Total
6554 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-15681 | 1 Craftercms | 1 Crafter Cms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In Crafter CMS Crafter Studio 3.0.1 a directory traversal vulnerability exists which allows unauthenticated attackers to overwrite files from the operating system which can lead to RCE. | |||||
CVE-2017-15647 | 1 Fiberhome | 1 Routerfiberhome Firmware | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value. | |||||
CVE-2017-15607 | 1 Inedo | 1 Otter | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Inedo Otter before 1.7.4 has directory traversal in filesystem-based rafts via vectors involving '/' characters or initial '.' characters, aka OT-181. | |||||
CVE-2017-15550 | 1 Emc | 3 Avamar Server, Integrated Data Protection Appliance, Networker | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote authenticated malicious user with low privileges could access arbitrary files on the server file system in the context of the running vulnerable application via Path traversal. | |||||
CVE-2017-15532 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | 5.5 MEDIUM | 5.7 MEDIUM |
Prior to 10.6.4, Symantec Messaging Gateway may be susceptible to a path traversal attack (also known as directory traversal). These types of attacks aim to access files and directories that are stored outside the web root folder. By manipulating variables, it may be possible to access arbitrary files and directories stored on the file system including application source code or configuration and critical system files. | |||||
CVE-2017-15527 | 1 Symantec | 1 Management Console | 2024-11-21 | 5.2 MEDIUM | 6.8 MEDIUM |
Prior to ITMS 8.1 RU4, the Symantec Management Console can be susceptible to a directory traversal exploit, which is a type of attack that can occur when there is insufficient security validation / sanitization of user-supplied input file names, such that characters representing "traverse to parent directory" are passed through to the file APIs. | |||||
CVE-2017-15363 | 1 Luracast | 1 Restler | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter. | |||||
CVE-2017-15359 | 1 3cx | 1 3cx | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
In the 3CX Phone System 15.5.3554.1, the Management Console typically listens to port 5001 and is prone to a directory traversal attack: "/api/RecordingList/DownloadRecord?file=" and "/api/SupportInfo?file=" are the vulnerable parameters. An attacker must be authenticated to exploit this issue to access sensitive information to aid in subsequent attacks. | |||||
CVE-2017-15309 | 1 Huawei | 1 Ireader | 2024-11-21 | 5.8 MEDIUM | 7.1 HIGH |
Huawei iReader app before 8.0.2.301 has a path traversal vulnerability due to insufficient validation on file storage paths. An attacker can exploit this vulnerability to store downloaded malicious files in an arbitrary directory. | |||||
CVE-2017-15276 | 1 Opentext | 1 Documentum Content Server | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server allows uploading content using batches (TAR archives). When unpacking TAR archives, Content Server fails to verify the contents of an archive, which causes a path traversal vulnerability via symlinks. Because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation. | |||||
CVE-2017-15079 | 1 Wpmudev | 1 Smush Image Compression And Optimization | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
The Smush Image Compression and Optimization plugin before 2.7.6 for WordPress allows directory traversal. | |||||
CVE-2017-14849 | 1 Nodejs | 1 Node.js | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules. | |||||
CVE-2017-14754 | 1 Opentext | 1 Document Sciences Xpression | 2024-11-21 | 6.8 MEDIUM | 6.5 MEDIUM |
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to Arbitrary File Read: /xAdmin/html/cm_datasource_group_xsd.jsp, parameter: xsd_datasource_schema_file filename. In order for this vulnerability to be exploited, an attacker must authenticate to the application first. | |||||
CVE-2017-14722 | 1 Wordpress | 1 Wordpress | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Before version 4.8.2, WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename. | |||||
CVE-2017-14719 | 1 Wordpress | 1 Wordpress | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components. | |||||
CVE-2017-14695 | 1 Saltstack | 1 Salt | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791. | |||||
CVE-2017-14614 | 1 Gridgain | 1 Gridgain | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Directory traversal vulnerability in the Visor GUI Console in GridGain before 1.7.16, 1.8.x before 1.8.12, 1.9.x before 1.9.7, and 8.x before 8.1.5 allows remote authenticated users to read arbitrary files on remote cluster nodes via a crafted path. | |||||
CVE-2017-14537 | 1 Netfortris | 1 Trixbox | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php. | |||||
CVE-2017-14514 | 1 Tenda | 2 W15e, W15e Firmware | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Directory Traversal on Tenda W15E devices before 15.11.0.14 allows remote attackers to read unencrypted files via a crafted URL. | |||||
CVE-2017-14513 | 1 Metinfo | 1 Metinfo | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
Directory traversal vulnerability in MetInfo 5.3.17 allows remote attackers to read information from any ini format file via the f_filename parameter in a fingerprintdo action to admin/app/physical/physical.php. |