Filtered by CWE-73
Total 169 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-23536 1 Linuxfoundation 1 Cortex 2024-08-03 6.5 Medium
Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where `-experimental.alertmanager.enable-api` or `enable_api: true` is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section before sending to the Set Alertmanager Configuration API.
CVE-2022-2638 1 Atlasgondal 1 Export All Urls 2024-08-03 6.5 Medium
The Export All URLs WordPress plugin before 4.4 does not validate the path of the file to be removed on the system which is supposed to be the CSV file. This could allow high privilege users to delete arbitrary file from the server
CVE-2022-2431 1 Wpdownloadmanager 1 Wordpress Download Manager 2024-08-03 8.1 High
The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion in versions up to, and including 3.2.50. This is due to insufficient file type and path validation on the deleteFiles() function found in the ~/Admin/Menu/Packages.php file that triggers upon download post deletion. This makes it possible for contributor level users and above to supply an arbitrary file path via the 'file[files]' parameter when creating a download post and once the user deletes the post the supplied arbitrary file will be deleted. This can be used by attackers to delete the /wp-config.php file which will reset the installation and make it possible for an attacker to achieve remote code execution on the server.
CVE-2022-2400 1 Dompdf Project 1 Dompdf 2024-08-03 5.3 Medium
External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.
CVE-2022-0593 1 Idehweb 1 Login With Phone Number 2024-08-02 6.5 Medium
The Login with phone number WordPress plugin before 1.3.7 includes a file delete.php with no form of authentication or authorization checks placed in the plugin directory, allowing unauthenticated user to remotely delete the plugin files leading to a potential Denial of Service situation.
CVE-2022-0246 1 Webence 1 Iq Block Country 2024-08-02 4.9 Medium
The settings of the iQ Block Country WordPress plugin before 1.2.13 can be exported or imported using its backup functionality. An authorized user can import preconfigured settings of the plugin by uploading a zip file. After the uploading process, files in the uploaded zip file are extracted one by one. During the extraction process, existence of a file is checked. If the file exists, it is deleted without any security control by only considering the name of the extracted file. This behavior leads to "Zip Slip" vulnerability.
CVE-2023-49862 1 Wwbn 1 Avideo 2024-08-02 6.5 Medium
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_gifimage` parameter.
CVE-2023-49863 1 Wwbn 1 Avideo 2024-08-02 6.5 Medium
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_webpimage` parameter.
CVE-2023-49864 1 Wwbn 1 Avideo 2024-08-02 6.5 Medium
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_image` parameter.
CVE-2023-49738 1 Wwbn 1 Avideo 2024-08-02 7.5 High
An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.
CVE-2023-47862 1 Wwbn 1 Avideo 2024-08-02 9.8 Critical
A local file inclusion vulnerability exists in the getLanguageFromBrowser functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send a series of HTTP requests to trigger this vulnerability.
CVE-2023-47171 1 Wwbn 1 Avideo 2024-08-02 6.5 Medium
An information disclosure vulnerability exists in the aVideoEncoder.json.php chunkFile path functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.
CVE-2023-47147 1 Ibm 1 Sterling Secure Proxy 2024-08-02 5.9 Medium
IBM Sterling Secure Proxy 6.0.3 and 6.1.0 could allow an attacker to overwrite a log message under specific conditions. IBM X-Force ID: 270598.
CVE-2023-39542 1 Foxitsoftware 1 Foxit Reader 2024-08-02 8.8 High
A code execution vulnerability exists in the Javascript saveAs API of Foxit Reader 12.1.3.15356. A specially crafted malformed file can create arbitrary files, which can lead to remote code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
CVE-2023-36764 1 Microsoft 1 Sharepoint Server 2024-08-02 8.8 High
Microsoft SharePoint Server Elevation of Privilege Vulnerability
CVE-2023-36019 1 Microsoft 2 Azure Logic Apps, Power Platform 2024-08-02 9.6 Critical
Microsoft Power Platform Connector Spoofing Vulnerability
CVE-2023-35985 1 Foxitsoftware 1 Foxit Reader 2024-08-02 8.8 High
An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
CVE-2023-35384 1 Microsoft 17 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 14 more 2024-08-02 5.4 Medium
Windows HTML Platforms Security Feature Bypass Vulnerability
CVE-2023-35308 1 Microsoft 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more 2024-08-02 6.5 Medium
Windows MSHTML Platform Security Feature Bypass Vulnerability
CVE-2023-34982 1 Aveva 13 Batch Management, Communication Drivers, Edge and 10 more 2024-08-02 5.5 Medium
This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.