Vulnerabilities (CVE)

Filtered by CWE-22
Total 7108 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-16141 1 Thinkcmf 1 Thinkcmfx 2024-11-21 5.5 MEDIUM 6.5 MEDIUM
ThinkCMF X2.2.3 has an arbitrary file deletion vulnerability in do_avatar in \application\User\Controller\ProfileController.class.php via an imgurl parameter with a ..\ sequence. A member user can delete any file on a Windows server.
CVE-2018-16133 1 Cybrotech 1 Cybrohttpserver 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Cybrotech CyBroHttpServer 1.0.3 allows Directory Traversal via a ../ in the URI.
CVE-2018-16059 1 Endress 2 Wirelesshart Fieldgate Swg70, Wirelesshart Fieldgate Swg70 Firmware 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Endress+Hauser WirelessHART Fieldgate SWG70 3.x devices allow Directory Traversal via the fcgi-bin/wgsetcgi filename parameter.
CVE-2018-15810 1 Visiology 1 Flipbox 2024-11-21 5.0 MEDIUM 7.5 HIGH
Visiology Flipbox Software Suite before 2.7.0 allows directory traversal via %5c%2e%2e%2f because it does not sanitize filename parameters.
CVE-2018-15782 1 Rsa 1 Authentication Manager 2024-11-21 7.2 HIGH 7.7 HIGH
The Quick Setup component of RSA Authentication Manager versions prior to 8.4 is vulnerable to a relative path traversal vulnerability. A local attacker could potentially provide an administrator with a crafted license that if used during the quick setup deployment of the initial RSA Authentication Manager system, could allow the attacker unauthorized access to that system.
CVE-2018-15750 1 Saltstack 1 Salt 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
CVE-2018-15745 1 Argussurveillance 1 Dvr 2024-11-21 5.0 MEDIUM 7.5 HIGH
Argus Surveillance DVR 4.0.0.0 devices allow Unauthenticated Directory Traversal, leading to File Disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter.
CVE-2018-15706 1 Advantech 1 Webaccess 2024-11-21 6.8 MEDIUM 6.5 MEDIUM
WADashboard API in Advantech WebAccess 8.3.1 and 8.3.2 allows remote authenticated attackers to read any file on the filesystem due to a directory traversal vulnerability in the readFile API.
CVE-2018-15705 1 Advantech 1 Webaccess 2024-11-21 8.5 HIGH 6.5 MEDIUM
WADashboard API in Advantech WebAccess 8.3.1 and 8.3.2 allows remote authenticated attackers to write or overwrite any file on the filesystem due to a directory traversal vulnerability in the writeFile API. An attacker can use this vulnerability to remotely execute arbitrary code.
CVE-2018-15695 1 Asustor 1 Data Master 2024-11-21 8.5 HIGH 6.5 MEDIUM
ASUSTOR Data Master 3.1.5 and below allows authenticated remote non-administrative users to delete any file on the file system due to a path traversal vulnerability in wallpaper.cgi.
CVE-2018-15694 1 Asustor 1 Data Master 2024-11-21 6.0 MEDIUM 7.5 HIGH
ASUSTOR Data Master 3.1.5 and below allows authenticated remote non-administrative users to upload files to arbitrary locations due to a path traversal vulnerability. This could lead to code execution if the "Web Server" feature is enabled.
CVE-2018-15610 1 Avaya 1 Ip Office 2024-11-21 9.0 HIGH 7.3 HIGH
A vulnerability in the one-X Portal component of Avaya IP Office allows an authenticated attacker to read and delete arbitrary files on the system. Affected versions of Avaya IP Office include 9.1 through 9.1 SP12, 10.0 through 10.0 SP7, and 10.1 through 10.1 SP2.
CVE-2018-15540 1 Agentejo 1 Cockpit 2024-11-21 7.5 HIGH 9.8 CRITICAL
Agentejo Cockpit performs actions on files without appropriate validation and therefore allows an attacker to traverse the file system to unintended locations and/or access arbitrary files, aka /media/api Directory Traversal.
CVE-2018-15536 1 Tecrail 1 Responsive Filemanager 2024-11-21 5.8 MEDIUM 5.5 MEDIUM
/filemanager/ajax_calls.php in tecrail Responsive FileManager before 9.13.4 does not properly validate file paths in archives, allowing for the extraction of crafted archives to overwrite arbitrary files via an extract action, aka Directory Traversal.
CVE-2018-15535 1 Tecrail 1 Responsive Filemanager 2024-11-21 5.0 MEDIUM 7.5 HIGH
/filemanager/ajax_calls.php in tecrail Responsive FileManager before 9.13.4 uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize get_file sequences such as ".." that can resolve to a location that is outside of that directory, aka Directory Traversal.
CVE-2018-15495 1 Tecrail 1 Responsive Filemanager 2024-11-21 5.0 MEDIUM 7.5 HIGH
/filemanager/upload.php in Responsive FileManager before 9.13.3 allows Directory Traversal and SSRF because the url parameter is used directly in a curl_exec call, as demonstrated by a file:///etc/passwd value.
CVE-2018-15490 2 Expressvpn, Microsoft 2 Expressvpn, Windows 2024-11-21 6.6 MEDIUM 7.1 HIGH
An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication with the client side of the ExpressVPN application. A JSON-RPC protocol over HTTP is used for communication. The JSON-RPC XVPN.GetPreference and XVPN.SetPreference methods are vulnerable to path traversal, and allow reading and writing files on the file system on behalf of the service.
CVE-2018-15450 1 Cisco 1 Prime Collaboration 2024-11-21 5.5 MEDIUM 6.5 MEDIUM
A vulnerability in the web-based UI of Cisco Prime Collaboration Assurance could allow an authenticated, remote attacker to overwrite files on the file system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using a specific UI input field to provide a custom path location. A successful exploit could allow the attacker to overwrite files on the file system.
CVE-2018-15142 1 Open-emr 1 Openemr 2024-11-21 6.5 MEDIUM 8.8 HIGH
Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.
CVE-2018-15141 1 Open-emr 1 Openemr 2024-11-21 5.5 MEDIUM 6.5 MEDIUM
Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to delete arbitrary files via the "docid" parameter when the mode is set to delete.