jqueryFileTree 2.1.5 and older Directory Traversal
Max CVSS
7.5
EPSS Score
70.31%
Published
2017-11-17
Updated
2021-03-25
kittoframework kitto 0.5.1 is vulnerable to directory traversal in the router resulting in remote code execution
Max CVSS
7.5
EPSS Score
7.76%
Published
2017-07-17
Updated
2017-07-19
rbenv (all current versions) is vulnerable to Directory Traversal in the specification of Ruby version resulting in arbitrary code execution
Max CVSS
9.8
EPSS Score
0.31%
Published
2017-07-17
Updated
2020-07-01

CVE-2017-1000028

Public exploit
Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request.
Max CVSS
7.5
EPSS Score
97.52%
Published
2017-07-17
Updated
2019-05-03
Chef Software's mixlib-archive versions 0.3.0 and older are vulnerable to a directory traversal attack allowing attackers to overwrite arbitrary files by using ".." in tar archive entries
Max CVSS
7.5
EPSS Score
0.14%
Published
2017-07-17
Updated
2021-04-30
ATutor versions 2.2.1 and earlier are vulnerable to a directory traversal and file extension check bypass in the Course component resulting in code execution. ATutor versions 2.2.1 and earlier are vulnerable to a directory traversal vulnerability in the Course Icon component resulting in information disclosure.
Max CVSS
9.8
EPSS Score
0.77%
Published
2017-07-17
Updated
2017-07-27
Biometric Shift Employee Management System allows Arbitrary File Download via directory traversal sequences in the index.php form_file_name parameter in a download_form action.
Max CVSS
9.8
EPSS Score
0.50%
Published
2017-12-30
Updated
2018-01-09
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has directory traversal via the /storage.html rp parameter, allowing an attacker to read or write to files.
Max CVSS
9.8
EPSS Score
0.56%
Published
2017-12-18
Updated
2018-01-04
The saveFile method in MediaController.java in the Telegram Messenger application before 2017-12-08 for Android allows directory traversal via a pathname obtained in a file-transfer request from a remote peer, as demonstrated by writing to tgnet.dat or tgnet.dat.bak.
Max CVSS
8.8
EPSS Score
0.15%
Published
2017-12-16
Updated
2018-01-04
vBulletin through 5.3.x on Windows allows remote PHP code execution because a require_once call is reachable with an unauthenticated request that can include directory traversal sequences to specify an arbitrary pathname, and because ../ traversal is blocked but ..\ traversal is not blocked. For example, an attacker can make an invalid HTTP request containing PHP code, and then make an index.php?routestring= request with enough instances of ".." to reach an Apache HTTP Server log file.
Max CVSS
9.8
EPSS Score
0.65%
Published
2017-12-14
Updated
2020-08-14
The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code
Max CVSS
7.5
EPSS Score
0.49%
Published
2017-11-29
Updated
2024-04-11
lib/yard/core_ext/file.rb in the server in YARD before 0.9.11 does not block relative paths with an initial ../ sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files.
Max CVSS
7.5
EPSS Score
0.16%
Published
2017-11-28
Updated
2017-12-20
The remote management interface on the Claymore Dual GPU miner 10.1 is vulnerable to an authenticated directory traversal vulnerability exploited by issuing a specially crafted request, allowing a remote attacker to read/write arbitrary files. This can be exploited via ../ sequences in the pathname to miner_file or miner_getfile.
Max CVSS
8.5
EPSS Score
1.99%
Published
2017-12-05
Updated
2017-12-21
LvyeCMS through 3.1 allows remote attackers to upload and execute arbitrary PHP code via directory traversal sequences in the dir parameter, in conjunction with PHP code in the content parameter, within a template Style add request to index.php.
Max CVSS
9.8
EPSS Score
1.52%
Published
2017-11-20
Updated
2017-12-12
ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.
Max CVSS
7.5
EPSS Score
0.34%
Published
2017-11-17
Updated
2023-12-07

CVE-2017-16806

Public exploit
The Process function in RemoteTaskServer/WebServer/HttpServer.cs in Ulterius before 1.9.5.0 allows HTTP server directory traversal.
Max CVSS
7.5
EPSS Score
7.11%
Published
2017-11-13
Updated
2017-11-29
Directory traversal vulnerability in the "Upload Groupkey" functionality in the Web Configuration Utility in Meinberg LANTIME devices with firmware before 6.24.004 allows remote authenticated users with Admin-User access to write to arbitrary files and consequently gain root privileges by uploading a file, as demonstrated by storing a file in the cron.d directory.
Max CVSS
9.0
EPSS Score
0.23%
Published
2017-12-15
Updated
2018-01-03
Sanic before 0.5.1 allows reading arbitrary files with directory traversal, as demonstrated by the /static/..%2f substring.
Max CVSS
7.5
EPSS Score
0.37%
Published
2017-11-10
Updated
2017-11-30
Cisco Small Business SA520 and SA540 devices with firmware 2.1.71 and 2.2.0.7 allow ../ directory traversal in scgi-bin/platform.cgi via the thispage parameter, for reading arbitrary files.
Max CVSS
7.5
EPSS Score
0.17%
Published
2017-10-23
Updated
2017-11-08
On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value.
Max CVSS
7.5
EPSS Score
1.62%
Published
2017-10-19
Updated
2017-11-07
Inedo Otter before 1.7.4 has directory traversal in filesystem-based rafts via vectors involving '/' characters or initial '.' characters, aka OT-181.
Max CVSS
9.8
EPSS Score
0.21%
Published
2017-12-01
Updated
2017-12-15
Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter.
Max CVSS
7.5
EPSS Score
4.39%
Published
2017-10-15
Updated
2021-04-21
Huawei iReader app before 8.0.2.301 has a path traversal vulnerability due to insufficient validation on file storage paths. An attacker can exploit this vulnerability to store downloaded malicious files in an arbitrary directory.
Max CVSS
7.1
EPSS Score
0.13%
Published
2017-12-22
Updated
2018-01-05
OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server allows uploading content using batches (TAR archives). When unpacking TAR archives, Content Server fails to verify the contents of an archive, which causes a path traversal vulnerability via symlinks. Because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation.
Max CVSS
8.8
EPSS Score
0.76%
Published
2017-10-13
Updated
2017-11-03
The Smush Image Compression and Optimization plugin before 2.7.6 for WordPress allows directory traversal.
Max CVSS
7.5
EPSS Score
0.15%
Published
2017-10-06
Updated
2017-10-13
192 vulnerabilities found
1 2 3 4 5 6 7 8
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!