Vulnerability Details CVE-2022-31506
The cmusatyalab/opendiamond repository through 10.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 61.6%
CVSS Severity
CVSS v3 Score 9.3
CVSS v2 Score 6.4
Products affected by CVE-2022-31506
-
cpe:2.3:a:cmu:opendiamond:-
-
cpe:2.3:a:cmu:opendiamond:10.0.0
-
cpe:2.3:a:cmu:opendiamond:10.0.1
-
cpe:2.3:a:cmu:opendiamond:10.0.2
-
cpe:2.3:a:cmu:opendiamond:10.1.0
-
cpe:2.3:a:cmu:opendiamond:10.1.1
-
cpe:2.3:a:cmu:opendiamond:3.0.0
-
cpe:2.3:a:cmu:opendiamond:3.0.1
-
cpe:2.3:a:cmu:opendiamond:3.0.2
-
cpe:2.3:a:cmu:opendiamond:3.1.0
-
cpe:2.3:a:cmu:opendiamond:3.1.1
-
cpe:2.3:a:cmu:opendiamond:3.2.0
-
cpe:2.3:a:cmu:opendiamond:3.2.1
-
cpe:2.3:a:cmu:opendiamond:3.2.2
-
cpe:2.3:a:cmu:opendiamond:3.2.3
-
cpe:2.3:a:cmu:opendiamond:3.3.0
-
cpe:2.3:a:cmu:opendiamond:3.3.1
-
cpe:2.3:a:cmu:opendiamond:4.0.0
-
cpe:2.3:a:cmu:opendiamond:4.0.1
-
cpe:2.3:a:cmu:opendiamond:4.0.2
-
cpe:2.3:a:cmu:opendiamond:4.0.3
-
cpe:2.3:a:cmu:opendiamond:4.0.4
-
cpe:2.3:a:cmu:opendiamond:4.1.0
-
cpe:2.3:a:cmu:opendiamond:4.1.1
-
cpe:2.3:a:cmu:opendiamond:4.1.2
-
cpe:2.3:a:cmu:opendiamond:4.1.3
-
cpe:2.3:a:cmu:opendiamond:4.1.4
-
cpe:2.3:a:cmu:opendiamond:4.1.5
-
cpe:2.3:a:cmu:opendiamond:5.0.0
-
cpe:2.3:a:cmu:opendiamond:5.0.1
-
cpe:2.3:a:cmu:opendiamond:5.0.2
-
cpe:2.3:a:cmu:opendiamond:5.0.3
-
cpe:2.3:a:cmu:opendiamond:5.0.4
-
cpe:2.3:a:cmu:opendiamond:5.0.5
-
cpe:2.3:a:cmu:opendiamond:5.0.6
-
cpe:2.3:a:cmu:opendiamond:5.0.7
-
cpe:2.3:a:cmu:opendiamond:5.1.0
-
cpe:2.3:a:cmu:opendiamond:5.1.1
-
cpe:2.3:a:cmu:opendiamond:5.1.2
-
cpe:2.3:a:cmu:opendiamond:5.2.0
-
cpe:2.3:a:cmu:opendiamond:5.2.1
-
cpe:2.3:a:cmu:opendiamond:5.3.0
-
cpe:2.3:a:cmu:opendiamond:5.3.1
-
cpe:2.3:a:cmu:opendiamond:5.4.0
-
cpe:2.3:a:cmu:opendiamond:5.4.1
-
cpe:2.3:a:cmu:opendiamond:5.4.2
-
cpe:2.3:a:cmu:opendiamond:6.0.0
-
cpe:2.3:a:cmu:opendiamond:6.0.1
-
cpe:2.3:a:cmu:opendiamond:6.0.2
-
cpe:2.3:a:cmu:opendiamond:6.0.3
-
cpe:2.3:a:cmu:opendiamond:6.0.4
-
cpe:2.3:a:cmu:opendiamond:6.0.5
-
cpe:2.3:a:cmu:opendiamond:6.1.0
-
cpe:2.3:a:cmu:opendiamond:6.2.0
-
cpe:2.3:a:cmu:opendiamond:7.0.0
-
cpe:2.3:a:cmu:opendiamond:7.0.1
-
cpe:2.3:a:cmu:opendiamond:7.0.2
-
cpe:2.3:a:cmu:opendiamond:7.0.3
-
cpe:2.3:a:cmu:opendiamond:7.0.4
-
cpe:2.3:a:cmu:opendiamond:8.0.0
-
cpe:2.3:a:cmu:opendiamond:8.0.1
-
cpe:2.3:a:cmu:opendiamond:8.0.2
-
cpe:2.3:a:cmu:opendiamond:8.0.3
-
cpe:2.3:a:cmu:opendiamond:8.0.4
-
cpe:2.3:a:cmu:opendiamond:8.0.5
-
cpe:2.3:a:cmu:opendiamond:8.0.6
-
cpe:2.3:a:cmu:opendiamond:8.0.7
-
cpe:2.3:a:cmu:opendiamond:8.0.8
-
cpe:2.3:a:cmu:opendiamond:8.0.9
-
cpe:2.3:a:cmu:opendiamond:8.1.0
-
cpe:2.3:a:cmu:opendiamond:8.1.1
-
cpe:2.3:a:cmu:opendiamond:9.0.0
-
cpe:2.3:a:cmu:opendiamond:9.0.1