CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In 2017(Directory Traversal)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2017-1000170 Dir. Trav. 2017-11-17 2017-11-17
0.0
None ??? ??? ??? ??? ??? ???
jqueryFileTree 2.1.5 and older Directory Traversal
2 CVE-2017-1000062 22 Exec Code Dir. Trav. 2017-07-17 2017-07-19
5.0
None Remote Low Not required Partial None None
kittoframework kitto 0.5.1 is vulnerable to directory traversal in the router resulting in remote code execution
3 CVE-2017-1000047 22 Exec Code Dir. Trav. 2017-07-17 2017-07-21
7.5
None Remote Low Not required Partial Partial Partial
rbenv (all current versions) is vulnerable to Directory Traversal in the specification of Ruby version resulting in arbitrary code execution
4 CVE-2017-1000028 22 Dir. Trav. 2017-07-17 2017-07-21
5.0
None Remote Low Not required Partial None None
Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request.
5 CVE-2017-1000026 22 Dir. Trav. 2017-07-17 2017-07-21
5.0
None Remote Low Not required None Partial None
Chef Software's mixlib-archive versions 0.3.0 and older are vulnerable to a directory traversal attack allowing attackers to overwrite arbitrary files by using ".." in tar archive entries
6 CVE-2017-1000002 22 Exec Code Dir. Trav. Bypass 2017-07-17 2017-07-27
7.5
None Remote Low Not required Partial Partial Partial
ATutor versions 2.2.1 and earlier are vulnerable to a directory traversal and file extension check bypass in the Course component resulting in code execution. ATutor versions 2.2.1 and earlier are vulnerable to a directory traversal vulnerability in the Course Icon component resulting in information disclosure.
7 CVE-2017-16877 Dir. Trav. +Info 2017-11-17 2017-11-17
0.0
None ??? ??? ??? ??? ??? ???
ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.
8 CVE-2017-16806 Dir. Trav. 2017-11-13 2017-11-15
0.0
None ??? ??? ??? ??? ??? ???
The Process function in RemoteTaskServer/WebServer/HttpServer.cs in Ulterius before 1.9.5.0 allows HTTP server directory traversal.
9 CVE-2017-16762 Dir. Trav. 2017-11-10 2017-11-10
0.0
None ??? ??? ??? ??? ??? ???
Sanic before 0.5.1 allows reading arbitrary files with directory traversal, as demonstrated by the /static/..%2f substring.
10 CVE-2017-15805 22 Dir. Trav. 2017-10-23 2017-11-08
5.0
None Remote Low Not required Partial None None
Cisco Small Business SA520 and SA540 devices with firmware 2.1.71 and 2.2.0.7 allow ../ directory traversal in scgi-bin/platform.cgi via the thispage parameter, for reading arbitrary files.
11 CVE-2017-15647 22 Dir. Trav. 2017-10-19 2017-11-07
5.0
None Remote Low Not required Partial None None
On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value.
12 CVE-2017-15363 22 Dir. Trav. 2017-10-15 2017-11-07
5.0
None Remote Low Not required Partial None None
Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter.
13 CVE-2017-15359 22 Dir. Trav. 2017-10-18 2017-11-13
4.0
None Remote Low Single system Partial None None
In the 3CX Phone System 15.5.3554.1, the Management Console typically listens to port 5001 and is prone to a directory traversal attack: "/api/RecordingList/DownloadRecord?file=" and "/api/SupportInfo?file=" are the vulnerable parameters. An attacker must be authenticated to exploit this issue to access sensitive information to aid in subsequent attacks.
14 CVE-2017-15276 22 +Priv Dir. Trav. 2017-10-13 2017-11-02
6.5
None Remote Low Single system Partial Partial Partial
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server allows uploading content using batches (TAR archives). When unpacking TAR archives, Content Server fails to verify the contents of an archive, which causes a path traversal vulnerability via symlinks. Because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation.
15 CVE-2017-15079 22 Dir. Trav. 2017-10-06 2017-10-13
5.0
None Remote Low Not required Partial None None
The Smush Image Compression and Optimization plugin before 2.7.6 for WordPress allows directory traversal.
16 CVE-2017-14754 22 Dir. Trav. 2017-10-02 2017-10-11
6.8
None Remote Low Single system Complete None None
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to Arbitrary File Read: /xAdmin/html/cm_datasource_group_xsd.jsp, parameter: xsd_datasource_schema_file filename. In order for this vulnerability to be exploited, an attacker must authenticate to the application first.
17 CVE-2017-14722 22 Dir. Trav. 2017-09-23 2017-11-09
5.0
None Remote Low Not required Partial None None
Before version 4.8.2, WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.
18 CVE-2017-14719 22 Dir. Trav. 2017-09-23 2017-11-09
5.0
None Remote Low Not required Partial None None
Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.
19 CVE-2017-14695 22 Dir. Trav. 2017-10-24 2017-11-14
7.5
None Remote Low Not required Partial Partial Partial
Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.
20 CVE-2017-14614 22 Dir. Trav. 2017-10-09 2017-11-05
4.0
None Remote Low Single system Partial None None
Directory traversal vulnerability in the Visor GUI Console in GridGain before 1.7.16, 1.8.x before 1.8.12, 1.9.x before 1.9.7, and 8.x before 8.1.5 allows remote authenticated users to read arbitrary files on remote cluster nodes via a crafted path.
21 CVE-2017-14514 22 Dir. Trav. 2017-09-17 2017-09-21
5.0
None Remote Low Not required Partial None None
Directory Traversal on Tenda W15E devices before 15.11.0.14 allows remote attackers to read unencrypted files via a crafted URL.
22 CVE-2017-14513 22 Dir. Trav. 2017-09-17 2017-09-21
5.0
None Remote Low Not required Partial None None
Directory traversal vulnerability in MetInfo 5.3.17 allows remote attackers to read information from any ini format file via the f_filename parameter in a fingerprintdo action to admin/app/physical/physical.php.
23 CVE-2017-14120 22 Dir. Trav. 2017-09-03 2017-09-05
5.0
None Remote Low Not required Partial None None
unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory traversal vulnerability for RAR v2 archives: pathnames of the form ../[filename] are unpacked into the upper directory.
24 CVE-2017-13996 22 Exec Code Dir. Trav. 2017-10-05 2017-10-12
6.5
None Remote Low Single system Partial Partial Partial
A Relative Path Traversal issue was discovered in LOYTEC LVIS-3ME versions prior to 6.2.0. The web user interface fails to prevent access to critical files that non administrative users should not have access to, which could allow an attacker to create or modify files or execute arbitrary code.
25 CVE-2017-13985 22 Dir. Trav. 2017-09-29 2017-10-05
4.0
None Remote Low Single system Partial None None
An authentication vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows remote users to traverse directory leading to disclosure of information.
26 CVE-2017-13984 287 Dir. Trav. 2017-09-29 2017-10-05
5.5
None Remote Low Single system None Partial Partial
An authentication vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows remote users to delete arbitrary files via servlet directory traversal.
27 CVE-2017-13982 434 Dir. Trav. 2017-09-29 2017-10-10
9.0
None Remote Low Single system Complete Complete Complete
A directory traversal vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows users to upload unrestricted files.
28 CVE-2017-13780 22 Dir. Trav. 2017-08-30 2017-09-05
5.0
None Remote Low Not required Partial None None
The EyesOfNetwork web interface (aka eonweb) 5.1-0 allows directory traversal attacks for reading arbitrary files via the module/admin_conf/download.php file parameter.
29 CVE-2017-12943 22 Dir. Trav. 2017-08-18 2017-09-13
5.0
None Remote Low Not required Partial None None
D-Link DIR-600 Rev Bx devices with v2.x firmware allow remote attackers to read passwords via a model/__show_info.php?REQUIRE_FILE= absolute path traversal attack, as demonstrated by discovering the admin password.
30 CVE-2017-12938 22 Dir. Trav. Bypass 2017-08-18 2017-08-29
5.0
None Remote Low Not required Partial None None
UnRAR before 5.5.7 allows remote attackers to bypass a directory-traversal protection mechanism via vectors involving a symlink to the . directory, a symlink to the .. directory, and a regular file.
31 CVE-2017-12791 22 Dir. Trav. 2017-08-23 2017-08-29
7.5
None Remote Low Not required Partial Partial Partial
Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.11.7 and 2017.7.x before 2017.7.1 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.
32 CVE-2017-12694 22 Dir. Trav. 2017-08-25 2017-08-30
5.0
None Remote Low Not required Partial None None
A Directory Traversal issue was discovered in SpiderControl SCADA Web Server. An attacker may be able to use a simple GET request to perform a directory traversal into system files.
33 CVE-2017-12637 22 Dir. Trav. 2017-08-07 2017-08-28
5.0
None Remote Low Not required Partial None None
Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657.
34 CVE-2017-12586 22 Dir. Trav. 2017-08-05 2017-08-14
4.0
None Remote Low Single system Partial None None
SLiMS 8 Akasia through 8.3.1 has an arbitrary file reading issue because of directory traversal in the url parameter to admin/help.php. It can be exploited by remote authenticated librarian users.
35 CVE-2017-12285 22 Dir. Trav. 2017-10-19 2017-11-06
6.4
None Remote Low Not required None Partial Partial
A vulnerability in the web interface of Cisco Network Analysis Module Software could allow an unauthenticated, remote attacker to delete arbitrary files from an affected system, aka Directory Traversal. The vulnerability exists because the affected software does not perform proper input validation of HTTP requests that it receives and the software does not apply role-based access controls (RBACs) to requested HTTP URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to delete arbitrary files from the affected system. Cisco Bug IDs: CSCvf41365.
36 CVE-2017-12263 22 Dir. Trav. 2017-10-05 2017-11-01
5.0
None Remote Low Not required Partial None None
A vulnerability in the web interface of Cisco License Manager software could allow an unauthenticated, remote attacker to download and view files within the application that should be restricted, aka Directory Traversal. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. An exploit could allow the attacker to view application files that may contain sensitive information. Cisco Bug IDs: CSCvd83577.
37 CVE-2017-12188 22 DoS Exec Code Dir. Trav. 2017-10-11 2017-11-03
6.9
None Local Medium Not required Complete Complete Complete
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
38 CVE-2017-12074 22 Dir. Trav. 2017-08-24 2017-08-29
4.0
None Remote Low Single system None Partial None
Directory traversal vulnerability in the SYNO.DNSServer.Zone.MasterZoneConf in Synology DNS Server before 2.2.1-3042 allows remote authenticated attackers to write arbitrary files via the domain_name parameter.
39 CVE-2017-11723 22 Dir. Trav. 2017-07-29 2017-08-04
5.0
None Remote Low Not required None Partial None
Directory traversal vulnerability in plugins/ImageManager/backend.php in Xinha 0.96, as used in Jojo 4.4.0, allows remote attackers to delete any folder via directory traversal sequences in the deld parameter.
40 CVE-2017-11658 22 Dir. Trav. Bypass File Inclusion 2017-07-26 2017-08-04
5.0
None Remote Low Not required Partial None None
In the WP Rocket plugin 2.9.3 for WordPress, the Local File Inclusion mitigation technique is to trim traversal characters (..) -- however, this is insufficient to stop remote attacks and can be bypassed by using 0x00 bytes, as demonstrated by a .%00.../.%00.../ attack.
41 CVE-2017-11630 22 Dir. Trav. 2017-07-26 2017-07-31
5.0
None Remote Low Not required None Partial None
dapur\apps\app_config\controller\backuper.php in Fiyo CMS 2.0.7 allows remote attackers to delete arbitrary files via directory traversal sequences in the file parameter in a type=database request, a different vulnerability than CVE-2017-8853.
42 CVE-2017-11587 22 Dir. Trav. 2017-07-23 2017-08-26
5.0
None Remote Low Not required Partial None None
On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is directory traversal in the filename parameter to the /download.conf URI.
43 CVE-2017-11500 22 Dir. Trav. 2017-07-20 2017-07-25
5.0
None Remote Low Not required None Partial None
A directory traversal vulnerability exists in MetInfo 5.3.17. A remote attacker can use ..\ to delete any .zip file via the filenames parameter to /admin/system/database/filedown.php.
44 CVE-2017-11469 22 Dir. Trav. 2017-07-20 2017-07-24
5.0
None Remote Low Not required Partial None None
get2post.php in IDERA Uptime Monitor 7.8 has directory traversal in the file_name parameter.
45 CVE-2017-11466 434 Exec Code Dir. Trav. 2017-07-19 2017-07-25
9.0
None Remote Low Single system Complete Complete Complete
Arbitrary file upload vulnerability in com/dotmarketing/servlets/AjaxFileUploadServlet.class in dotCMS 4.1.1 allows remote authenticated administrators to upload .jsp files to arbitrary locations via directory traversal sequences in the fieldName parameter to servlets/ajax_file_upload. This results in arbitrary code execution by requesting the .jsp file at a /assets URI.
46 CVE-2017-11456 22 Dir. Trav. 2017-07-19 2017-07-25
5.0
None Remote Low Not required Partial None None
Geneko GWR routers allow directory traversal sequences starting with a /../ substring, as demonstrated by unauthenticated read access to the configuration file.
47 CVE-2017-11440 22 Dir. Trav. 2017-07-19 2017-07-21
4.0
None Remote Low Single system Partial None None
In Sitecore 8.2, there is absolute path traversal via the shell/Applications/Layouts/IDE.aspx fi parameter and the admin/LinqScratchPad.aspx Reference parameter.
48 CVE-2017-11389 22 Exec Code Dir. Trav. 2017-08-02 2017-08-05
7.5
None Remote Low Not required Partial Partial Partial
Directory traversal vulnerability in Trend Micro Control Manager 6.0 allows remote code execution by attackers able to drop arbitrary files in a web-facing directory. Formerly ZDI-CAN-4684.
49 CVE-2017-11348 22 Dir. Trav. 2017-07-17 2017-08-08
6.3
None Remote Medium Single system None Complete None
In Octopus Deploy 3.x before 3.15.4, an authenticated user with PackagePush permission to upload packages could upload a maliciously crafted NuGet package, potentially overwriting other packages or modifying system files. This is a directory traversal in the PackageId value.
50 CVE-2017-11162 22 Dir. Trav. 2017-09-08 2017-09-11
4.0
None Remote Low Single system Partial None None
Directory traversal vulnerability in synphotoio in Synology Photo Station before 6.7.4-3433 and 6.3-2968 allows remote authenticated users to read arbitrary files via unspecified vectors.
Total number of vulnerabilities : 243   Page : 1 (This Page)2 3 4 5
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.