Show filters
474 Total Results
Displaying 1-10 of 474
Sort by:
Attacker Value
Very High
CVE-2020-8195
Disclosure Date: July 10, 2020 (last updated February 21, 2025)
Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.
3
Attacker Value
Unknown
CVE-2020-12116
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request.
3
Attacker Value
Moderate
CVE-2020-11738
Disclosure Date: April 13, 2020 (last updated February 21, 2025)
The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.
1
Attacker Value
Very High
CVE-2020-10977
Disclosure Date: April 08, 2020 (last updated February 21, 2025)
GitLab EE/CE 8.5 to 12.9 is vulnerable to a an path traversal when moving an issue between projects.
1
Attacker Value
Very High
CVE-2020-15858
Disclosure Date: August 21, 2020 (last updated February 22, 2025)
Some devices of Thales DIS (formerly Gemalto, formerly Cinterion) allow Directory Traversal by physically proximate attackers. The directory path access check of the internal flash file system can be circumvented. This flash file system can store application-specific data and data needed for customer Java applications, TLS and OTAP (Java over-the-air-provisioning) functionality. The affected products and releases are: BGS5 up to and including SW RN 02.000 / ARN 01.001.06 EHSx and PDSx up to and including SW RN 04.003 / ARN 01.000.04 ELS61 up to and including SW RN 02.002 / ARN 01.000.04 ELS81 up to and including SW RN 05.002 / ARN 01.000.04 PLS62 up to and including SW RN 02.000 / ARN 01.000.04
1
Attacker Value
Very High
CVE-2020-5410
Disclosure Date: June 01, 2020 (last updated February 21, 2025)
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
1
Attacker Value
Moderate
CVE-2020-5284
Disclosure Date: March 30, 2020 (last updated February 21, 2025)
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
1
Attacker Value
Very High
CVE-2020-7246
Disclosure Date: January 21, 2020 (last updated February 21, 2025)
A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
1
Attacker Value
Moderate
CVE-2020-10086
Disclosure Date: March 13, 2020 (last updated February 21, 2025)
GitLab 10.4 through 12.8.1 allows Directory Traversal. A particular endpoint was vulnerable to a directory traversal vulnerability, leading to arbitrary file read.
0
Attacker Value
Unknown
CVE-2020-35883
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the mozwire crate through 2020-08-18 for Rust. A ../ directory-traversal situation allows overwriting local files that have .conf at the end of the filename.
0