VARIoT IoT vulnerabilities database
| VAR-201806-0457 | CVE-2017-16135 | Serverzyy path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
serverzyy is a static file server. serverzyy is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverzyy Contains a path traversal vulnerability.Information may be obtained
| VAR-201806-0493 | CVE-2017-16172 | section2.madisonjbrooks12 Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
section2.madisonjbrooks12 is a simple web server. section2.madisonjbrooks12 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. section2.madisonjbrooks12 Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in section2.madisonjbrooks12
| VAR-201806-0489 | CVE-2017-16168 | Wffserve path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
wffserve is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. wffserve Contains a path traversal vulnerability.Information may be obtained. Wffserve is a file server. A directory traversal vulnerability exists in wffserve
| VAR-201806-0499 | CVE-2017-16178 | intsol-package Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
intsol-package is a file server. intsol-package is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. intsol-package Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in intsol-package
| VAR-201806-0462 | CVE-2017-16140 | Lab6.brit95 path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
lab6.brit95 is a file server. lab6.brit95 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. lab6.brit95 Contains a path traversal vulnerability.Information may be obtained
| VAR-201806-0511 | CVE-2017-16190 | dcdcdcdcdc Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
dcdcdcdcdc is a static file server. dcdcdcdcdc is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. dcdcdcdcdc Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in dcdcdcdcdc
| VAR-201806-0239 | CVE-2017-16124 | Node-server-forfront path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
node-server-forfront is a simple static file server. node-server-forfront is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. node-server-forfront Contains a path traversal vulnerability.Information may be obtained
| VAR-201806-0488 | CVE-2017-16167 | yyooopack Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
yyooopack is a simple file server. yyooopack is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. yyooopack Contains a path traversal vulnerability.Information may be obtained. Yyooopack has a directory traversal vulnerability
| VAR-201806-0238 | CVE-2017-16123 | welcomyzt Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
welcomyzt is a simple file server. welcomyzt is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. welcomyzt Contains a path traversal vulnerability.Information may be obtained
| VAR-201806-0503 | CVE-2017-16182 | serverxxx Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
serverxxx is a static file server. serverxxx is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. serverxxx Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in serverxxx
| VAR-201806-0507 | CVE-2017-16186 | 360class.jansenhm Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
360class.jansenhm is a static file server. 360class.jansenhm is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. 360class.jansenhm Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in 360class.jansenhm
| VAR-201806-0496 | CVE-2017-16175 | ewgaddis.lab6 Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
ewgaddis.lab6 is a file server. ewgaddis.lab6 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. ewgaddis.lab6 Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in ewgaddis.lab6
| VAR-201806-0520 | CVE-2017-16199 | susu-sum Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
susu-sum is a static file server. susu-sum is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. susu-sum Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in susu-sum
| VAR-201806-0513 | CVE-2017-16192 | getcityapi.yoehoehne Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
getcityapi.yoehoehne is a web server. getcityapi.yoehoehne is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. getcityapi.yoehoehne Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in getcityapi.yoehoehne
| VAR-201806-0502 | CVE-2017-16181 | wintiwebdev Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
wintiwebdev is a static file server. wintiwebdev is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. wintiwebdev Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in wintiwebdev
| VAR-201806-0512 | CVE-2017-16191 | cypserver Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
cypserver is a static file server. cypserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. cypserver Contains a path traversal vulnerability.Information may be obtained. Cypserver has a directory traversal vulnerability
| VAR-201806-0506 | CVE-2017-16185 | uekw1511server Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
uekw1511server is a static file server. uekw1511server is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. uekw1511server Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in uekw1511server
| VAR-201806-0490 | CVE-2017-16169 | looppake Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
looppake is a simple http server. looppake is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. looppake Contains a path traversal vulnerability.Information may be obtained. Looppake has a directory traversal vulnerability
| VAR-201806-0495 | CVE-2017-16174 | whispercast Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
whispercast is a file server. whispercast is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. whispercast Contains a path traversal vulnerability.Information may be obtained. A directory traversal vulnerability exists in whispercast
| VAR-201806-0497 | CVE-2017-16176 | jansenstuffpleasework Path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
jansenstuffpleasework is a file server. jansenstuffpleasework is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. jansenstuffpleasework Contains a path traversal vulnerability.Information may be obtained. There is a directory traversal vulnerability in jansenstuffpleasework