Vulnerabilities (CVE)

Filtered by CWE-22
Total 7180 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-1048 1 Redhat 1 Jboss Enterprise Application Platform 2024-11-21 5.0 MEDIUM 7.5 HIGH
It was found that the AJP connector in undertow, as shipped in Jboss EAP 7.1.0.GA, does not use the ALLOW_ENCODED_SLASH option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files.
CVE-2018-19945 1 Qnap 1 Qts 2024-11-21 8.5 HIGH 9.1 CRITICAL
A vulnerability has been reported to affect earlier QNAP devices running QTS 4.3.4 to 4.3.6. Caused by improper limitations of a pathname to a restricted directory, this vulnerability allows for renaming arbitrary files on the target system, if exploited. QNAP have already fixed this vulnerability in the following versions: QTS 4.3.6.0895 build 20190328 (and later) QTS 4.3.4.0899 build 20190322 (and later) This issue does not affect QTS 4.4.x or QTS 4.5.x.
CVE-2018-19859 1 Openrefine 1 Openrefine 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
OpenRefine before 3.2 beta allows directory traversal via a relative pathname in a ZIP archive.
CVE-2018-19856 1 Gitlab 1 Gitlab 2024-11-21 5.0 MEDIUM 7.5 HIGH
GitLab CE/EE before 11.3.12, 11.4.x before 11.4.10, and 11.5.x before 11.5.3 allows Directory Traversal in Templates API.
CVE-2018-19753 1 Oracle 1 Tarantella Enterprise 2024-11-21 5.0 MEDIUM 7.5 HIGH
Tarantella Enterprise before 3.11 allows Directory Traversal.
CVE-2018-19748 1 Sdcms 1 Sdcms 2024-11-21 5.0 MEDIUM 7.5 HIGH
app/plug/attachment/controller/admincontroller.php in SDCMS 1.6 allows reading arbitrary files via a /?m=plug&c=admin&a=index&p=attachment&root= directory traversal. The value of the root parameter must be base64 encoded (note that base64 encoding, instead of URL encoding, is very rare in a directory traversal attack vector).
CVE-2018-19666 3 Microsoft, Ossec, Wazuh 3 Windows, Ossec, Wazuh 2024-11-21 7.2 HIGH 7.8 HIGH
The agent in OSSEC through 3.1.0 on Windows allows local users to gain NT AUTHORITY\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server.
CVE-2018-19586 1 Silverpeas 1 Silverpeas 2024-11-21 9.0 HIGH 9.9 CRITICAL
Silverpeas 5.15 through 6.0.2 is affected by an authenticated Directory Traversal vulnerability that can be triggered during file uploads because core/webapi/upload/FileUploadData.java mishandles a StringUtil.java call. This vulnerability enables regular users to write arbitrary files on the underlying system with privileges of the user running the application. Especially, an attacker may leverage the vulnerability to write an executable JSP file in an exposed web directory to execute commands on the underlying system.
CVE-2018-19512 1 Ens 1 Webgalamb 2024-11-21 9.0 HIGH 7.2 HIGH
In Webgalamb through 7.0, a system/ajax.php "wgmfile restore" directory traversal vulnerability could lead to arbitrary code execution by authenticated administrator users, because PHP files are restored under the document root directory.
CVE-2018-19365 1 Wowza 1 Streaming Engine 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
The REST API in Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically crafted HTTP request.
CVE-2018-19329 1 Greencms 1 Greencms 2024-11-21 5.5 MEDIUM 4.9 MEDIUM
GreenCMS v2.3.0603 allows remote authenticated administrators to delete arbitrary files by modifying a base64-encoded pathname in an m=admin&c=media&a=delfilehandle&id= call, related to the m=admin&c=media&a=restorefile delete button.
CVE-2018-19328 1 Laobancms 1 Laobancms 2024-11-21 7.5 HIGH 9.8 CRITICAL
LAOBANCMS 2.0 allows install/mysql_hy.php?riqi=../ Directory Traversal.
CVE-2018-19326 1 Zyxel 2 Vmg1312-b10d, Vmg1312-b10d Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
Zyxel VMG1312-B10D devices before 5.13(AAXA.8)C0 allow ../ Directory Traversal, as demonstrated by reading /etc/passwd.
CVE-2018-19228 1 Laobancms 1 Laobancms 2024-11-21 6.4 MEDIUM 7.5 HIGH
An issue was discovered in LAOBANCMS 2.0. It allows arbitrary file deletion via ../ directory traversal in the admin/pic.php del parameter, as demonstrated by deleting install/install.txt to permit a reinstallation.
CVE-2018-19197 1 Xiaocms 1 Xiaocms 2024-11-21 5.5 MEDIUM 4.9 MEDIUM
An issue was discovered in XiaoCms 20141229. admin\controller\database.php allows arbitrary directory deletion via admin/index.php?c=database&a=import&paths[]=../ directory traversal.
CVE-2018-19181 1 Yunucms 1 Yunucms 2024-11-21 6.4 MEDIUM 7.5 HIGH
statics/ueditor/php/vendor/Local.class.php in YUNUCMS 1.1.5 allows arbitrary file deletion via the statics/ueditor/php/controller.php?action=remove key parameter, as demonstrated by using directory traversal to delete the install.lock file.
CVE-2018-19124 2 Microsoft, Prestashop 2 Windows, Prestashop 2024-11-21 5.0 MEDIUM 7.5 HIGH
PrestaShop 1.6.x before 1.6.1.23 and 1.7.x before 1.7.4.4 on Windows allows remote attackers to write to arbitrary image files.
CVE-2018-19052 4 Debian, Lighttpd, Opensuse and 1 more 5 Debian Linux, Lighttpd, Backports Sle and 2 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
CVE-2018-19043 1 Media File Manager Project 1 Media File Manager 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
The Media File Manager plugin 1.4.2 for WordPress allows arbitrary file renaming (specifying a "from" and "to" filename) via a ../ directory traversal in the dir parameter of an mrelocator_rename action to the wp-admin/admin-ajax.php URI.
CVE-2018-19042 1 Media File Manager Project 1 Media File Manager 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
The Media File Manager plugin 1.4.2 for WordPress allows arbitrary file movement via a ../ directory traversal in the dir_from and dir_to parameters of an mrelocator_move action to the wp-admin/admin-ajax.php URI.