Total
6543 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-45833 | 1 Wp-ecommerce | 1 Easy Wp Smtp | 2024-11-21 | N/A | 6.8 MEDIUM |
Auth. Path Traversal vulnerability in Easy WP SMTP plugin <= 1.5.1 on WordPress. | |||||
CVE-2022-45829 | 1 Wp-ecommerce | 1 Easy Wp Smtp | 2024-11-21 | N/A | 8.7 HIGH |
Auth. Path Traversal vulnerability in Easy WP SMTP plugin <= 1.5.1 at WordPress. | |||||
CVE-2022-45792 | 1 Omron | 1 Sysmac Studio | 2024-11-21 | N/A | 7.8 HIGH |
Project files may contain malicious contents which the software will use to create files on the filesystem. This allows directory traversal and overwriting files with the privileges of the logged-in user. | |||||
CVE-2022-45783 | 1 Dotcms | 1 Dotcms | 2024-11-21 | N/A | 6.5 MEDIUM |
An issue was discovered in dotCMS core 4.x through 22.10.2. An authenticated directory traversal vulnerability in the dotCMS API can lead to Remote Code Execution. | |||||
CVE-2022-45447 | 1 Prestashop | 1 M4 Pdf | 2024-11-21 | N/A | 6.5 MEDIUM |
M4 PDF plugin for Prestashop sites, in its 3.2.3 version and before, is vulnerable to a directory traversal vulnerability. The “f” parameter is not properly checked in the resource /m4pdf/pdf.php, returning any file given its relative path. An attacker that exploits this vulnerability could download /etc/passwd from the server if the file exists. | |||||
CVE-2022-45381 | 1 Jenkins | 1 Pipeline Utility Steps | 2024-11-21 | N/A | 8.1 HIGH |
Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system. | |||||
CVE-2022-45374 | 2024-11-21 | N/A | 7.7 HIGH | ||
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in YARPP allows PHP Local File Inclusion.This issue affects YARPP: from n/a through 5.30.4. | |||||
CVE-2022-45368 | 2024-11-21 | N/A | 7.7 HIGH | ||
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Lenderd 1003 Mortgage Application allows Relative Path Traversal.This issue affects 1003 Mortgage Application: from n/a through 1.75. | |||||
CVE-2022-45299 | 1 Webbrowser Project | 1 Webbrowser | 2024-11-21 | N/A | 9.8 CRITICAL |
An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL. | |||||
CVE-2022-45290 | 1 Kbase Doc Project | 1 Kbase Doc | 2024-11-21 | N/A | 9.1 CRITICAL |
Kbase Doc v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /web/IndexController.java. | |||||
CVE-2022-45269 | 1 Gmaolinx | 1 Linx Sphere | 2024-11-21 | N/A | 7.5 HIGH |
A directory traversal vulnerability in the component SCS.Web.Server.SPI/1.0 of Linx Sphere LINX 7.35.ST15 allows attackers to read arbitrary files. | |||||
CVE-2022-45184 | 1 Ironmansoftware | 1 Powershell Universal | 2024-11-21 | N/A | 7.2 HIGH |
The Web Server in Ironman Software PowerShell Universal v3.x and v2.x allows for directory traversal outside of the configuration directory, which allows a remote attacker with administrator privilege to create, delete, update, and display files outside of the configuration directory via a crafted HTTP request to particular endpoints in the web server. Patched Versions are 3.5.3 and 3.4.7. | |||||
CVE-2022-45093 | 1 Siemens | 1 Sinec Ins | 2024-11-21 | N/A | 8.5 HIGH |
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product as well as with access to the SFTP server of the affected product (22/tcp), could potentially read and write arbitrary files from and to the device's file system. An attacker might leverage this to trigger remote code execution on the affected component. | |||||
CVE-2022-45092 | 1 Siemens | 1 Sinec Ins | 2024-11-21 | N/A | 9.9 CRITICAL |
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially read and write arbitrary files from and to the device's file system. An attacker might leverage this to trigger remote code execution on the affected component. | |||||
CVE-2022-44942 | 1 Casbin | 1 Casdoor | 2024-11-21 | N/A | 8.1 HIGH |
Casdoor before v1.126.1 was discovered to contain an arbitrary file deletion vulnerability via the uploadFile function. | |||||
CVE-2022-44900 | 1 Py7zr Project | 1 Py7zr | 2024-11-21 | N/A | 9.1 CRITICAL |
A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file. | |||||
CVE-2022-44749 | 1 Knime | 1 Knime Analytics Platform | 2024-11-21 | N/A | 5.5 MEDIUM |
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Analytics Platform 3.2.0 and above can result in arbitrary files being overwritten on the user's system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being opened by a user, can overwrite arbitrary files that the user has write access to. It's not necessary to execute the workflow, opening the workflow is sufficient. The user will notice that something is wrong because an error is being reported but only after the files have already been written. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the user. In all cases the attacker has to know the location of files on the user's system, though. | |||||
CVE-2022-44748 | 1 Knime | 1 Knime Server | 2024-11-21 | N/A | 7.1 HIGH |
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Server since 4.3.0 can result in arbitrary files being overwritten on the server's file system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being uploaded, can overwrite arbitrary files that the operating system user running the KNIME Server process has write access to. The user must be authenticated and have permissions to upload files to KNIME Server. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the KNIME Server process user. In all cases the attacker has to know the location of files on the server's file system, though. Note that users that have permissions to upload workflows usually also have permissions to run them on the KNIME Server and can therefore already execute arbitrary code in the context of the KNIME Executor's operating system user. There is no workaround to prevent this vulnerability from being exploited. Updates to fixed versions 4.13.6, 4.14.3, or 4.15.3 are advised. | |||||
CVE-2022-44653 | 1 Trendmicro | 1 Apex One | 2024-11-21 | N/A | 7.8 HIGH |
A security agent directory traversal vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | |||||
CVE-2022-44635 | 1 Apache | 1 Fineract | 2024-11-21 | N/A | 8.8 HIGH |
Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1. |