Vulnerabilities (CVE)

Filtered by CWE-22
Total 7182 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-8712 1 Webmin 1 Webmin 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered in Webmin 1.840 and 1.880 when the default Yes setting of "Can view any file as a log file" is enabled. As a result of weak default configuration settings, limited users have full access rights to the underlying Unix system files, allowing the user to read sensitive data from the local system (using Local File Include) such as the '/etc/shadow' file via a "GET /syslog/save_log.cgi?view=1&file=/etc/shadow" request.
CVE-2018-8495 1 Microsoft 2 Windows 10, Windows Server 2016 2024-11-21 7.6 HIGH 7.5 HIGH
A remote code execution vulnerability exists when Windows Shell improperly handles URIs, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
CVE-2018-8041 1 Apache 1 Camel 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal.
CVE-2018-8009 1 Apache 1 Hadoop 2024-11-21 6.5 MEDIUM 8.8 HIGH
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.
CVE-2018-8008 1 Apache 1 Storm 2024-11-21 5.8 MEDIUM 5.5 MEDIUM
Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
CVE-2018-8003 1 Apache 1 Ambari 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Apache Ambari, versions 1.4.0 to 2.6.1, is susceptible to a directory traversal attack allowing an unauthenticated user to craft an HTTP request which provides read-only access to any file on the filesystem of the host the Ambari Server runs on that is accessible by the user the Ambari Server is running as. Direct network access to the Ambari Server is required to issue this request, and those Ambari Servers that are protected behind a firewall, or in a restricted network zone are at less risk of being affected by this issue.
CVE-2018-7933 1 Huawei 4 Hirouter-cd20, Hirouter-cd20 Firmware, Ws5200 and 1 more 2024-11-21 6.8 MEDIUM 7.8 HIGH
Huawei home gateway products HiRouter-CD20 and WS5200 with the versions before HiRouter-CD20-10 1.9.6 and the versions before WS5200-10 1.9.6 have a path traversal vulnerability. Due to the lack of validation while these home gateway products install APK plugins, an attacker tricks a user into installing a malicious APK plugin, and plugin can overwrite arbitrary file of devices. Successful exploit may result in arbitrary code execution or privilege escalation.
CVE-2018-7835 1 Schneider-electric 1 Iiot Monior 2024-11-21 7.8 HIGH 7.5 HIGH
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in IIoT Monitor 3.1.38 which could allow access to files available to SYSTEM user.
CVE-2018-7807 1 Schneider-electric 1 Struxureware Data Center Expert 2024-11-21 6.5 MEDIUM 8.8 HIGH
Data Center Expert, versions 7.5.0 and earlier, allows for the upload of a zip file from its user interface to the server. A carefully crafted, malicious file could be mistakenly uploaded by an authenticated user via this feature which could contain path traversal file names. As such, it could allow for the arbitrary upload of files contained with the zip onto the server file system outside of the intended directory. This is leveraging the more commonly known ZipSlip vulnerability within Java code.
CVE-2018-7806 1 Schneider-electric 1 Struxureware Data Center Operation 2024-11-21 6.5 MEDIUM 8.8 HIGH
Data Center Operation allows for the upload of a zip file from its user interface to the server. A carefully crafted, malicious file could be mistakenly uploaded by an authenticated user via this feature which could contain path traversal file names. As such, it could allow for the arbitrary upload of files contained with the zip onto the server file system outside of the intended directory. This is leveraging the more commonly known ZipSlip vulnerability within Java code.
CVE-2018-7771 1 Schneider-electric 1 U.motion Builder 2024-11-21 6.0 MEDIUM 8.0 HIGH
The vulnerability exists within processing of editscript.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A directory traversal vulnerability allows a caller with standard user privileges to write arbitrary php files anywhere in the web service directory tree.
CVE-2018-7770 1 Schneider-electric 1 U.motion 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
The vulnerability exists within processing of sendmail.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The applet allows callers to select arbitrary files to send to an arbitrary email address.
CVE-2018-7764 1 Schneider-electric 1 U.motion Builder 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
The vulnerability exists within runscript.php applet in Schneider Electric U.motion Builder software versions prior to v1.3.4. There is a directory traversal vulnerability in the processing of the 's' parameter of the applet.
CVE-2018-7763 1 Schneider-electric 1 U.motion Builder 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
The vulnerability exists within css.inc.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The 'css' parameter contains a directory traversal vulnerability.
CVE-2018-7719 2 Acrolinx, Microsoft 2 Acrolinx Server, Windows 2024-11-21 5.0 MEDIUM 7.5 HIGH
Acrolinx Server before 5.2.5 on Windows allows Directory Traversal.
CVE-2018-7706 1 Securenvoy 1 Securmail 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote authenticated users to read arbitrary e-mail messages via a .. (dot dot) in the option2 parameter in an attachment action to secmail/getmessage.exe.
CVE-2018-7705 1 Securenvoy 1 Securmail 2024-11-21 5.5 MEDIUM 8.1 HIGH
Directory traversal vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote authenticated users to read e-mail messages to arbitrary recipients via a .. (dot dot) in the filename parameter to secupload2/upload.aspx.
CVE-2018-7669 1 Sitecore 1 Sitecore.net 2024-11-21 7.8 HIGH 7.5 HIGH
An issue was discovered in Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 and above. The 'Log Viewer' application is vulnerable to a directory traversal attack, allowing an attacker to access arbitrary files from the host Operating System using a sitecore/shell/default.aspx?xmlcontrol=LogViewerDetails&file= URI. Validation is performed to ensure that the text passed to the 'file' parameter correlates to the correct log file directory. This filter can be bypassed by including a valid log filename and then appending a traditional 'dot dot' style attack.
CVE-2018-7654 1 3cx 1 3cx 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
On 3CX 15.5.6354.2 devices, the parameter "file" in the request "/api/RecordingList/download?file=" allows full access to files on the server via path traversal.
CVE-2018-7586 1 Imagely 1 Nextgen Gallery 2024-11-21 5.0 MEDIUM 7.5 HIGH
In the nextgen-gallery plugin before 2.2.50 for WordPress, gallery paths are not secured.