VARIoT IoT vulnerabilities database

VAR-201806-0482 | CVE-2017-16161 | shenliru Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
shenliru is a simple file server. shenliru is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. shenliru Contains a path traversal vulnerability.Information may be obtained. Shenliru has a directory traversal vulnerability
VAR-201806-0464 | CVE-2017-16142 | infraserver Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
infraserver is a RESTful server. infraserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. infraserver Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in the infraserver
VAR-201806-0463 | CVE-2017-16141 | Lab6drewfusbyu path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
lab6drewfusbyu is an http server. lab6drewfusbyu is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. lab6drewfusbyu Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0467 | CVE-2017-16145 | Sspa path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
sspa is a server dedicated to single-page apps. sspa is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. sspa Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in sspa
VAR-201806-0485 | CVE-2017-16164 | desafio Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
desafio is a simple web server. desafio is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url, but is limited to accessing only .html files. desafio Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0514 | CVE-2017-16193 | mfrs Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
mfrs is a static file server. mfrs is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. mfrs Contains a path traversal vulnerability.Information may be obtained. Mfrs has a directory traversal vulnerability
VAR-201806-0457 | CVE-2017-16135 | Serverzyy path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
serverzyy is a static file server. serverzyy is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverzyy Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0493 | CVE-2017-16172 | section2.madisonjbrooks12 Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
section2.madisonjbrooks12 is a simple web server. section2.madisonjbrooks12 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. section2.madisonjbrooks12 Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in section2.madisonjbrooks12
VAR-201806-0489 | CVE-2017-16168 | Wffserve path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
wffserve is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. wffserve Contains a path traversal vulnerability.Information may be obtained. Wffserve is a file server. A directory traversal vulnerability exists in wffserve
VAR-201806-0499 | CVE-2017-16178 | intsol-package Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
intsol-package is a file server. intsol-package is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. intsol-package Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in intsol-package
VAR-201806-0462 | CVE-2017-16140 | Lab6.brit95 path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
lab6.brit95 is a file server. lab6.brit95 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. lab6.brit95 Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0511 | CVE-2017-16190 | dcdcdcdcdc Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
dcdcdcdcdc is a static file server. dcdcdcdcdc is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. dcdcdcdcdc Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in dcdcdcdcdc
VAR-201806-0239 | CVE-2017-16124 | Node-server-forfront path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
node-server-forfront is a simple static file server. node-server-forfront is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. node-server-forfront Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0488 | CVE-2017-16167 | yyooopack Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
yyooopack is a simple file server. yyooopack is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. yyooopack Contains a path traversal vulnerability.Information may be obtained. Yyooopack has a directory traversal vulnerability
VAR-201806-0238 | CVE-2017-16123 | welcomyzt Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
welcomyzt is a simple file server. welcomyzt is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. welcomyzt Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0503 | CVE-2017-16182 | serverxxx Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
serverxxx is a static file server. serverxxx is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverxxx Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in serverxxx
VAR-201806-0507 | CVE-2017-16186 | 360class.jansenhm Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
360class.jansenhm is a static file server. 360class.jansenhm is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. 360class.jansenhm Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in 360class.jansenhm
VAR-201806-0496 | CVE-2017-16175 | ewgaddis.lab6 Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
ewgaddis.lab6 is a file server. ewgaddis.lab6 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. ewgaddis.lab6 Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in ewgaddis.lab6
VAR-201806-0520 | CVE-2017-16199 | susu-sum Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
susu-sum is a static file server. susu-sum is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. susu-sum Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in susu-sum
VAR-201806-0513 | CVE-2017-16192 | getcityapi.yoehoehne Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
getcityapi.yoehoehne is a web server. getcityapi.yoehoehne is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. getcityapi.yoehoehne Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in getcityapi.yoehoehne