Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-22 (对路径名的限制不恰当(路径遍历)) — Vulnerability Class 3344

3344 vulnerabilities classified as CWE-22 (对路径名的限制不恰当(路径遍历)). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2024-54374 WordPress Sogrid plugin <= 1.5.6 - Local File Inclusion vulnerability — Sogrid 7.5 High2024-12-16
CVE-2024-54375 WordPress Woolook plugin <= 1.7.0 - Local File Inclusion vulnerability — Woolook 7.5 High2024-12-16
CVE-2024-54380 WordPress WP Cookies Enabler plugin <= 1.0.1 - Local File Inclusion vulnerability — WP Cookies Enabler 7.5 High2024-12-16
CVE-2024-54382 WordPress Bold Page Builder plugin <= 5.1.5 - Path Traversal vulnerability — Bold Page Builder 4.9 Medium2024-12-16
CVE-2024-54373 WordPress EduAdmin Booking plugin <= 5.2.0 - Local File Inclusion vulnerability — EduAdmin Booking 7.5 High2024-12-16
CVE-2024-12362 InvoicePlane invoices.php download path traversal — InvoicePlane 4.3 Medium2024-12-16
CVE-2024-54259 WordPress DELUCKS SEO plugin <= 2.7.2 - Arbitrary File Download vulnerability — DELUCKS SEO 6.5 Medium2024-12-13
CVE-2024-11834 Arbitrary File Write via PTRAC Import — PlexTrac 7.5 -2024-12-13
CVE-2024-11833 Arbitrary Directory Write via Runbooks Artifact Upload — PlexTrac 7.5 -2024-12-13
CVE-2024-8647 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GitLab — GitLab 5.4 Medium2024-12-12
CVE-2024-55659 SiYuan has an arbitrary file write in the host via /api/asset/upload — siyuan 5.4 -2024-12-11
CVE-2024-55658 SiYuan has an arbitrary file read and path traversal via /api/export/exportResources — siyuan 6.5 -2024-12-11
CVE-2024-55657 SiYuan has an arbitrary file read via /api/template/render — siyuan 6.5 -2024-12-11
CVE-2024-49082 Windows File Explorer Information Disclosure Vulnerability — Windows 10 Version 1809 6.8 Medium2024-12-10
CVE-2024-55602 PenDoc vulnerable to Arbitrary File Read on updating and downloading templates using Path Traversal — pwndoc 7.6 High2024-12-10
CVE-2024-45709 SolarWinds Web Help Desk Local File Read Vulnerability — Web Help Desk 5.3 Medium2024-12-10
CVE-2024-53790 WordPress Lenxel Core plugin <= 1.2.8 - Local File Inclusion vulnerability — Lenxel Core for Lenxel(LNX) LMS 7.5 High2024-12-09
CVE-2024-11010 FileOrganizer <= 1.1.4 - Authenticated (Administrator+) Local JavaScript File Inclusion — FileOrganizer – WordPress File Manager 7.2 High2024-12-07
CVE-2024-10516 Swift Performance Lite <= 2.3.7.1 - Unauthenticated Local PHP File Inclusion via 'ajaxify' — Swift Performance Lite 8.1 High2024-12-06
CVE-2024-11585 WP Hide & Security Enhancer <= 2.5.1 - Missing Authorization to Unauthenticated Arbitrary File Contents Deletion — WP Hide & Security Enhancer 7.5 High2024-12-06
CVE-2024-10933 OpenBSD readdir directory traversal — OpenBSD 5.0 Medium2024-12-05
CVE-2024-54132 GitHub CLI allows downloading malicious GitHub Actions workflow artifact to result in path traversal vulnerability — cli 6.5 -2024-12-04
CVE-2024-11952 Classic Addons – WPBakery Page Builder <= 3.0 - Authenticated (Contributor+) Limited Local PHP File Inclusion — Classic Addons – WPBakery Page Builder 7.5 High2024-12-04
CVE-2024-11398 Synology Router Manager 路径遍历漏洞 — Synology Router Manager (SRM) 8.1 High2024-12-04
CVE-2024-46909 WhatsUp Gold WriteDataFile Directory Traversal Remote Code Execution Vulnerability — WhatsUp Gold 9.8 Critical2024-12-02
CVE-2024-49360 Path traversal in Sandboxie — Sandboxie 9.2 Critical2024-11-29
CVE-2024-11992 Path traversal vulnerability in Quick.CMS — Quick.CMS 9.1 Critical2024-11-29
CVE-2024-11481 Trellix Enterprise Security Manager 安全漏洞 — Trellix Enterprise Security Manager (ESM) 8.2 High2024-11-29
CVE-2024-52481 WordPress Jobify theme < 4.3.0 - Unauthenticated Arbitrary File Read vulnerability — Jobify 7.5AIHighAI2024-11-28
CVE-2024-9669 File Manager Pro – Filester <= 1.8.5 - Authenticated (Administrator+) Local JavaScript File Inclusion — File Manager Pro – Filester 7.2 High2024-11-28

Vulnerabilities classified as CWE-22 (对路径名的限制不恰当(路径遍历)) represent 3344 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.