Total
7182 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-8712 | 1 Webmin | 1 Webmin | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
An issue was discovered in Webmin 1.840 and 1.880 when the default Yes setting of "Can view any file as a log file" is enabled. As a result of weak default configuration settings, limited users have full access rights to the underlying Unix system files, allowing the user to read sensitive data from the local system (using Local File Include) such as the '/etc/shadow' file via a "GET /syslog/save_log.cgi?view=1&file=/etc/shadow" request. | |||||
CVE-2018-8495 | 1 Microsoft | 2 Windows 10, Windows Server 2016 | 2024-11-21 | 7.6 HIGH | 7.5 HIGH |
A remote code execution vulnerability exists when Windows Shell improperly handles URIs, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. | |||||
CVE-2018-8041 | 1 Apache | 1 Camel | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal. | |||||
CVE-2018-8009 | 1 Apache | 1 Hadoop | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file. | |||||
CVE-2018-8008 | 1 Apache | 1 Storm | 2024-11-21 | 5.8 MEDIUM | 5.5 MEDIUM |
Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. | |||||
CVE-2018-8003 | 1 Apache | 1 Ambari | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
Apache Ambari, versions 1.4.0 to 2.6.1, is susceptible to a directory traversal attack allowing an unauthenticated user to craft an HTTP request which provides read-only access to any file on the filesystem of the host the Ambari Server runs on that is accessible by the user the Ambari Server is running as. Direct network access to the Ambari Server is required to issue this request, and those Ambari Servers that are protected behind a firewall, or in a restricted network zone are at less risk of being affected by this issue. | |||||
CVE-2018-7933 | 1 Huawei | 4 Hirouter-cd20, Hirouter-cd20 Firmware, Ws5200 and 1 more | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Huawei home gateway products HiRouter-CD20 and WS5200 with the versions before HiRouter-CD20-10 1.9.6 and the versions before WS5200-10 1.9.6 have a path traversal vulnerability. Due to the lack of validation while these home gateway products install APK plugins, an attacker tricks a user into installing a malicious APK plugin, and plugin can overwrite arbitrary file of devices. Successful exploit may result in arbitrary code execution or privilege escalation. | |||||
CVE-2018-7835 | 1 Schneider-electric | 1 Iiot Monior | 2024-11-21 | 7.8 HIGH | 7.5 HIGH |
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in IIoT Monitor 3.1.38 which could allow access to files available to SYSTEM user. | |||||
CVE-2018-7807 | 1 Schneider-electric | 1 Struxureware Data Center Expert | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Data Center Expert, versions 7.5.0 and earlier, allows for the upload of a zip file from its user interface to the server. A carefully crafted, malicious file could be mistakenly uploaded by an authenticated user via this feature which could contain path traversal file names. As such, it could allow for the arbitrary upload of files contained with the zip onto the server file system outside of the intended directory. This is leveraging the more commonly known ZipSlip vulnerability within Java code. | |||||
CVE-2018-7806 | 1 Schneider-electric | 1 Struxureware Data Center Operation | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Data Center Operation allows for the upload of a zip file from its user interface to the server. A carefully crafted, malicious file could be mistakenly uploaded by an authenticated user via this feature which could contain path traversal file names. As such, it could allow for the arbitrary upload of files contained with the zip onto the server file system outside of the intended directory. This is leveraging the more commonly known ZipSlip vulnerability within Java code. | |||||
CVE-2018-7771 | 1 Schneider-electric | 1 U.motion Builder | 2024-11-21 | 6.0 MEDIUM | 8.0 HIGH |
The vulnerability exists within processing of editscript.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A directory traversal vulnerability allows a caller with standard user privileges to write arbitrary php files anywhere in the web service directory tree. | |||||
CVE-2018-7770 | 1 Schneider-electric | 1 U.motion | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
The vulnerability exists within processing of sendmail.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The applet allows callers to select arbitrary files to send to an arbitrary email address. | |||||
CVE-2018-7764 | 1 Schneider-electric | 1 U.motion Builder | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
The vulnerability exists within runscript.php applet in Schneider Electric U.motion Builder software versions prior to v1.3.4. There is a directory traversal vulnerability in the processing of the 's' parameter of the applet. | |||||
CVE-2018-7763 | 1 Schneider-electric | 1 U.motion Builder | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
The vulnerability exists within css.inc.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The 'css' parameter contains a directory traversal vulnerability. | |||||
CVE-2018-7719 | 2 Acrolinx, Microsoft | 2 Acrolinx Server, Windows | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Acrolinx Server before 5.2.5 on Windows allows Directory Traversal. | |||||
CVE-2018-7706 | 1 Securenvoy | 1 Securmail | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Directory traversal vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote authenticated users to read arbitrary e-mail messages via a .. (dot dot) in the option2 parameter in an attachment action to secmail/getmessage.exe. | |||||
CVE-2018-7705 | 1 Securenvoy | 1 Securmail | 2024-11-21 | 5.5 MEDIUM | 8.1 HIGH |
Directory traversal vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote authenticated users to read e-mail messages to arbitrary recipients via a .. (dot dot) in the filename parameter to secupload2/upload.aspx. | |||||
CVE-2018-7669 | 1 Sitecore | 1 Sitecore.net | 2024-11-21 | 7.8 HIGH | 7.5 HIGH |
An issue was discovered in Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 and above. The 'Log Viewer' application is vulnerable to a directory traversal attack, allowing an attacker to access arbitrary files from the host Operating System using a sitecore/shell/default.aspx?xmlcontrol=LogViewerDetails&file= URI. Validation is performed to ensure that the text passed to the 'file' parameter correlates to the correct log file directory. This filter can be bypassed by including a valid log filename and then appending a traditional 'dot dot' style attack. | |||||
CVE-2018-7654 | 1 3cx | 1 3cx | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
On 3CX 15.5.6354.2 devices, the parameter "file" in the request "/api/RecordingList/download?file=" allows full access to files on the server via path traversal. | |||||
CVE-2018-7586 | 1 Imagely | 1 Nextgen Gallery | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In the nextgen-gallery plugin before 2.2.50 for WordPress, gallery paths are not secured. |