Total
7178 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-27610 | 1 Synology | 1 Diskstation Manager | 2024-11-21 | N/A | 6.5 MEDIUM |
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology DiskStation Manager (DSM) before 6.2.3-25423 allows remote authenticated users to delete arbitrary files via unspecified vectors. | |||||
CVE-2022-27498 | 1 Lansweeper | 1 Lansweeper | 2024-11-21 | N/A | 6.5 MEDIUM |
A directory traversal vulnerability exists in the TicketTemplateActions.aspx GetTemplateAttachment functionality of Lansweeper lansweeper 10.1.1.0. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability. | |||||
CVE-2022-27279 | 1 Inhandnetworks | 2 Inrouter 900, Inrouter 900 Firmware | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain an arbitrary file read via the function sub_177E0. | |||||
CVE-2022-27277 | 1 Inhandnetworks | 2 Inrouter 900, Inrouter 900 Firmware | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain an arbitrary file deletion vulnerability via the function sub_17C08. | |||||
CVE-2022-27248 | 1 Idearespa | 1 Reftree | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
A directory traversal vulnerability in IdeaRE RefTree before 2021.09.17 allows remote authenticated users to download arbitrary .dwg files from a remote server by specifying an absolute or relative path when invoking the affected DownloadDwg endpoint. An attack uses the path field to CaddemServiceJS/CaddemService.svc/rest/DownloadDwg. | |||||
CVE-2022-27229 | 1 Intel | 11 Hdmi Firmware, Nuc 7 Business Nuc7i3dnhnc, Nuc 7 Business Nuc7i3dnktc and 8 more | 2024-11-21 | N/A | 6.7 MEDIUM |
Path transversal in some Intel(R) NUC Kits NUC7i3DN, NUC7i5DN, NUC7i7DN HDMI firmware update tool software before version 1.79.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2022-27208 | 1 Jenkins | 1 Kubernetes Continuous Deploy | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows users with Credentials/Create permission to read arbitrary files on the Jenkins controller. | |||||
CVE-2022-27203 | 1 Jenkins | 1 Extended Choice Parameter | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Item/Configure permission to read values from arbitrary JSON and Java properties files on the Jenkins controller. | |||||
CVE-2022-27043 | 1 Yearning | 1 Yearning | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Yearning versions 2.3.1 and 2.3.2 Interstellar GA and 2.3.4 - 2.3.6 Neptune is vulnerable to Directory Traversal. | |||||
CVE-2022-26960 | 1 Std42 | 1 Elfinder | 2024-11-21 | 5.8 MEDIUM | 9.1 CRITICAL |
connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. | |||||
CVE-2022-26889 | 1 Splunk | 1 Splunk | 2024-11-21 | 5.1 MEDIUM | 8.8 HIGH |
In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim's browser (e.g., phishing). | |||||
CVE-2022-26838 | 1 Cybozu | 1 Remote Service Manager | 2024-11-21 | N/A | 6.5 MEDIUM |
Path traversal vulnerability in Importing Mobile Device Data of Cybozu Remote Service 3.1.2 allows a remote authenticated attacker to cause a denial-of-service (DoS) condition. | |||||
CVE-2022-26835 | 1 F5 | 11 Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager, Big-ip Analytics and 8 more | 2024-11-21 | 4.0 MEDIUM | 4.9 MEDIUM |
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, directory traversal vulnerabilities exist in undisclosed iControl REST endpoints and TMOS Shell (tmsh) commands in F5 BIG-IP Guided Configuration, which may allow an authenticated attacker with at least resource administrator role privileges to read arbitrary files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | |||||
CVE-2022-26675 | 1 Aenrich | 1 A\+hrd | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
aEnrich a+HRD has inadequate filtering for special characters in URLs. An unauthenticated remote attacker can bypass authentication and perform path traversal attacks to access arbitrary files under website root directory. | |||||
CVE-2022-26652 | 1 Nats | 2 Nats Server, Nats Streaming Server | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
NATS nats-server before 2.7.4 allows Directory Traversal (with write access) via an element in a ZIP archive for JetStream streams. nats-streaming-server before 0.24.3 is also affected. | |||||
CVE-2022-26484 | 1 Veritas | 1 Infoscale Operations Manager | 2024-11-21 | 6.8 MEDIUM | 4.9 MEDIUM |
An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. The web server fails to sanitize admin/cgi-bin/rulemgr.pl/getfile/ input data, allowing a remote authenticated administrator to read arbitrary files on the system via Directory Traversal. By manipulating the resource name in GET requests referring to files with absolute paths, it is possible to access arbitrary files stored on the filesystem, including application source code, configuration files, and critical system files. | |||||
CVE-2022-26315 | 1 Qrcp Project | 1 Qrcp | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader. | |||||
CVE-2022-26276 | 1 Onenav | 1 Onenav | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
An issue in index.php of OneNav v0.9.14 allows attackers to perform directory traversal. | |||||
CVE-2022-26252 | 1 Aapanel | 1 Aapanel | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
aaPanel v6.8.21 was discovered to be vulnerable to directory traversal. This vulnerability allows attackers to obtain the root user private SSH key(id_rsa). | |||||
CVE-2022-26233 | 1 Barco | 1 Control Room Management Suite | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Barco Control Room Management through Suite 2.9 Build 0275 was discovered to be vulnerable to directory traversal, allowing attackers to access sensitive information and components. Requests must begin with the "GET /..\.." substring. |