CVE-2022-1000 – Path Traversal in prasathmani/tinyfilemanager
https://notcve.org/view.php?id=CVE-2022-1000
Path Traversal in GitHub repository prasathmani/tinyfilemanager prior to 2.4.7. Un Salto de Ruta en el repositorio de GitHub prasathmani/tinyfilemanager versiones anteriores a 2.4.7 • https://github.com/prasathmani/tinyfilemanager/commit/154947ef83efeb68fc2b921065392b6a7fc9c965 https://huntr.dev/bounties/5995a93f-0c4b-4f7d-aa59-a64424219424 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-45010 – Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
https://notcve.org/view.php?id=CVE-2021-45010
A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution. Una vulnerabilidad de cruce de rutas en la funcionalidad de carga de archivos en tinyfilemanager.php en Tiny File Manager antes de la versión 2.4.7 permite a los atacantes remotos (con cuentas de usuario válidas) cargar archivos PHP maliciosos en la raíz web, lo que lleva a la ejecución de código Tiny File Manager version 2.4.6 suffers from an authenticated remote shell upload vulnerability. • https://www.exploit-db.com/exploits/50828 https://github.com/BKreisel/CVE-2021-45010 https://github.com/Syd-SydneyJr/CVE-2021-45010 https://github.com/febinrev/CVE-2021-45010-TinyFileManager-Exploit http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html https://febin0x4e4a.wordpress.com/2022/01/23/tiny-file-manager-authenticated-rce https://github.com/febinrev/tinyfilemanager-2.4.3-exploit/raw/main/exploit.sh https://github.com/prasathmani/tinyfilemanager/commit • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-44343
https://notcve.org/view.php?id=CVE-2021-44343
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_read_data() in "/ok_png.c". David Brackeen ok-file-formats versión 203defd es vulnerable a un Desbordamiento del Búfer. Cuando es usada la función del proyecto ok-file-formats, es producido un desbordamiento del búfer de la pila en la función ok_png_read_data() en "/ok_png.c" • https://github.com/brackeen/ok-file-formats/issues/18 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2021-44335
https://notcve.org/view.php?id=CVE-2021-44335
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_png_transform_scanline() in "/ok_png.c:533". David Brackeen ok-file-formats versión 203defd es vulnerable a un Desbordamiento de Búfer. Cuando es usada la función del proyecto ok-file-formats, es producido un desbordamiento del buffer de la pila en la función ok_png_transform_scanline() en "/ok_png.c:533" • https://github.com/brackeen/ok-file-formats/issues/17 • CWE-787: Out-of-bounds Write •
CVE-2022-25023
https://notcve.org/view.php?id=CVE-2022-25023
Audio File commit 004065d was discovered to contain a heap-buffer overflow in the function fouBytesToInt():AudioFile.h. En el commit 004065d de Audio File Se ha detectado que contenía un desbordamiento del búfer de la pila en la función fouBytesToInt():AudioFile.h. • https://github.com/adamstark/AudioFile/issues/58 • CWE-787: Out-of-bounds Write •