unvalidated query string parameters passed to system/runners/HTMLRunner.cfm allow an attacker to write an arbitrary CFM file (within the application's context) containing attacker-defined CFML tags, leading to Remote Code Execution. | |||||
CVE-2020-15928 | 1 Ortussolutions | 1 Testbox | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
In Ortus TestBox 2.4.0 through 4.1.0, unvalidated query string parameters to test-browser/index.cfm allow directory traversal. | |||||
CVE-2020-15923 | 1 Midasolutions | 1 Eframework | 2024-11-21 | 7.8 HIGH | 7.5 HIGH |
Mida eFramework through 2.9.0 allows unauthenticated ../ directory traversal. |