Total
7220 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-28945 | 1 Webbank | 1 Webcube | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue in Webbank WeCube v3.2.2 allows attackers to execute a directory traversal via a crafted ZIP file. | |||||
CVE-2022-28814 | 1 Gavazziautomation | 3 Cpy Car Park Server, Uwp 3.0 Monitoring Gateway And Controller, Uwp 3.0 Monitoring Gateway And Controller Firmware | 2024-11-21 | N/A | 9.8 CRITICAL |
Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 was discovered to be vulnerable to a relative path traversal vulnerability which enables remote attackers to read arbitrary files and gain full control of the device. | |||||
CVE-2022-28784 | 1 Google | 1 Android | 2024-11-21 | 2.1 LOW | 4.0 MEDIUM |
Path traversal vulnerability in Galaxy Themes prior to SMR May-2022 Release 1 allows attackers to list file names in arbitrary directory as system user. The patch addresses incorrect implementation of file path validation check logic. | |||||
CVE-2022-28741 | 1 Aenrich | 1 A\+hrd | 2024-11-21 | N/A | 8.1 HIGH |
aEnrich a+HRD 5.x Learning Management Key Performance Indicator System has a local file inclusion (LFI) vulnerability that occurs due to missing input validation in v5.x | |||||
CVE-2022-28544 | 1 Samsung | 1 Galaxy Store | 2024-11-21 | 5.0 MEDIUM | 6.2 MEDIUM |
Path traversal vulnerability in unzip method of InstallAgentCommonHelper in Galaxy store prior to version 4.5.40.5 allows attacker to access the file of Galaxy store. | |||||
CVE-2022-28543 | 1 Samsung | 1 Samsung Flow | 2024-11-21 | 2.1 LOW | 4.0 MEDIUM |
Path traversal vulnerability in Samsung Flow prior to version 4.8.07.4 allows local attackers to read arbitrary files as Samsung Flow permission. | |||||
CVE-2022-28527 | 1 Dhcms Project | 1 Dhcms | 2024-11-21 | 5.5 MEDIUM | 8.1 HIGH |
dhcms v20170919 was discovered to contain an arbitrary folder deletion vulnerability via /admin.php?r=admin/AdminBackup/del. | |||||
CVE-2022-28523 | 1 Hongcms Project | 1 Hongcms | 2024-11-21 | 5.5 MEDIUM | 8.1 HIGH |
HongCMS 3.0.0 allows arbitrary file deletion via the component /admin/index.php/template/ajax?action=delete. | |||||
CVE-2022-28478 | 1 Seeddms | 1 Seeddms | 2024-11-21 | 5.5 MEDIUM | 6.5 MEDIUM |
SeedDMS 6.0.17 and 5.1.24 are vulnerable to Directory Traversal. The "Remove file" functionality inside the "Log files management" menu does not sanitize user input allowing attackers with admin privileges to delete arbitrary files on the remote system. | |||||
CVE-2022-28451 | 1 Nopcommerce | 1 Nopcommerce | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
nopCommerce 4.50.1 is vulnerable to Directory Traversal via the backup file in the Maintenance feature. | |||||
CVE-2022-28444 | 1 Ucms Project | 1 Ucms | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
UCMS v1.6 was discovered to contain an arbitrary file read vulnerability. | |||||
CVE-2022-28380 | 1 Rc-httpd Project | 1 Rc-httpd | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
The rc-httpd component through 2022-03-31 for 9front (Plan 9 fork) allows ..%2f directory traversal if serve-static is used. | |||||
CVE-2022-28357 | 1 Linuxfoundation | 1 Nats-server | 2024-11-21 | N/A | 9.8 CRITICAL |
NATS nats-server 2.2.0 through 2.7.4 allows directory traversal because of an unintended path to a management action from a management account. | |||||
CVE-2022-28157 | 1 Jenkins | 1 Pipeline\ | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server. | |||||
CVE-2022-28156 | 1 Jenkins | 1 Pipeline\ | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to copy arbitrary files and directories from the Jenkins controller to the agent workspace. | |||||
CVE-2022-28148 | 2 Jenkins, Microsoft | 2 Continuous Integration With Toad Edge, Windows | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controllers. | |||||
CVE-2022-28146 | 1 Jenkins | 1 Continuous Integration With Toad Edge | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps. | |||||
CVE-2022-28127 | 1 Robustel | 2 R1510, R1510 Firmware | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
A data removal vulnerability exists in the web_server /action/remove/ API functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary file deletion. An attacker can send a sequence of requests to trigger this vulnerability. | |||||
CVE-2022-28059 | 1 Verydows | 1 Verydows | 2024-11-21 | 5.5 MEDIUM | 8.1 HIGH |
Verydows v2.0 was discovered to contain an arbitrary file deletion vulnerability via \backend\database_controller.php. | |||||
CVE-2022-28058 | 1 Verydows | 1 Verydows | 2024-11-21 | 5.5 MEDIUM | 8.1 HIGH |
Verydows v2.0 was discovered to contain an arbitrary file deletion vulnerability via \backend\file_controller.php. |