U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
There are 267,065 matching records.
Displaying matches 87,461 through 87,480.
Vuln ID Summary CVSS Severity
CVE-2022-31514

The Caoyongqi912/Fan_Platform repository through 2021-04-20 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31513

The BolunHan/Krypton repository through 2021-06-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31512

The Atom02/flask-mvc repository through 2020-09-14 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31511

The AFDudley/equanimity repository through 2014-04-23 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31510

The sergeKashkin/Simple-RAT repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31509

The iedadata/usap-dc-website repository through 1.0.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31508

The idayrus/evoting repository before 2022-05-08 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31507

The ganga-devs/ganga repository before 8.5.10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31506

The cmusatyalab/opendiamond repository through 10.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31505

The cheo0/MercadoEnLineaBack repository through 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31504

The ChangeWeDer/BaiduWenkuSpider_flaskWeb repository before 2021-11-29 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31503

The orchest/orchest repository before 2022.05.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31502

The operatorequals/wormnest repository through 0.4.7 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31501

The ChaoticOnyx/OnyxForum repository before 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0: 6.4 MEDIUM
CVE-2022-31472

Browse restriction bypass vulnerability in Cabinet of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to obtain the data of Cabinet.

Published: July 10, 2022; 9:15:08 PM -0400
V4.0:(not available)
V3.1: 4.3 MEDIUM
V2.0: 4.0 MEDIUM
CVE-2022-30943

Browsing restriction bypass vulnerability in Bulletin of Cybozu Garoon 4.0.0 to 5.9.1 allows a remote authenticated attacker to obtain the data of Bulletin.

Published: July 10, 2022; 9:15:07 PM -0400
V4.0:(not available)
V3.1: 4.3 MEDIUM
V2.0: 4.0 MEDIUM
CVE-2022-30602

Operation restriction bypass in multiple applications of Cybozu Garoon 4.0.0 to 5.9.1 allows a remote authenticated attacker to alter the file information and/or delete the files.

Published: July 10, 2022; 9:15:07 PM -0400
V4.0:(not available)
V3.1: 8.1 HIGH
V2.0: 5.5 MEDIUM
CVE-2022-29512

Exposure of sensitive information to an unauthorized actor issue in multiple applications of Cybozu Garoon 4.0.0 to 5.9.1 allows a remote authenticated attacker to obtain the data without the viewing privilege.

Published: July 10, 2022; 9:15:07 PM -0400
V4.0:(not available)
V3.1: 6.5 MEDIUM
V2.0: 4.0 MEDIUM
CVE-2022-27168

Cross-site scripting vulnerability in LiteCart versions prior to 2.4.2 allows a remote attacker to inject an arbitrary script via unspecified vectors.

Published: July 10, 2022; 9:15:07 PM -0400
V4.0:(not available)
V3.1: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2022-2365

Cross-site Scripting (XSS) - Stored in GitHub repository zadam/trilium prior to 0.53.3.

Published: July 10, 2022; 6:15:08 PM -0400
V4.0:(not available)
V3.1: 5.4 MEDIUM
V2.0: 3.5 LOW