Vulnerabilities (CVE)

Filtered by CWE-552
Total 284 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-29446 1 Wow-company 1 Counter Box 2024-11-21 4.0 MEDIUM 6.8 MEDIUM
Authenticated (administrator or higher role) Local File Inclusion (LFI) vulnerability in Wow-Company's Counter Box plugin <= 1.1.1 at WordPress.
CVE-2022-29302 1 Contec 2 Sv-cpt-mc310, Sv-cpt-mc310 Firmware 2024-11-21 2.1 LOW 5.5 MEDIUM
SolarView Compact ver.6.00 was discovered to contain a local file disclosure via /html/Solar_Ftp.php.
CVE-2022-28462 1 Xxyopen 1 Novel-plus 2024-11-21 5.0 MEDIUM 7.5 HIGH
novel-plus 3.6.0 suffers from an Arbitrary file reading vulnerability.
CVE-2022-28445 1 Kitesky 1 Kitecms 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
KiteCMS v1.1.1 was discovered to contain an arbitrary file read vulnerability via the background management module.
CVE-2022-28002 1 Movie Seat Reservation Project 1 Movie Seat Reservation 2024-11-21 5.0 MEDIUM 7.5 HIGH
Movie Seat Reservation v1 was discovered to contain an unauthenticated file disclosure vulnerability via /index.php?page=home.
CVE-2022-27837 2 Google, Samsung 2 Android, Accessibility 2024-11-21 9.3 HIGH 4.4 MEDIUM
A vulnerability using PendingIntent in Accessibility prior to version 12.5.3.2 in Android R(11.0) and 13.0.1.1 in Android S(12.0) allows attacker to access the file with system privilege.
CVE-2022-26877 1 Asana 1 Desktop 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Asana Desktop before 1.6.0 allows remote attackers to exfiltrate local files if they can trick the Asana desktop app into loading a malicious web page.
CVE-2022-26271 1 74cms 1 74cms 2024-11-21 5.0 MEDIUM 7.5 HIGH
74cmsSE v3.4.1 was discovered to contain an arbitrary file read vulnerability via the $url parameter at \index\controller\Download.php.
CVE-2022-25497 1 Cuppacms 1 Cuppacms 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.
CVE-2022-25299 1 Cesanta 1 Mongoose 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.
CVE-2022-25297 1 Drogon 1 Drogon 2024-11-21 6.5 MEDIUM 7.5 HIGH
This affects the package drogonframework/drogon before 1.7.5. The unsafe handling of file names during upload using HttpFile::save() method may enable attackers to write files to arbitrary locations outside the designated target folder.
CVE-2022-25104 1 Horizontcms Project 1 Horizontcms 2024-11-21 5.0 MEDIUM 7.5 HIGH
HorizontCMS v1.0.0-beta.2 was discovered to contain an arbitrary file download vulnerability via the component /admin/file-manager/.
CVE-2022-24694 1 Mahara 1 Mahara 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
In Mahara 20.10 before 20.10.4, 21.04 before 21.04.3, and 21.10 before 21.10.1, the names of folders in the Files area can be seen by a person not owning the folders. (Only folder names are affected. Neither file names nor file contents are affected.)
CVE-2022-24138 1 Iobit 1 Advanced Systemcare 2024-11-21 7.2 HIGH 7.8 HIGH
IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).
CVE-2022-24075 1 Navercorp 1 Whale 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Whale browser before 3.12.129.18 allowed extensions to replace JavaScript files of the HWP viewer website which could access to local HWP files. When the HWP files were opened, the replaced script could read the files.
CVE-2022-23738 1 Github 1 Enterprise Server 2024-11-21 N/A 5.7 MEDIUM
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
CVE-2022-23621 1 Xwiki 1 Xwiki 2024-11-21 4.0 MEDIUM 5.5 MEDIUM
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right.
CVE-2022-23508 1 Weave 1 Weave Gitops 2024-11-21 N/A 8.8 HIGH
Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. A vulnerability in GitOps run could allow a local user or process to alter a Kubernetes cluster's resources. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. Its endpoint had no security controls to block unauthorized access, therefore allowing local users (and processes) on the same machine to see and alter the bucket content. By leveraging this vulnerability, an attacker could pick a workload of their choosing and inject it into the S3 bucket, which resulted in the successful deployment in the target cluster, without the need to provide any credentials to either the S3 bucket nor the target Kubernetes cluster. There are no known workarounds for this issue, please upgrade. This vulnerability has been fixed by commits 75268c4 and 966823b. Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022. ### Workarounds There is no workaround for this vulnerability. ### References Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks. ### For more information If you have any questions or comments about this advisory: - Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops) - Email us at [support@weave.works](mailto:support@weave.works)
CVE-2022-23377 1 Keep 1 Archeevo 2024-11-21 5.0 MEDIUM 7.5 HIGH
Archeevo below 5.0 is affected by local file inclusion through file=~/web.config to allow an attacker to retrieve local files.
CVE-2022-23316 1 Taogogo 1 Taocms 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
An issue was discovered in taoCMS v3.0.2. There is an arbitrary file read vulnerability that can read any files via admin.php?action=file&ctrl=download&path=../../1.txt.