Total
169 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-23536 | 1 Linuxfoundation | 1 Cortex | 2024-08-03 | 6.5 Medium |
Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where `-experimental.alertmanager.enable-api` or `enable_api: true` is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section before sending to the Set Alertmanager Configuration API. | ||||
CVE-2022-2638 | 1 Atlasgondal | 1 Export All Urls | 2024-08-03 | 6.5 Medium |
The Export All URLs WordPress plugin before 4.4 does not validate the path of the file to be removed on the system which is supposed to be the CSV file. This could allow high privilege users to delete arbitrary file from the server | ||||
CVE-2022-2431 | 1 Wpdownloadmanager | 1 Wordpress Download Manager | 2024-08-03 | 8.1 High |
The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion in versions up to, and including 3.2.50. This is due to insufficient file type and path validation on the deleteFiles() function found in the ~/Admin/Menu/Packages.php file that triggers upon download post deletion. This makes it possible for contributor level users and above to supply an arbitrary file path via the 'file[files]' parameter when creating a download post and once the user deletes the post the supplied arbitrary file will be deleted. This can be used by attackers to delete the /wp-config.php file which will reset the installation and make it possible for an attacker to achieve remote code execution on the server. | ||||
CVE-2022-2400 | 1 Dompdf Project | 1 Dompdf | 2024-08-03 | 5.3 Medium |
External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0. | ||||
CVE-2022-0593 | 1 Idehweb | 1 Login With Phone Number | 2024-08-02 | 6.5 Medium |
The Login with phone number WordPress plugin before 1.3.7 includes a file delete.php with no form of authentication or authorization checks placed in the plugin directory, allowing unauthenticated user to remotely delete the plugin files leading to a potential Denial of Service situation. | ||||
CVE-2022-0246 | 1 Webence | 1 Iq Block Country | 2024-08-02 | 4.9 Medium |
The settings of the iQ Block Country WordPress plugin before 1.2.13 can be exported or imported using its backup functionality. An authorized user can import preconfigured settings of the plugin by uploading a zip file. After the uploading process, files in the uploaded zip file are extracted one by one. During the extraction process, existence of a file is checked. If the file exists, it is deleted without any security control by only considering the name of the extracted file. This behavior leads to "Zip Slip" vulnerability. | ||||
CVE-2023-49862 | 1 Wwbn | 1 Avideo | 2024-08-02 | 6.5 Medium |
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_gifimage` parameter. | ||||
CVE-2023-49863 | 1 Wwbn | 1 Avideo | 2024-08-02 | 6.5 Medium |
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_webpimage` parameter. | ||||
CVE-2023-49864 | 1 Wwbn | 1 Avideo | 2024-08-02 | 6.5 Medium |
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_image` parameter. | ||||
CVE-2023-49738 | 1 Wwbn | 1 Avideo | 2024-08-02 | 7.5 High |
An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read. | ||||
CVE-2023-47862 | 1 Wwbn | 1 Avideo | 2024-08-02 | 9.8 Critical |
A local file inclusion vulnerability exists in the getLanguageFromBrowser functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send a series of HTTP requests to trigger this vulnerability. | ||||
CVE-2023-47171 | 1 Wwbn | 1 Avideo | 2024-08-02 | 6.5 Medium |
An information disclosure vulnerability exists in the aVideoEncoder.json.php chunkFile path functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read. | ||||
CVE-2023-47147 | 1 Ibm | 1 Sterling Secure Proxy | 2024-08-02 | 5.9 Medium |
IBM Sterling Secure Proxy 6.0.3 and 6.1.0 could allow an attacker to overwrite a log message under specific conditions. IBM X-Force ID: 270598. | ||||
CVE-2023-39542 | 1 Foxitsoftware | 1 Foxit Reader | 2024-08-02 | 8.8 High |
A code execution vulnerability exists in the Javascript saveAs API of Foxit Reader 12.1.3.15356. A specially crafted malformed file can create arbitrary files, which can lead to remote code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. | ||||
CVE-2023-36764 | 1 Microsoft | 1 Sharepoint Server | 2024-08-02 | 8.8 High |
Microsoft SharePoint Server Elevation of Privilege Vulnerability | ||||
CVE-2023-36019 | 1 Microsoft | 2 Azure Logic Apps, Power Platform | 2024-08-02 | 9.6 Critical |
Microsoft Power Platform Connector Spoofing Vulnerability | ||||
CVE-2023-35985 | 1 Foxitsoftware | 1 Foxit Reader | 2024-08-02 | 8.8 High |
An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled. | ||||
CVE-2023-35384 | 1 Microsoft | 17 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 14 more | 2024-08-02 | 5.4 Medium |
Windows HTML Platforms Security Feature Bypass Vulnerability | ||||
CVE-2023-35308 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2024-08-02 | 6.5 Medium |
Windows MSHTML Platform Security Feature Bypass Vulnerability | ||||
CVE-2023-34982 | 1 Aveva | 13 Batch Management, Communication Drivers, Edge and 10 more | 2024-08-02 | 5.5 Medium |
This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service. |