VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201806-0482 CVE-2017-16161 shenliru Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
shenliru is a simple file server. shenliru is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. shenliru Contains a path traversal vulnerability.Information may be obtained. Shenliru has a directory traversal vulnerability
VAR-201806-0464 CVE-2017-16142 infraserver Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
infraserver is a RESTful server. infraserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. infraserver Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in the infraserver
VAR-201806-0463 CVE-2017-16141 Lab6drewfusbyu path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
lab6drewfusbyu is an http server. lab6drewfusbyu is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. lab6drewfusbyu Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0467 CVE-2017-16145 Sspa path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
sspa is a server dedicated to single-page apps. sspa is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. sspa Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in sspa
VAR-201806-0485 CVE-2017-16164 desafio Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
desafio is a simple web server. desafio is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url, but is limited to accessing only .html files. desafio Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0514 CVE-2017-16193 mfrs Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
mfrs is a static file server. mfrs is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. mfrs Contains a path traversal vulnerability.Information may be obtained. Mfrs has a directory traversal vulnerability
VAR-201806-0457 CVE-2017-16135 Serverzyy path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
serverzyy is a static file server. serverzyy is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverzyy Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0493 CVE-2017-16172 section2.madisonjbrooks12 Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
section2.madisonjbrooks12 is a simple web server. section2.madisonjbrooks12 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. section2.madisonjbrooks12 Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in section2.madisonjbrooks12
VAR-201806-0489 CVE-2017-16168 Wffserve path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
wffserve is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. wffserve Contains a path traversal vulnerability.Information may be obtained. Wffserve is a file server. A directory traversal vulnerability exists in wffserve
VAR-201806-0499 CVE-2017-16178 intsol-package Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
intsol-package is a file server. intsol-package is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. intsol-package Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in intsol-package
VAR-201806-0462 CVE-2017-16140 Lab6.brit95 path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
lab6.brit95 is a file server. lab6.brit95 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. lab6.brit95 Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0511 CVE-2017-16190 dcdcdcdcdc Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
dcdcdcdcdc is a static file server. dcdcdcdcdc is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. dcdcdcdcdc Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in dcdcdcdcdc
VAR-201806-0239 CVE-2017-16124 Node-server-forfront path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
node-server-forfront is a simple static file server. node-server-forfront is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. node-server-forfront Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0488 CVE-2017-16167 yyooopack Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
yyooopack is a simple file server. yyooopack is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. yyooopack Contains a path traversal vulnerability.Information may be obtained. Yyooopack has a directory traversal vulnerability
VAR-201806-0238 CVE-2017-16123 welcomyzt Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
welcomyzt is a simple file server. welcomyzt is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. welcomyzt Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0503 CVE-2017-16182 serverxxx Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
serverxxx is a static file server. serverxxx is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverxxx Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in serverxxx
VAR-201806-0507 CVE-2017-16186 360class.jansenhm Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
360class.jansenhm is a static file server. 360class.jansenhm is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. 360class.jansenhm Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in 360class.jansenhm
VAR-201806-0496 CVE-2017-16175 ewgaddis.lab6 Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
ewgaddis.lab6 is a file server. ewgaddis.lab6 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. ewgaddis.lab6 Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in ewgaddis.lab6
VAR-201806-0520 CVE-2017-16199 susu-sum Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
susu-sum is a static file server. susu-sum is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. susu-sum Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in susu-sum
VAR-201806-0513 CVE-2017-16192 getcityapi.yoehoehne Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
getcityapi.yoehoehne is a web server. getcityapi.yoehoehne is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. getcityapi.yoehoehne Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in getcityapi.yoehoehne