Total
284 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-29446 | 1 Wow-company | 1 Counter Box | 2024-11-21 | 4.0 MEDIUM | 6.8 MEDIUM |
Authenticated (administrator or higher role) Local File Inclusion (LFI) vulnerability in Wow-Company's Counter Box plugin <= 1.1.1 at WordPress. | |||||
CVE-2022-29302 | 1 Contec | 2 Sv-cpt-mc310, Sv-cpt-mc310 Firmware | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
SolarView Compact ver.6.00 was discovered to contain a local file disclosure via /html/Solar_Ftp.php. | |||||
CVE-2022-28462 | 1 Xxyopen | 1 Novel-plus | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
novel-plus 3.6.0 suffers from an Arbitrary file reading vulnerability. | |||||
CVE-2022-28445 | 1 Kitesky | 1 Kitecms | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
KiteCMS v1.1.1 was discovered to contain an arbitrary file read vulnerability via the background management module. | |||||
CVE-2022-28002 | 1 Movie Seat Reservation Project | 1 Movie Seat Reservation | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Movie Seat Reservation v1 was discovered to contain an unauthenticated file disclosure vulnerability via /index.php?page=home. | |||||
CVE-2022-27837 | 2 Google, Samsung | 2 Android, Accessibility | 2024-11-21 | 9.3 HIGH | 4.4 MEDIUM |
A vulnerability using PendingIntent in Accessibility prior to version 12.5.3.2 in Android R(11.0) and 13.0.1.1 in Android S(12.0) allows attacker to access the file with system privilege. | |||||
CVE-2022-26877 | 1 Asana | 1 Desktop | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
Asana Desktop before 1.6.0 allows remote attackers to exfiltrate local files if they can trick the Asana desktop app into loading a malicious web page. | |||||
CVE-2022-26271 | 1 74cms | 1 74cms | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
74cmsSE v3.4.1 was discovered to contain an arbitrary file read vulnerability via the $url parameter at \index\controller\Download.php. | |||||
CVE-2022-25497 | 1 Cuppacms | 1 Cuppacms | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function. | |||||
CVE-2022-25299 | 1 Cesanta | 1 Mongoose | 2024-11-21 | 5.0 MEDIUM | 9.8 CRITICAL |
This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder. | |||||
CVE-2022-25297 | 1 Drogon | 1 Drogon | 2024-11-21 | 6.5 MEDIUM | 7.5 HIGH |
This affects the package drogonframework/drogon before 1.7.5. The unsafe handling of file names during upload using HttpFile::save() method may enable attackers to write files to arbitrary locations outside the designated target folder. | |||||
CVE-2022-25104 | 1 Horizontcms Project | 1 Horizontcms | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
HorizontCMS v1.0.0-beta.2 was discovered to contain an arbitrary file download vulnerability via the component /admin/file-manager/. | |||||
CVE-2022-24694 | 1 Mahara | 1 Mahara | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
In Mahara 20.10 before 20.10.4, 21.04 before 21.04.3, and 21.10 before 21.10.1, the names of folders in the Files area can be seen by a person not owning the folders. (Only folder names are affected. Neither file names nor file contents are affected.) | |||||
CVE-2022-24138 | 1 Iobit | 1 Advanced Systemcare | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN). | |||||
CVE-2022-24075 | 1 Navercorp | 1 Whale | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
Whale browser before 3.12.129.18 allowed extensions to replace JavaScript files of the HWP viewer website which could access to local HWP files. When the HWP files were opened, the replaced script could read the files. | |||||
CVE-2022-23738 | 1 Github | 1 Enterprise Server | 2024-11-21 | N/A | 5.7 MEDIUM |
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program. | |||||
CVE-2022-23621 | 1 Xwiki | 1 Xwiki | 2024-11-21 | 4.0 MEDIUM | 5.5 MEDIUM |
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right. | |||||
CVE-2022-23508 | 1 Weave | 1 Weave Gitops | 2024-11-21 | N/A | 8.8 HIGH |
Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. A vulnerability in GitOps run could allow a local user or process to alter a Kubernetes cluster's resources. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. Its endpoint had no security controls to block unauthorized access, therefore allowing local users (and processes) on the same machine to see and alter the bucket content. By leveraging this vulnerability, an attacker could pick a workload of their choosing and inject it into the S3 bucket, which resulted in the successful deployment in the target cluster, without the need to provide any credentials to either the S3 bucket nor the target Kubernetes cluster. There are no known workarounds for this issue, please upgrade. This vulnerability has been fixed by commits 75268c4 and 966823b. Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022. ### Workarounds There is no workaround for this vulnerability. ### References Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks. ### For more information If you have any questions or comments about this advisory: - Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops) - Email us at [support@weave.works](mailto:support@weave.works) | |||||
CVE-2022-23377 | 1 Keep | 1 Archeevo | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Archeevo below 5.0 is affected by local file inclusion through file=~/web.config to allow an attacker to retrieve local files. | |||||
CVE-2022-23316 | 1 Taogogo | 1 Taocms | 2024-11-21 | 4.0 MEDIUM | 4.9 MEDIUM |
An issue was discovered in taoCMS v3.0.2. There is an arbitrary file read vulnerability that can read any files via admin.php?action=file&ctrl=download&path=../../1.txt. |