VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201806-0457 CVE-2017-16135 Serverzyy path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
serverzyy is a static file server. serverzyy is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverzyy Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0493 CVE-2017-16172 section2.madisonjbrooks12 Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
section2.madisonjbrooks12 is a simple web server. section2.madisonjbrooks12 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. section2.madisonjbrooks12 Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in section2.madisonjbrooks12
VAR-201806-0489 CVE-2017-16168 Wffserve path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
wffserve is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. wffserve Contains a path traversal vulnerability.Information may be obtained. Wffserve is a file server. A directory traversal vulnerability exists in wffserve
VAR-201806-0499 CVE-2017-16178 intsol-package Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
intsol-package is a file server. intsol-package is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. intsol-package Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in intsol-package
VAR-201806-0462 CVE-2017-16140 Lab6.brit95 path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
lab6.brit95 is a file server. lab6.brit95 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. lab6.brit95 Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0511 CVE-2017-16190 dcdcdcdcdc Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
dcdcdcdcdc is a static file server. dcdcdcdcdc is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. dcdcdcdcdc Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in dcdcdcdcdc
VAR-201806-0239 CVE-2017-16124 Node-server-forfront path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
node-server-forfront is a simple static file server. node-server-forfront is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. node-server-forfront Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0488 CVE-2017-16167 yyooopack Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
yyooopack is a simple file server. yyooopack is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. yyooopack Contains a path traversal vulnerability.Information may be obtained. Yyooopack has a directory traversal vulnerability
VAR-201806-0238 CVE-2017-16123 welcomyzt Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
welcomyzt is a simple file server. welcomyzt is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. welcomyzt Contains a path traversal vulnerability.Information may be obtained
VAR-201806-0503 CVE-2017-16182 serverxxx Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
serverxxx is a static file server. serverxxx is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverxxx Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in serverxxx
VAR-201806-0507 CVE-2017-16186 360class.jansenhm Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
360class.jansenhm is a static file server. 360class.jansenhm is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. 360class.jansenhm Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in 360class.jansenhm
VAR-201806-0496 CVE-2017-16175 ewgaddis.lab6 Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
ewgaddis.lab6 is a file server. ewgaddis.lab6 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. ewgaddis.lab6 Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in ewgaddis.lab6
VAR-201806-0520 CVE-2017-16199 susu-sum Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
susu-sum is a static file server. susu-sum is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. susu-sum Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in susu-sum
VAR-201806-0513 CVE-2017-16192 getcityapi.yoehoehne Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
getcityapi.yoehoehne is a web server. getcityapi.yoehoehne is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. getcityapi.yoehoehne Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in getcityapi.yoehoehne
VAR-201806-0502 CVE-2017-16181 wintiwebdev Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
wintiwebdev is a static file server. wintiwebdev is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. wintiwebdev Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in wintiwebdev
VAR-201806-0512 CVE-2017-16191 cypserver Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
cypserver is a static file server. cypserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. cypserver Contains a path traversal vulnerability.Information may be obtained. Cypserver has a directory traversal vulnerability
VAR-201806-0506 CVE-2017-16185 uekw1511server Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
uekw1511server is a static file server. uekw1511server is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. uekw1511server Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in uekw1511server
VAR-201806-0490 CVE-2017-16169 looppake Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
looppake is a simple http server. looppake is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. looppake Contains a path traversal vulnerability.Information may be obtained. Looppake has a directory traversal vulnerability
VAR-201806-0495 CVE-2017-16174 whispercast Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
whispercast is a file server. whispercast is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. whispercast Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in whispercast
VAR-201806-0497 CVE-2017-16176 jansenstuffpleasework Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
jansenstuffpleasework is a file server. jansenstuffpleasework is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. jansenstuffpleasework Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in jansenstuffpleasework