Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-22
Total 5025 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-12102 1 Tiny File Manager Project 1 Tiny File Manager 2020-05-18 6.8 MEDIUM 7.7 HIGH
In Tiny File Manager 2.4.1, there is a Path Traversal vulnerability in the ajax recursive directory listing functionality. This allows authenticated users to enumerate directories and files on the filesystem (outside of the application scope).
CVE-2020-12103 1 Tiny File Manager Project 1 Tiny File Manager 2020-05-18 4.0 MEDIUM 7.7 HIGH
In Tiny File Manager 2.4.1 there is a vulnerability in the ajax file backup copy functionality which allows authenticated users to create backup copies of files (with .bak extension) outside the scope in the same directory in which they are stored.
CVE-2020-8983 1 Citrix 1 Sharefile Storagezones Controller 2020-05-15 5.0 MEDIUM 7.5 HIGH
An arbitrary file write issue exists in all versions of Citrix ShareFile StorageZones (aka storage zones) Controller, including the most recent 5.10.x releases as of May 2020, which allows remote code execution. RCE and file access is granted to everything hosted by ShareFile, be it on-premise or inside Citrix Cloud itself (both are internet facing). NOTE: unlike most CVEs, exploitability depends on the product version that was in use when a particular setup step was performed, NOT the product version that is in use during a current assessment of a CVE consumer's product inventory. Specifically, the vulnerability can be exploited if a storage zone was created by one of these product versions: 5.9.0, 5.8.0, 5.7.0, 5.6.0, 5.5.0, or earlier. This CVE differs from CVE-2020-7473 and CVE-2020-8982.
CVE-2020-8982 1 Citrix 1 Sharefile Storagezones Controller 2020-05-15 5.0 MEDIUM 7.5 HIGH
An unauthenticated arbitrary file read issue exists in all versions of Citrix ShareFile StorageZones (aka storage zones) Controller, including the most recent 5.10.x releases as of May 2020. RCE and file access is granted to everything hosted by ShareFile, be it on-premise or inside Citrix Cloud itself (both are internet facing). NOTE: unlike most CVEs, exploitability depends on the product version that was in use when a particular setup step was performed, NOT the product version that is in use during a current assessment of a CVE consumer's product inventory. Specifically, the vulnerability can be exploited if a storage zone was created by one of these product versions: 5.9.0, 5.8.0, 5.7.0, 5.6.0, 5.5.0, or earlier. This CVE differs from CVE-2020-7473 and CVE-2020-8983.
CVE-2020-13093 1 Ispyconnect 1 Agent Dvr 2020-05-15 5.0 MEDIUM 5.3 MEDIUM
iSpyConnect.com Agent DVR before 2.7.1.0 allows directory traversal.
CVE-2019-17572 1 Apache 1 Rocketmq 2020-05-15 5.0 MEDIUM 5.3 MEDIUM
In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.
CVE-2020-5834 1 Symantec 1 Endpoint Protection Manager 2020-05-14 5.0 MEDIUM 5.3 MEDIUM
Symantec Endpoint Protection Manager, prior to 14.3, may be susceptible to a directory traversal attack that could allow a remote actor to determine the size of files in the directory.
CVE-2020-7647 1 Jooby 1 Jooby 2020-05-14 5.0 MEDIUM 5.3 MEDIUM
All versions before 1.6.7 and all versions after 2.0.0 inclusive and before 2.8.2 of io.jooby:jooby and org.jooby:jooby are vulnerable to Directory Traversal via two separate vectors.
CVE-2017-5946 2 Debian, Rubyzip Project 2 Debian Linux, Rubyzip 2020-05-14 7.5 HIGH 9.8 CRITICAL
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
CVE-2020-10794 1 Gira 2 Tks-ip-gateway, Tks-ip-gateway Firmware 2020-05-13 5.0 MEDIUM 9.8 CRITICAL
Gira TKS-IP-Gateway 4.0.7.7 is vulnerable to unauthenticated path traversal that allows an attacker to download the application database. This can be combined with CVE-2020-10795 for remote root access.
CVE-2020-5744 1 Tecnick 1 Tcexam 2020-05-13 4.0 MEDIUM 4.9 MEDIUM
Relative Path Traversal in TCExam 14.2.2 allows a remote, authenticated attacker to read the contents of arbitrary files on disk.
CVE-2020-12737 1 Maxum 1 Rumpus 2020-05-13 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in Maxum Rumpus before 8.2.12 on macOS. Authenticated users can perform a path traversal using double escaped characters, enabling read access to arbitrary files on the server.
CVE-2020-12765 1 Solis 1 Miolo 2020-05-12 5.0 MEDIUM 5.3 MEDIUM
Solis Miolo 2.0 allows index.php?module=install&action=view&item= Directory Traversal.
CVE-2019-18870 1 Blaauwproducts 1 Remote Kiln Control 2020-05-12 4.0 MEDIUM 6.5 MEDIUM
A path traversal via the iniFile parameter in excel.php in Blaauw Remote Kiln Control through v3.00r4 allows an authenticated attacker to download arbitrary files from the host machine.
CVE-2020-12764 1 Solis 1 Gnuteca 2020-05-12 5.0 MEDIUM 5.3 MEDIUM
Gnuteca 3.8 allows file.php?folder=/&file= Directory Traversal.
CVE-2020-11431 1 Inetsoftware 3 Clear Reports, Helpdesk, Pdfc 2020-05-12 6.4 MEDIUM 9.1 CRITICAL
The documentation component in i-net Clear Reports 16.0 to 19.2, HelpDesk 8.0 to 8.3, and PDFC 4.3 to 6.2 allows a remote unauthenticated attacker to read arbitrary system files and directories on the target server via Directory Traversal.
CVE-2020-7473 1 Citrix 1 Sharefile Storagezones Controller 2020-05-12 5.0 MEDIUM 7.5 HIGH
In certain situations, all versions of Citrix ShareFile StorageZones (aka storage zones) Controller, including the most recent 5.10.x releases as of May 2020, allow unauthenticated attackers to access the documents and folders of ShareFile users. NOTE: unlike most CVEs, exploitability depends on the product version that was in use when a particular setup step was performed, NOT the product version that is in use during a current assessment of a CVE consumer's product inventory. Specifically, the vulnerability can be exploited if a storage zone was created by one of these product versions: 5.9.0, 5.8.0, 5.7.0, 5.6.0, 5.5.0, or earlier. This CVE differs from CVE-2020-8982 and CVE-2020-8983 but has essentially the same risk.
CVE-2020-10634 1 Sae-it 2 Net-line Fw-50, Net-line Fw-50 Firmware 2020-05-12 6.4 MEDIUM 9.1 CRITICAL
SAE IT-systems FW-50 Remote Telemetry Unit (RTU). A specially crafted request could allow an attacker to view the file structure of the affected device and access files that should be inaccessible.
CVE-2020-10859 1 Zohocorp 1 Manageengine Desktop Central 2020-05-12 4.0 MEDIUM 6.5 MEDIUM
Zoho ManageEngine Desktop Central before 10.0.484 allows authenticated arbitrary file writes during ZIP archive extraction via Directory Traversal in a crafted AppDependency API request.
CVE-2019-18871 1 Blaauwproducts 1 Remote Kiln Control 2020-05-12 6.5 MEDIUM 8.8 HIGH
A path traversal in debug.php accessed via default.php in Blaauw Remote Kiln Control through v3.00r4 allows an authenticated attacker to upload arbitrary files, leading to arbitrary remote code execution.