Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-22 (对路径名的限制不恰当(路径遍历)) — Vulnerability Class 3344

3344 vulnerabilities classified as CWE-22 (对路径名的限制不恰当(路径遍历)). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2024-10625 WooCommerce Support Ticket System <= 17.7 - Unauthenticated Arbitrary File Deletion — WooCommerce Support Ticket System 9.8 Critical2024-11-09
CVE-2024-10626 WooCommerce Support Ticket System <= 17.7 - Authenticated (Subscriber+) Arbitrary File Deletion — WooCommerce Support Ticket System 8.8 High2024-11-09
CVE-2024-51998 Path traversal using file URI scheme without supplying hostname in changedetection.io — changedetection.io 8.6 High2024-11-07
CVE-2024-51990 Path traversal via crafted Git repositories in jj — jj 6.5AIMediumAI2024-11-07
CVE-2024-51751 Arbitrary file read with File and UploadButton components in Gradio — gradio 6.5 Medium2024-11-06
CVE-2024-20532 Cisco Identity Services Engine Arbitrary File Read and Delete Vulnerability — Cisco Identity Services Engine Software 5.5 Medium2024-11-06
CVE-2024-20529 Cisco Identity Services Engine Arbitrary File Read and Delete Vulnerability — Cisco Identity Services Engine Software 5.5 Medium2024-11-06
CVE-2024-20528 Cisco Identity Services Engine Path Traversal Vulnerability — Cisco Identity Services Engine Software 3.8 Low2024-11-06
CVE-2024-20527 Cisco Identity Services Engine Arbitrary File Read and Delete Vulnerability — Cisco Identity Services Engine Software 5.5 Medium2024-11-06
CVE-2024-51756 cap-std doesn't fully sandbox all the Windows device filenames — cap-std 7.8AIHighAI2024-11-05
CVE-2024-47253 2N Access Commander 安全漏洞 — 2N Access Commander 7.2 High2024-11-05
CVE-2024-51483 changedetection.io Path Traversal vulnerability — changedetection.io 6.5AIMediumAI2024-11-01
CVE-2024-37108 WordPress WishList Member X plugin < 3.26.7 - Authenticated Arbitrary File Deletion vulnerability — WishList Member X 7.7 High2024-11-01
CVE-2024-37423 WordPress Newspack Blocks plugin <= 3.0.8 - Contributor+ Arbitrary Directory Deletion vulnerability — Newspack Blocks 8.5 High2024-11-01
CVE-2024-10005 Consul L7 Intentions Vulnerable To URL Path Bypass — Consul 8.1 High2024-10-30
CVE-2024-50508 WordPress Woocommerce Product Design plugin <= 1.0.0 - Arbitrary File Download vulnerability — Woocommerce Product Design 7.5 High2024-10-30
CVE-2024-50509 WordPress Woocommerce Product Design plugin <= 1.0.0 - Arbitrary File Deletion vulnerability — Woocommerce Product Design 8.6 High2024-10-30
CVE-2024-5982 Path Traversal in gaizhenbiao/chuanhuchatgpt — gaizhenbiao/chuanhuchatgpt 9.8AICriticalAI2024-10-29
CVE-2024-49771 MPXJ has a Potential Path Traversal Vulnerability — mpxj 5.3 Medium2024-10-28
CVE-2024-49766 Werkzeug safe_join not safe on Windows — werkzeug 7.5 -2024-10-25
CVE-2024-10011 BuddyPress <= 14.1.0 - Authenticated (Subscriber+) Directory Traversal — BuddyPress 8.1 High2024-10-25
CVE-2024-45842 Sharp MFP 安全漏洞 — Sharp Digital Full-color MFPs and Monochrome MFPs 5.3 Medium2024-10-25
CVE-2024-49760 OpenRefine has a path traversal in LoadLanguageCommand — OpenRefine 7.1 High2024-10-24
CVE-2024-48931 ZimaOS Arbitrary File Read via Parameter Manipulation — ZimaOS 7.5 High2024-10-24
CVE-2024-10313 iniNet Solutions SpiderControl SCADA PC HMI Editor Path Traversal — SpiderControl SCADA PC HMI Editor 8.0 High2024-10-24
CVE-2024-41717 Kieback&Peter DDC4000 Series Path Traversal — DDC4040e 9.8 Critical2024-10-22
CVE-2024-35308 Post-auth Arbitrary File Read in the Server Plugins Section — Pandora FMS 6.5AIMediumAI2024-10-22
CVE-2024-49366 Nginx UI's json field can construct a directory traversal payload, causing arbitrary files to be written — nginx-ui 9.8AICriticalAI2024-10-21
CVE-2024-49286 WordPress SSV Events plugin <= 3.2.7 - Local File Inclusion to RCE vulnerability — SSV Events 9.6 Critical2024-10-20
CVE-2024-10100 Path Traversal in binary-husky/gpt_academic — binary-husky/gpt_academic 7.5AIHighAI2024-10-17

Vulnerabilities classified as CWE-22 (对路径名的限制不恰当(路径遍历)) represent 3344 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.