Vulnerabilities (CVE)

Filtered by CWE-22
Total 6985 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-1000472 2 Debian, Pocoproject 2 Debian Linux, Poco 2024-11-21 5.8 MEDIUM 6.5 MEDIUM
The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted ZIP file, related to a "file path injection vulnerability".
CVE-2017-1000448 1 Structured-data 1 Structured Data Linter 2024-11-21 5.0 MEDIUM 7.5 HIGH
Structured Data Linter versions 2.4.1 and older are vulnerable to a directory traversal attack in the URL input field resulting in the possibility of disclosing information about the remote host.
CVE-2017-0930 1 Augustine Project 1 Augustine 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
augustine node module suffers from a Path Traversal vulnerability due to lack of validation of url, which allows a malicious user to read content of any file with known path.
CVE-2017-0918 2 Debian, Gitlab 2 Debian Linux, Gitlab 2024-11-21 6.5 MEDIUM 8.8 HIGH
Gitlab Community Edition version 10.3 is vulnerable to a path traversal issue in the GitLab CI runner component resulting in remote code execution.
CVE-2016-9484 1 Jqueryform 1 Php Formmail Generator 2024-11-21 5.0 MEDIUM 7.5 HIGH
The generated PHP form code does not properly validate user input folder directories, allowing a remote unauthenticated attacker to perform a path traversal and access arbitrary files on the server. The PHP FormMail Generator website does not use version numbers and is updated continuously. Any PHP form code generated by this website prior to 2016-12-06 may be vulnerable.
CVE-2016-7063 1 Pritunl 1 Pritunl-client 2024-11-21 7.5 HIGH 9.8 CRITICAL
A flaw was found in pritunl-client before version 1.0.1116.6. Arbitrary write to user specified path may lead to privilege escalation.
CVE-2016-7041 1 Redhat 2 Jboss Brms, Jboss Drools 2024-11-21 6.8 MEDIUM 6.5 MEDIUM
Drools Workbench contains a path traversal vulnerability. The vulnerability allows a remote, authenticated attacker to bypass the directory restrictions and retrieve arbitrary files from the affected host.
CVE-2016-15038 2024-11-21 6.4 MEDIUM 6.5 MEDIUM
A vulnerability, which was classified as critical, was found in NUUO NVRmini 2 up to 3.0.8. Affected is an unknown function of the file /deletefile.php. The manipulation of the argument filename leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258780.
CVE-2016-15023 1 Sitefusion 1 Application Server 2024-11-21 2.7 LOW 3.5 LOW
A vulnerability, which was classified as problematic, was found in SiteFusion Application Server up to 6.6.6. This affects an unknown part of the file getextension.php of the component Extension Handler. The manipulation leads to path traversal. Upgrading to version 6.6.7 is able to address this issue. The identifier of the patch is 49fff155c303d6cd06ce8f97bba56c9084bf08ac. It is recommended to upgrade the affected component. The identifier VDB-219765 was assigned to this vulnerability.
CVE-2016-15019 1 Jekbox Project 1 Jekbox 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A vulnerability was found in tombh jekbox. It has been rated as problematic. This issue affects some unknown processing of the file lib/server.rb. The manipulation leads to exposure of information through directory listing. The attack may be initiated remotely. The patch is named 64eb2677671018fc08b96718b81e3dbc83693190. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218375.
CVE-2016-15017 1 Ecodev 1 Media Upload 2024-11-21 5.2 MEDIUM 5.5 MEDIUM
A vulnerability has been found in fabarea media_upload on TYPO3 and classified as critical. This vulnerability affects the function getUploadedFileList of the file Classes/Service/UploadFileService.php. The manipulation leads to pathname traversal. Upgrading to version 0.9.0 is able to address this issue. The patch is identified as b25d42a4981072321c1a363311d8ea2a4ac8763a. It is recommended to upgrade the affected component. VDB-217786 is the identifier assigned to this vulnerability.
CVE-2016-10977 1 Neliosoftware 1 Nelio Ab Testing 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The nelio-ab-testing plugin before 4.5.0 for WordPress has filename=..%2f directory traversal.
CVE-2016-10966 1 Creativeinteractivemedia 1 Real3d Flipbook 2024-11-21 5.0 MEDIUM 7.5 HIGH
The real3d-flipbook-lite plugin 1.0 for WordPress has bookName=../ directory traversal for file upload.
CVE-2016-10965 1 Creativeinteractivemedia 1 Real3d Flipbook 2024-11-21 6.4 MEDIUM 7.5 HIGH
The real3d-flipbook-lite plugin 1.0 for WordPress has deleteBook=../ directory traversal for file deletion.
CVE-2016-10924 1 Zedna Ebook Download Project 1 Zedna Ebook Download 2024-11-21 5.0 MEDIUM 7.5 HIGH
The ebook-download plugin before 1.2 for WordPress has directory traversal.
CVE-2016-10828 1 Cpanel 1 Cpanel 2024-11-21 9.0 HIGH 8.8 HIGH
cPanel before 55.9999.141 allows arbitrary code execution because of an unsafe @INC path (SEC-97).
CVE-2016-10759 1 Precurio 1 Precurio 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Xinha plugin in Precurio 2.1 allows Directory Traversal, with resultant arbitrary code execution, via ExtendedFileManager/Classes/ExtendedFileManager.php because ExtendedFileManager can be used to rename the .htaccess file that blocks .php uploads.
CVE-2016-10751 1 Osclass 1 Osclass 2024-11-21 6.5 MEDIUM 7.2 HIGH
osClass 3.6.1 allows oc-admin/plugins.php Directory Traversal via the plugin parameter. This is exploitable for remote PHP code execution because an administrator can upload an image that contains PHP code in the EXIF data via index.php?page=ajax&action=ajax_upload.
CVE-2016-10733 1 Projectsend 1 Projectsend 2024-11-21 7.5 HIGH 9.8 CRITICAL
ProjectSend (formerly cFTP) r582 allows directory traversal via file=../ in the process-zip-download.php query string.
CVE-2016-10726 1 Duraspace 1 Dspace 2024-11-21 5.0 MEDIUM 7.5 HIGH
The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.