Total
6550 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-45010 | 1 Tiny File Manager Project | 1 Tiny File Manager | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution. | |||||
CVE-2021-44977 | 1 Idreamsoft | 1 Icms | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In iCMS <=8.0.0, a directory traversal vulnerability allows an attacker to read arbitrary files. | |||||
CVE-2021-44965 | 1 Phpgurukul | 1 Employee Record Management System | 2024-11-21 | 7.8 HIGH | 7.5 HIGH |
Directory traversal vulnerability in /admin/includes/* directory for PHPGURUKUL Employee Record Management System 1.2 The attacker can retrieve and download sensitive information from the vulnerable server. | |||||
CVE-2021-44737 | 1 Lexmark | 467 6500e, 6500e Firmware, B2236 and 464 more | 2024-11-21 | 8.3 HIGH | 8.8 HIGH |
PJL directory traversal vulnerability in Lexmark devices through 2021-12-07 that can be leveraged to overwrite internal configuration files. | |||||
CVE-2021-44725 | 1 Knime | 1 Knime Server | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
KNIME Server before 4.13.4 allows directory traversal in a request for a client profile. | |||||
CVE-2021-44674 | 1 Opmantek | 1 Open-audit | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
An information exposure issue has been discovered in Opmantek Open-AudIT 4.2.0. The vulnerability allows an authenticated attacker to read file outside of the restricted directory. | |||||
CVE-2021-44665 | 1 Xerte | 1 Xerte | 2024-11-21 | 3.5 LOW | 6.5 MEDIUM |
A Directory Traversal vulnerability exists in the Xerte Project Xerte through 3.10.3 when downloading a project file via download.php. | |||||
CVE-2021-44664 | 1 Xerte | 1 Xerte | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
An Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable. | |||||
CVE-2021-44586 | 1 Dst-admin Project | 1 Dst-admin | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in dst-admin v1.3.0. The product has an unauthorized arbitrary file download vulnerability that can expose sensitive information. | |||||
CVE-2021-44548 | 2 Apache, Microsoft | 2 Solr, Windows | 2024-11-21 | 6.8 MEDIUM | 9.8 CRITICAL |
An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows. | |||||
CVE-2021-44519 | 1 Citrix | 1 Xenmobile Server | 2024-11-21 | 6.0 MEDIUM | 8.8 HIGH |
In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Directory Traversal vulnerability, leading to remote code execution. | |||||
CVE-2021-44351 | 1 Naviwebs | 1 Navigate Cms | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
An arbitrary file read vulnerability exists in NavigateCMS 2.9 via /navigate/navigate_download.php id parameter. | |||||
CVE-2021-44278 | 1 Librenms | 1 Librenms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php. | |||||
CVE-2021-44232 | 1 Sap | 1 Saf-t Framework | 2024-11-21 | 4.0 MEDIUM | 7.7 HIGH |
SAF-T Framework Transaction SAFTN_G allows an attacker to exploit insufficient validation of path information provided by normal user, leading to full server directory access. The attacker can see the whole filesystem structure but cannot overwrite, delete, or corrupt arbitrary files on the server. | |||||
CVE-2021-44162 | 1 Chinasea | 1 Qb Smart Service Robot | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Chain Sea ai chatbot system’s specific file download function has path traversal vulnerability. The function has improper filtering of special characters in URL parameters, which allows a remote attacker to download arbitrary system files without authentication. | |||||
CVE-2021-44138 | 1 Caucho | 1 Resin | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request. | |||||
CVE-2021-44124 | 1 Hiby | 2 R3 Pro, R3 Pro Firmware | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Hiby Music Hiby OS R3 Pro 1.5 and 1.6 is vulnerable to Directory Traversal. The HTTP Server does not have enough input data sanitization when shown data from SD Card, an attacker can navigate through the device's File System over HTTP. | |||||
CVE-2021-44111 | 1 S-cart | 1 S-cart | 2024-11-21 | 2.1 LOW | 4.4 MEDIUM |
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup. | |||||
CVE-2021-43930 | 1 Smartptt | 1 Smartptt Scada | 2024-11-21 | 4.0 MEDIUM | 4.9 MEDIUM |
Elcomplus SmartPTT is vulnerable as the backup and restore system does not adequately validate download requests, enabling malicious users to perform path traversal attacks and potentially download arbitrary files from the system. | |||||
CVE-2021-43840 | 1 Discourse | 1 Message Bus | 2024-11-21 | 3.5 LOW | 4.4 MEDIUM |
message_bus is a messaging bus for Ruby processes and web clients. In versions prior to 3.3.7 users who deployed message bus with diagnostics features enabled (default off) are vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. This issue has been patched in version 3.3.7. Users unable to upgrade should ensure that MessageBus::Diagnostics is disabled. |