Vulnerabilities (CVE)

Filtered by CWE-22
Total 6552 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-7842 1 Hibara 1 Attachecase 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Directory traversal vulnerability in AttacheCase 2.8.2.8 and earlier and 3.2.0.4 and earlier allows remote attackers to read arbitrary files via specially crafted ATC file.
CVE-2016-7826 1 Buffalotech 2 Wnc01wh, Wnc01wh Firmware 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in Buffalo WNC01WH devices with firmware version 1.0.0.8 and earlier allows authenticated attackers to read arbitrary files via specially crafted POST requests.
CVE-2016-7825 1 Buffalotech 2 Wnc01wh, Wnc01wh Firmware 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in Buffalo WNC01WH devices with firmware version 1.0.0.8 and earlier allows authenticated attackers to read arbitrary files via specially crafted commands.
CVE-2016-7802 1 Cybozu 1 Garoon 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in Cybozu Garoon 3.0.0 to 4.2.2 allows remote authenticated attackers to read arbitrary files via unspecified vectors.
CVE-2016-7569 1 Docker2aci Project 1 Docker2aci 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Directory traversal vulnerability in docker2aci before 0.13.0 allows remote attackers to write to arbitrary files via a .. (dot dot) in the embedded layer data in an image.
CVE-2016-7552 1 Trendmicro 1 Threat Discovery Appliance 2024-11-21 10.0 HIGH 9.8 CRITICAL
On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
CVE-2016-7169 1 Wordpress 1 Wordpress 2024-11-21 6.5 MEDIUM 6.3 MEDIUM
Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter.
CVE-2016-7135 1 Plone 1 Plone 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
Directory traversal vulnerability in Plone CMS 5.x through 5.0.6 and 4.2.x through 4.3.11 allows remote administrators to read arbitrary files via a .. (dot dot) in the path parameter in a getFile action to Plone/++theme++barceloneta/@@plone.resourceeditor.filemanager-actions.
CVE-2016-7116 2 Debian, Qemu 2 Debian Linux, Qemu 2024-11-21 2.1 LOW 6.0 MEDIUM
Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
CVE-2016-7087 2 Microsoft, Vmware 2 Windows, Horizon View 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Directory traversal vulnerability in the Connection Server in VMware Horizon View 5.x before 5.3.7, 6.x before 6.2.3, and 7.x before 7.0.1 allows remote attackers to obtain sensitive information via unspecified vectors.
CVE-2016-7063 1 Pritunl 1 Pritunl-client 2024-11-21 7.5 HIGH 9.8 CRITICAL
A flaw was found in pritunl-client before version 1.0.1116.6. Arbitrary write to user specified path may lead to privilege escalation.
CVE-2016-7041 1 Redhat 2 Jboss Brms, Jboss Drools 2024-11-21 6.8 MEDIUM 6.5 MEDIUM
Drools Workbench contains a path traversal vulnerability. The vulnerability allows a remote, authenticated attacker to bypass the directory restrictions and retrieve arbitrary files from the affected host.
CVE-2016-6896 1 Wordpress 1 Wordpress 2024-11-21 5.5 MEDIUM 7.1 HIGH
Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
CVE-2016-6795 1 Apache 1 Struts 2024-11-21 7.5 HIGH 9.8 CRITICAL
In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.
CVE-2016-6614 1 Phpmyadmin 1 Phpmyadmin 2024-11-21 4.3 MEDIUM 6.8 MEDIUM
An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features. When the username substitution is configured, a specially-crafted user name can be used to circumvent restrictions to traverse the file system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
CVE-2016-6601 1 Zohocorp 1 Webnms Framework 2024-11-21 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile.
CVE-2016-6600 1 Zohocorp 1 Webnms Framework 2024-11-21 7.5 HIGH 9.8 CRITICAL
Directory traversal vulnerability in the file upload functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to upload and execute arbitrary JSP files via a .. (dot dot) in the fileName parameter to servlets/FileUploadServlet.
CVE-2016-6517 1 Liferay 1 Liferay 2024-11-21 7.5 HIGH 9.8 CRITICAL
Directory traversal vulnerability in Liferay 5.1.0 allows remote attackers to have unspecified impact via a %2E%2E (encoded dot dot) in the minifierBundleDir parameter to barebone.jsp.
CVE-2016-6371 1 Cisco 1 Hosted Collaboration Mediation Fulfillment 2024-11-21 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in the web interface in Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) 10.6(3) and earlier allows remote attackers to write to arbitrary files via a crafted URL, aka Bug ID CSCuz64717.
CVE-2016-6370 1 Cisco 1 Hosted Collaboration Mediation Fulfillment 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Directory traversal vulnerability in the web interface in Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) 10.6(3) and earlier allows remote authenticated users to read arbitrary files via a crafted pathname in an HTTP request, aka Bug ID CSCuz27255.