Vulnerabilities (CVE)

Filtered by CWE-22
Total 6555 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-17108 1 Konakart 1 Konakart 2024-11-21 7.5 HIGH 9.8 CRITICAL
Path traversal vulnerability in the administrative panel in KonaKart eCommerce Platform version 8.7 and earlier could allow an attacker to download system files, as well as upload specially crafted JSP files and in turn gain access to the server.
CVE-2017-17058 1 Automattic 1 Woocommerce 2024-11-21 5.0 MEDIUM 7.5 HIGH
The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code
CVE-2017-17042 1 Yardoc 1 Yard 2024-11-21 5.0 MEDIUM 7.5 HIGH
lib/yard/core_ext/file.rb in the server in YARD before 0.9.11 does not block relative paths with an initial ../ sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files.
CVE-2017-16959 1 Tp-link 108 Tl-er3210g, Tl-er3210g Firmware, Tl-er3220g and 105 more 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The locale feature in cgi-bin/luci on TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allows remote authenticated users to test for the existence of arbitrary files by making an operation=write;locale=%0d request, and then making an operation=read request with a crafted Accept-Language HTTP header, related to the set_sysinfo and get_sysinfo functions in /usr/lib/lua/luci/controller/locale.lua in uhttpd.
CVE-2017-16936 1 Tenda 6 Ac15, Ac15 Firmware, Ac18 and 3 more 2024-11-21 3.3 LOW 6.5 MEDIUM
Directory Traversal vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to read arbitrary files via a cgi-bin/luci/request?op=1&path= URI that uses directory traversal sequences after a /usb/ substring.
CVE-2017-16929 1 Claymore Dual Miner Project 1 Claymore Dual Miner 2024-11-21 8.5 HIGH 8.1 HIGH
The remote management interface on the Claymore Dual GPU miner 10.1 is vulnerable to an authenticated directory traversal vulnerability exploited by issuing a specially crafted request, allowing a remote attacker to read/write arbitrary files. This can be exploited via ../ sequences in the pathname to miner_file or miner_getfile.
CVE-2017-16922 1 Wowza 1 Streaming Engine 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
In com.wowza.wms.timedtext.http.HTTPProviderCaptionFile in Wowza Streaming Engine before 4.7.1, traversal of the directory structure and retrieval of a file are possible via a remote, specifically crafted HTTP request.
CVE-2017-16903 1 Lvyecms Project 1 Lvyecms 2024-11-21 7.5 HIGH 9.8 CRITICAL
LvyeCMS through 3.1 allows remote attackers to upload and execute arbitrary PHP code via directory traversal sequences in the dir parameter, in conjunction with PHP code in the content parameter, within a template Style add request to index.php.
CVE-2017-16877 1 Zeit 1 Next.js 2024-11-21 5.0 MEDIUM 7.5 HIGH
ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.
CVE-2017-16859 1 Atlassian 2 Crucible, Fisheye 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter.
CVE-2017-16814 1 Foxitsoftware 1 Mobilepdf 2024-11-21 3.3 LOW 5.5 MEDIUM
A Directory Traversal issue was discovered in the Foxit MobilePDF app before 6.1 for iOS. This occurs by abusing the URL + escape character during a Wi-Fi transfer, which could be exploited by attackers to bypass intended restrictions on local application files.
CVE-2017-16806 1 Ulterius 1 Ulterius Server 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Process function in RemoteTaskServer/WebServer/HttpServer.cs in Ulterius before 1.9.5.0 allows HTTP server directory traversal.
CVE-2017-16788 1 Meinbergglobal 2 Lantime, Lantime Firmware 2024-11-21 9.0 HIGH 7.2 HIGH
Directory traversal vulnerability in the "Upload Groupkey" functionality in the Web Configuration Utility in Meinberg LANTIME devices with firmware before 6.24.004 allows remote authenticated users with Admin-User access to write to arbitrary files and consequently gain root privileges by uploading a file, as demonstrated by storing a file in the cron.d directory.
CVE-2017-16762 1 Sanic Project 1 Sanic 2024-11-21 5.0 MEDIUM 7.5 HIGH
Sanic before 0.5.1 allows reading arbitrary files with directory traversal, as demonstrated by the /static/..%2f substring.
CVE-2017-16759 1 Librenms 1 Librenms 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
The installation process in LibreNMS before 2017-08-18 allows remote attackers to read arbitrary files, related to html/install.php.
CVE-2017-16744 1 Tridium 2 Niagara, Niagara Ax Framework 2024-11-21 6.5 MEDIUM 7.2 HIGH
A path traversal vulnerability in Tridium Niagara AX Versions 3.8 and prior and Niagara 4 systems Versions 4.4 and prior installed on Microsoft Windows Systems can be exploited by leveraging valid platform (administrator) credentials.
CVE-2017-16720 1 Advantech 1 Webaccess 2024-11-21 10.0 HIGH 9.8 CRITICAL
A Path Traversal issue was discovered in WebAccess versions 8.3.2 and earlier. An attacker has access to files within the directory structure of the target device.
CVE-2017-16654 2 Debian, Sensiolabs 2 Debian Linux, Symfony 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.
CVE-2017-16223 1 Nodeaaaaa Project 1 Nodeaaaaa 2024-11-21 5.0 MEDIUM 7.5 HIGH
nodeaaaaa is a static file server. nodeaaaaa is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
CVE-2017-16222 1 Elding Project 1 Elding 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
elding is a simple web server. elding is vulnerable to a directory traversal issue, allowing an attacker to access the filesystem by placing "../" in the url. The files accessible, however, are limited to files with a file extension. Sending a GET request to /../../../etc/passwd, for example, will return a 404 on etc/passwd/index.js.