Vulnerabilities (CVE)

Filtered by CWE-552
Total 239 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-4106 1 Cedcommerce 1 Wholesale Market For Woocommerce 2023-12-10 N/A 7.5 HIGH
The Wholesale Market for WooCommerce WordPress plugin before 1.0.7 does not have authorisation check, as well as does not validate user input used to generate system path, allowing unauthenticated attackers to download arbitrary file from the server.
CVE-2022-48161 1 Easy Images Project 1 Easy Images 2023-12-10 N/A 7.5 HIGH
Easy Images v2.0 was discovered to contain an arbitrary file download vulnerability via the component /application/down.php. This vulnerability is exploited via a crafted GET request.
CVE-2023-26948 1 Onekeyadmin 1 Onekeyadmin 2023-12-10 N/A 7.5 HIGH
onekeyadmin v1.3.9 was discovered to contain an arbitrary file read vulnerability via the component /admin1/file/download.
CVE-2022-48094 1 Lmxcms 1 Lmxcms 2023-12-10 N/A 4.9 MEDIUM
lmxcms v1.41 was discovered to contain an arbitrary file read vulnerability via TemplateAction.class.php.
CVE-2022-45227 1 Dragino 2 Lg01 Lora, Lg01 Lora Firmware 2023-12-10 N/A 7.5 HIGH
The web portal of Dragino Lora LG01 18ed40 IoT v4.3.4 has the directory listing at the URL https://10.10.20.74/lib/. This address has a backup file which can be downloaded without any authentication.
CVE-2022-44583 1 Watchtowerhq 1 Watchtower 2023-12-10 N/A 7.5 HIGH
Unauth. Arbitrary File Download vulnerability in WatchTowerHQ plugin <= 3.6.15 on WordPress.
CVE-2022-41343 1 Dompdf Project 1 Dompdf 2023-12-10 N/A 7.5 HIGH
registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.
CVE-2022-1585 1 Project-source-code-download Project 1 Project-source-code-download 2023-12-10 N/A 7.5 HIGH
The Project Source Code Download WordPress plugin through 1.0.0 does not protect its backup generation and download functionalities, which may allow any visitors on the site to download the entire site, including sensitive files like wp-config.php.
CVE-2022-37424 2 Linux, Opennebula 2 Linux Kernel, Opennebula 2023-12-10 N/A 6.5 MEDIUM
Files or Directories Accessible to External Parties vulnerability in OpenNebula on Linux allows File Discovery.
CVE-2022-2981 1 Wpchill 1 Download Monitor 2023-12-10 N/A 4.9 MEDIUM
The Download Monitor WordPress plugin before 4.5.98 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup.
CVE-2021-40149 1 Reolink 2 E1 Zoom, E1 Zoom Firmware 2023-12-10 N/A 5.9 MEDIUM
The web server of the E1 Zoom camera through 3.0.0.716 discloses its SSL private key via the root web server directory. In this way an attacker can download the entire key via the /self.key URI.
CVE-2022-33158 2 Microsoft, Trendmicro 2 Windows, Vpn Proxy One Pro 2023-12-10 N/A 7.8 HIGH
Trend Micro VPN Proxy Pro version 5.2.1026 and below contains a vulnerability involving some overly permissive folders in a key directory which could allow a local attacker to obtain privilege escalation on an affected system.
CVE-2022-1117 1 Fapolicyd Project 1 Fapolicyd 2023-12-10 N/A 8.4 HIGH
A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker, a build time regular expression may not correctly detect the runtime linker. The consequence is that the pattern detection for applications launched by the run time linker may fail to detect the pattern and allow execution.
CVE-2022-3287 1 Fwupd 1 Fwupd 2023-12-10 N/A 6.5 MEDIUM
When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.
CVE-2021-4112 1 Redhat 5 Ansible Automation Platform, Ansible Automation Platform Early Access, Ansible Automation Platform Text-only Advisories and 2 more 2023-12-10 N/A 8.8 HIGH
A flaw was found in ansible-tower where the default installation is vulnerable to job isolation escape. This flaw allows an attacker to elevate the privilege from a low privileged user to an AWX user from outside the isolated environment.
CVE-2022-40126 1 Clash Project 1 Clash 2023-12-10 N/A 7.8 HIGH
A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.
CVE-2022-2392 1 Lana 1 Lana Downloads Manager 2023-12-10 N/A 6.5 MEDIUM
The Lana Downloads Manager WordPress plugin before 1.8.0 is affected by an arbitrary file download vulnerability that can be exploited by users with "Contributor" permissions or higher.
CVE-2022-24138 1 Iobit 1 Advanced Systemcare 2023-12-10 7.2 HIGH 7.8 HIGH
IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).
CVE-2022-22490 2 Ibm, Microsoft 4 Robotic Process Automation, Robotic Process Automation As A Service, Robotic Process Automation For Cloud Pak and 1 more 2023-12-10 N/A 4.9 MEDIUM
IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a privileged user to obtain sensitive Azure bot credential information. IBM X-Force ID: 226342.
CVE-2022-23738 1 Github 1 Enterprise Server 2023-12-10 N/A 5.7 MEDIUM
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.