Vulnerabilities (CVE)

Filtered by CWE-22
Total 6174 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-9983 1 Rarlab 1 Rar 2017-06-12 4.3 MEDIUM 5.5 MEDIUM
Directory Traversal exists in RAR 4.x and 5.x because an unpack operation follows any symlinks, including symlinks contained in the archive. This allows remote attackers to write to arbitrary files via a crafted archive.
CVE-2017-9416 1 Odoo 1 Odoo 2017-06-08 4.0 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in tools.file_open in Odoo 8.0, 9.0, and 10.0 allows remote authenticated users to read arbitrary local files readable by the Odoo service.
CVE-2015-0269 1 Contao 1 Contao Cms 2017-06-08 4.0 MEDIUM 4.3 MEDIUM
Directory traversal vulnerability in Contao before 3.2.19, and 3.4.x before 3.4.4 allows remote authenticated "back end" users to view files outside their file mounts or the document root via unspecified vectors.
CVE-2015-5609 1 Image-export Project 1 Image-export 2017-06-08 6.4 MEDIUM 9.1 CRITICAL
Absolute path traversal vulnerability in the Image Export plugin 1.1 for WordPress allows remote attackers to read and delete arbitrary files via a full pathname in the file parameter to download.php.
CVE-2017-5966 1 Sitecore 1 Crm 2017-06-08 4.0 MEDIUM 4.9 MEDIUM
Sitecore CRM 8.1 Rev 151207 allows remote authenticated administrators to read arbitrary files via an absolute path traversal attack on sitecore/shell/download.aspx with the file parameter.
CVE-2017-9428 2 Bigtreecms, Microsoft 2 Bigtree Cms, Windows 2017-06-06 5.0 MEDIUM 7.5 HIGH
A directory traversal vulnerability exists in core\admin\ajax\developer\extensions\file-browser.php in BigTree CMS through 4.2.18 on Windows, allowing attackers to read arbitrary files via ..\ sequences in the directory parameter.
CVE-2015-5468 1 Wpshopstyling 1 Wp E-commerce Shop Styling 2017-06-01 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in the WP e-Commerce Shop Styling plugin before 2.6 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter to includes/download.php.
CVE-2017-9067 2 Modx, Php 2 Modx Revolution, Php 2017-05-31 4.4 MEDIUM 7.0 HIGH
In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
CVE-2015-5469 1 Mdc Youtube Downloader Project 1 Mdc Youtube Downloader 2017-05-31 5.0 MEDIUM 7.5 HIGH
Absolute path traversal vulnerability in the MDC YouTube Downloader plugin 2.1.0 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter to includes/download.php.
CVE-2015-4704 1 Download Zip Attachments Project 1 Download Zip Attachments 2017-05-31 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in the Download Zip Attachments plugin 1.0 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the File parameter to download.php.
CVE-2017-8921 1 Flightgear 1 Flightgear 2017-05-26 5.0 MEDIUM 7.5 HIGH
In FlightGear before 2017.2.1, the FGCommand interface allows overwriting any file the user has write access to, but not with arbitrary data: only with the contents of a FlightGear flightplan (XML). A resource such as a malicious third-party aircraft could exploit this to damage files belonging to the user. Both this issue and CVE-2016-9956 are directory traversal vulnerabilities in Autopilot/route_mgr.cxx - this one exists because of an incomplete fix for CVE-2016-9956.
CVE-2017-9030 1 Codextrous 1 B2j Contact 2017-05-26 5.0 MEDIUM 7.5 HIGH
The Codextrous B2J Contact (aka b2j_contact) extension before 2.1.13 for Joomla! allows a directory traversal attack that bypasses a uniqid protection mechanism, and makes it easier to read arbitrary uploaded files.
CVE-2016-7982 1 Spip 1 Spip 2017-05-24 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to enumerate the files on the system via the var_url parameter in a valider_xml action.
CVE-2017-2163 1 N-i-agroinformatics 1 Soy Cms 2017-05-23 5.0 MEDIUM 7.5 HIGH
Directory traversal vulnerability in SOY CMS Ver.1.8.1 to Ver.1.8.12 allows authenticated attackers to read arbitrary files via shop_id.
CVE-2017-8868 1 Flatcore 1 Flatcore-cms 2017-05-17 5.0 MEDIUM 7.5 HIGH
acp/core/files.browser.php in flatCore 1.4.7 allows file deletion via directory traversal in the delete parameter to acp/acp.php. The risk might be limited to requests submitted through CSRF.
CVE-2016-10367 1 Opsview 1 Opsview 2017-05-17 5.0 MEDIUM 7.5 HIGH
In Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch), an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request utilizing a simple URL encoding bypass, %252f instead of /.
CVE-2017-8853 1 Fiyo 1 Fiyo Cms 2017-05-17 6.4 MEDIUM 7.5 HIGH
Fiyo CMS v2.0.7 has an arbitrary file delete vulnerability in dapur/apps/app_config/controller/backuper.php via directory traversal in the file parameter during an act=db action.
CVE-2016-7843 1 Hibara Software 3 Attachecase For Java, Attachecase Lite, Attachecase Pro 2017-05-10 4.3 MEDIUM 5.5 MEDIUM
Directory traversal vulnerability in AttacheCase for Java 0.60 and earlier, AttacheCase Lite 1.4.6 and earlier, and AttacheCase Pro 1.5.7 and earlier allows remote attackers to read arbitrary files via specially crafted ATC file.
CVE-2017-8283 1 Debian 1 Dpkg 2017-05-10 7.5 HIGH 9.8 CRITICAL
dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.
CVE-2016-8593 1 Trendmicro 1 Threat Discovery Appliance 2017-05-10 6.5 MEDIUM 8.8 HIGH
Directory traversal vulnerability in upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via a .. (dot dot) in the dID parameter.