映射到 CWE-639,CWE-22 的搜索结果 (2035)

CVE-2017-7675(发布:2017-08-10 22:29:00)NMS
CVSS5.0

[原文]The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.

CVE-2015-0781(发布:2017-08-09 14:29:00)NMC
CVSS7.5

[CNNVD]Novell ZENworks 远程代码执行漏洞--Novell ZENworks是美国Novell公司的一套支持在组织内跨资源进行自动化IT管理和业务流程管理的软件。 Novell ZENworks的Rtrlet类中的‘doPost’方法存在远程代码执行漏洞,该漏洞源于程序没有充分过滤上传文件的路径。攻击...

CVE-2017-11152(发布:2017-08-08 11:29:07)NP
CVSS5.0

[原文]Directory traversal vulnerability in PixlrEditorHandler.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to write arbitrary files via the path parameter.

CVE-2017-12637(发布:2017-08-07 16:29:01)N
CVSS5.0

[原文]Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657.

CVE-2011-5325(发布:2017-08-07 13:29:00)NM
CVSS5.0

[原文]Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.

CVE-2017-6758(发布:2017-08-07 02:29:00)NMS
CVSS6.8

[原文]A vulnerability in the web framework of Cisco Unified Communications Manager 11.5(1.10000.6) could allow an authenticated, remote attacker to access arbitrary files in the context of the web root directory structure on an affected device. The vulnerability is due to insufficient input validation by the affected software. An attacker could exploit this vulnerability by using directory traversal techniques to read files in the web root directory structure on the Cisco Unified Communications Manager filesystem. Cisco Bug IDs: CSCve13796.

首页上一页678910111213下一页尾页 第8页 / 共340页

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站