Security for everyone

CVE-2022-38794 Scanner

Detects 'Directory Traversal' vulnerability in Zaver affects v. through 2020-12-15.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




Zaver is a widely used software program designed for the purpose of file management. The product provides an easy-to-use interface, allowing users to navigate directories and perform basic file operations such as copy, move, and delete. Additionally, Zaver enables users to search for files using various search criteria, such as file type, size, and date modified, making it a versatile tool for both personal and commercial use.

However, a significant vulnerability has been detected in version 2020-12-15 of Zaver, known as CVE-2022-38794. This vulnerability allows for directory traversal through the GET /.. substring. By using this vulnerability, attackers can gain unauthorized access to directories and files on a victim's system, compromising sensitive data and potentially leading to further malicious activities.

When exploited, this vulnerability can lead to several severe consequences. A malicious attacker can gain unauthorized access to sensitive files on the victim's system and steal confidential information, such as financial records, personal data, or sensitive documents. Additionally, attackers can implant malware on the victim's system, leading to more severe damage such as system crashes, theft of personal identification, and sensitive client data.

At, our platform provides advanced and pro features for digital asset security. By relying on our platform, users can quickly and easily learn about vulnerabilities like CVE-2022-38794 in their digital assets, helping them take measures to mitigate the risk of attacks and compromising critical data. Our platform empowers users to stay ahead of potential security threats and ensures that digital assets remain secure and protected at all times.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture