Vulnerabilities > Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-12-17 | CVE-2022-23531 | Path Traversal vulnerability in Datadoghq Guarddog GuardDog is a CLI tool to identify malicious PyPI packages. | 7.8 |
2022-12-16 | CVE-2022-20505 | Path Traversal vulnerability in Google Android 13.0 In openFile of CallLogProvider.java, there is a possible permission bypass due to a path traversal error. | 6.7 |
2022-12-16 | CVE-2022-46137 | Path Traversal vulnerability in Aerocms Project Aerocms 0.0.1 AeroCMS v0.0.1 is vulnerable to Directory Traversal. | 7.5 |
2022-12-15 | CVE-2022-45969 | Path Traversal vulnerability in Alist Project Alist 3.4.0 Alist v3.4.0 is vulnerable to Directory Traversal, | 9.8 |
2022-12-15 | CVE-2022-4511 | Path Traversal vulnerability in Docsys Project Docsys A vulnerability has been found in RainyGao DocSys and classified as critical. | 7.5 |
2022-12-15 | CVE-2020-24855 | Path Traversal vulnerability in Easyjs Easywebpack-Cli Directory Traversal vulnerability in easywebpack-cli before 4.5.2 allows attackers to obtain sensitive information via crafted GET request. | 5.3 |
2022-12-14 | CVE-2022-31703 | Path Traversal vulnerability in VMWare Vrealize LOG Insight The vRealize Log Insight contains a Directory Traversal Vulnerability. | 7.5 |
2022-12-14 | CVE-2022-46255 | Path Traversal vulnerability in Github Enterprise Server 3.7.0 An improper limitation of a pathname to a restricted directory vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. | 9.8 |
2022-12-14 | CVE-2022-46256 | Path Traversal vulnerability in Github Enterprise Server A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. | 8.8 |
2022-12-14 | CVE-2022-40264 | Path Traversal vulnerability in Iconics Genesis64 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ICONICS/Mitsubishi Electric GENESIS64 versions 10.96 to 10.97.2 allows an unauthenticated attacker to create, tamper with or destroy arbitrary files by getting a legitimate user import a project package file crafted by the attacker. | 7.1 |