Vulnerabilities (CVE)

Filtered by CWE-22
Total 6550 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-45010 1 Tiny File Manager Project 1 Tiny File Manager 2024-11-21 6.5 MEDIUM 8.8 HIGH
A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution.
CVE-2021-44977 1 Idreamsoft 1 Icms 2024-11-21 5.0 MEDIUM 7.5 HIGH
In iCMS <=8.0.0, a directory traversal vulnerability allows an attacker to read arbitrary files.
CVE-2021-44965 1 Phpgurukul 1 Employee Record Management System 2024-11-21 7.8 HIGH 7.5 HIGH
Directory traversal vulnerability in /admin/includes/* directory for PHPGURUKUL Employee Record Management System 1.2 The attacker can retrieve and download sensitive information from the vulnerable server.
CVE-2021-44737 1 Lexmark 467 6500e, 6500e Firmware, B2236 and 464 more 2024-11-21 8.3 HIGH 8.8 HIGH
PJL directory traversal vulnerability in Lexmark devices through 2021-12-07 that can be leveraged to overwrite internal configuration files.
CVE-2021-44725 1 Knime 1 Knime Server 2024-11-21 5.0 MEDIUM 7.5 HIGH
KNIME Server before 4.13.4 allows directory traversal in a request for a client profile.
CVE-2021-44674 1 Opmantek 1 Open-audit 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
An information exposure issue has been discovered in Opmantek Open-AudIT 4.2.0. The vulnerability allows an authenticated attacker to read file outside of the restricted directory.
CVE-2021-44665 1 Xerte 1 Xerte 2024-11-21 3.5 LOW 6.5 MEDIUM
A Directory Traversal vulnerability exists in the Xerte Project Xerte through 3.10.3 when downloading a project file via download.php.
CVE-2021-44664 1 Xerte 1 Xerte 2024-11-21 6.5 MEDIUM 8.8 HIGH
An Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable.
CVE-2021-44586 1 Dst-admin Project 1 Dst-admin 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in dst-admin v1.3.0. The product has an unauthorized arbitrary file download vulnerability that can expose sensitive information.
CVE-2021-44548 2 Apache, Microsoft 2 Solr, Windows 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows.
CVE-2021-44519 1 Citrix 1 Xenmobile Server 2024-11-21 6.0 MEDIUM 8.8 HIGH
In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Directory Traversal vulnerability, leading to remote code execution.
CVE-2021-44351 1 Naviwebs 1 Navigate Cms 2024-11-21 5.0 MEDIUM 7.5 HIGH
An arbitrary file read vulnerability exists in NavigateCMS 2.9 via /navigate/navigate_download.php id parameter.
CVE-2021-44278 1 Librenms 1 Librenms 2024-11-21 7.5 HIGH 9.8 CRITICAL
Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php.
CVE-2021-44232 1 Sap 1 Saf-t Framework 2024-11-21 4.0 MEDIUM 7.7 HIGH
SAF-T Framework Transaction SAFTN_G allows an attacker to exploit insufficient validation of path information provided by normal user, leading to full server directory access. The attacker can see the whole filesystem structure but cannot overwrite, delete, or corrupt arbitrary files on the server.
CVE-2021-44162 1 Chinasea 1 Qb Smart Service Robot 2024-11-21 5.0 MEDIUM 7.5 HIGH
Chain Sea ai chatbot system’s specific file download function has path traversal vulnerability. The function has improper filtering of special characters in URL parameters, which allows a remote attacker to download arbitrary system files without authentication.
CVE-2021-44138 1 Caucho 1 Resin 2024-11-21 5.0 MEDIUM 7.5 HIGH
There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.
CVE-2021-44124 1 Hiby 2 R3 Pro, R3 Pro Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
Hiby Music Hiby OS R3 Pro 1.5 and 1.6 is vulnerable to Directory Traversal. The HTTP Server does not have enough input data sanitization when shown data from SD Card, an attacker can navigate through the device's File System over HTTP.
CVE-2021-44111 1 S-cart 1 S-cart 2024-11-21 2.1 LOW 4.4 MEDIUM
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
CVE-2021-43930 1 Smartptt 1 Smartptt Scada 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
Elcomplus SmartPTT is vulnerable as the backup and restore system does not adequately validate download requests, enabling malicious users to perform path traversal attacks and potentially download arbitrary files from the system.
CVE-2021-43840 1 Discourse 1 Message Bus 2024-11-21 3.5 LOW 4.4 MEDIUM
message_bus is a messaging bus for Ruby processes and web clients. In versions prior to 3.3.7 users who deployed message bus with diagnostics features enabled (default off) are vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. This issue has been patched in version 3.3.7. Users unable to upgrade should ensure that MessageBus::Diagnostics is disabled.