Vulnerabilities (CVE)

Filtered by CWE-552
Total 239 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-29446 1 Wow-company 1 Counter Box 2023-12-10 4.0 MEDIUM 7.2 HIGH
Authenticated (administrator or higher role) Local File Inclusion (LFI) vulnerability in Wow-Company's Counter Box plugin <= 1.1.1 at WordPress.
CVE-2022-32143 1 Codesys 2 Plcwinnt, Runtime Toolkit 2023-12-10 6.5 MEDIUM 8.8 HIGH
In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required
CVE-2022-29720 1 74cms 1 74cmsse 2023-12-10 5.0 MEDIUM 7.5 HIGH
74cmsSE v3.5.1 was discovered to contain an arbitrary file read vulnerability via the component \index\controller\Download.php.
CVE-2022-23621 1 Xwiki 1 Xwiki 2023-12-10 4.0 MEDIUM 4.9 MEDIUM
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right.
CVE-2022-28462 1 Xxyopen 1 Novel-plus 2023-12-10 5.0 MEDIUM 7.5 HIGH
novel-plus 3.6.0 suffers from an Arbitrary file reading vulnerability.
CVE-2021-3717 1 Redhat 4 Enterprise Linux, Jboss Enterprise Application Platform, Single Sign-on and 1 more 2023-12-10 4.6 MEDIUM 7.8 HIGH
A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability. This flaw affects wildfly-core versions prior to 17.0.
CVE-2022-28002 1 Movie Seat Reservation Project 1 Movie Seat Reservation 2023-12-10 5.0 MEDIUM 7.5 HIGH
Movie Seat Reservation v1 was discovered to contain an unauthenticated file disclosure vulnerability via /index.php?page=home.
CVE-2022-29447 1 Wow-company 1 Hover Effects 2023-12-10 4.0 MEDIUM 7.2 HIGH
Authenticated (administrator or higher user role) Local File Inclusion (LFI) vulnerability in Wow-Company's Hover Effects plugin <= 2.1 at WordPress.
CVE-2022-25299 1 Cesanta 1 Mongoose 2023-12-10 5.0 MEDIUM 7.5 HIGH
This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.
CVE-2022-30428 1 Ginadmin Project 1 Ginadmin 2023-12-10 5.0 MEDIUM 7.5 HIGH
In ginadmin through 05-10-2022, the incoming path value is not filtered, resulting in arbitrary file reading.
CVE-2022-29302 1 Contec 2 Sv-cpt-mc310, Sv-cpt-mc310 Firmware 2023-12-10 2.1 LOW 5.5 MEDIUM
SolarView Compact ver.6.00 was discovered to contain a local file disclosure via /html/Solar_Ftp.php.
CVE-2022-25297 1 Drogon 1 Drogon 2023-12-10 6.5 MEDIUM 8.8 HIGH
This affects the package drogonframework/drogon before 1.7.5. The unsafe handling of file names during upload using HttpFile::save() method may enable attackers to write files to arbitrary locations outside the designated target folder.
CVE-2022-24694 1 Mahara 1 Mahara 2023-12-10 4.0 MEDIUM 4.3 MEDIUM
In Mahara 20.10 before 20.10.4, 21.04 before 21.04.3, and 21.10 before 21.10.1, the names of folders in the Files area can be seen by a person not owning the folders. (Only folder names are affected. Neither file names nor file contents are affected.)
CVE-2021-44983 1 Taogogo 1 Taocms 2023-12-10 4.0 MEDIUM 4.9 MEDIUM
In taocms 3.0.1 after logging in to the background, there is an Arbitrary file download vulnerability at the File Management column.
CVE-2022-23316 1 Taogogo 1 Taocms 2023-12-10 4.0 MEDIUM 4.9 MEDIUM
An issue was discovered in taoCMS v3.0.2. There is an arbitrary file read vulnerability that can read any files via admin.php?action=file&ctrl=download&path=../../1.txt.
CVE-2021-25004 1 Seur Oficial Project 1 Seur Oficial 2023-12-10 4.0 MEDIUM 4.9 MEDIUM
The SEUR Oficial WordPress plugin before 1.7.2 creates a PHP file with a random name when installed, even though it is used for support purposes, it allows to download any file from the web server without restriction after knowing the URL and a password than an administrator can see in the plugin settings page.
CVE-2022-22270 1 Google 1 Android 2023-12-10 4.3 MEDIUM 3.3 LOW
An implicit Intent hijacking vulnerability in Dialer prior to SMR Jan-2022 Release 1 allows unprivileged applications to access contact information.
CVE-2022-21236 1 Reolink 2 Rlc-410w, Rlc-410w Firmware 2023-12-10 5.0 MEDIUM 7.5 HIGH
An information disclosure vulnerability exists due to a web server misconfiguration in the Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability.
CVE-2021-41573 1 Hitachi 1 Content Platform Anywhere 2023-12-10 4.0 MEDIUM 6.5 MEDIUM
Hitachi Content Platform Anywhere (HCP-AW) 4.4.5 and later allows information disclosure. If authenticated user creates a link to a file or folder while the system was running version 4.3.x or earlier and then shares the link and then later deletes the file or folder without deleting the link and before the link expires. If the system has been upgraded to version 4.4.5 or 4.5.0 a malicious user with the link could browse and download all files of the authenticated user that created the link .
CVE-2021-32833 1 Emby 1 Emby.releases 2023-12-10 4.3 MEDIUM 8.6 HIGH
Emby Server is a personal media server with apps on many devices. In Emby Server on Windows there is a set of arbitrary file read vulnerabilities. This vulnerability is known to exist in version 4.6.4.0 and may not be patched in later versions. Known vulnerable routes are /Videos/Id/hls/PlaylistId/SegmentId.SegmentContainer, /Images/Ratings/theme/name and /Images/MediaInfo/theme/name. For more details including proof of concept code, refer to the referenced GHSL-2021-051. This issue may lead to unauthorized access to the system especially when Emby Server is configured to be accessible from the Internet.