
CVE-2018-19040 – Media File Manager <= 1.4.2 - Directory Traversal to Directory Listing
https://notcve.org/view.php?id=CVE-2018-19040
11 May 2018 — The Media File Manager plugin 1.4.2 for WordPress allows directory listing via a ../ directory traversal in the dir parameter of an mrelocator_getdir action to the wp-admin/admin-ajax.php URI. El plugin Media File Manager 1.4.2 para WordPress permite el listado de directorios mediante un salto de directorio por ../ en el parámetro dir de una acción mrelocator_getdir en el URI wp-admin/admin-ajax.php. The Media File Manager plugin up to and including version 1.4.2 for WordPress allows directory listing via a... • https://www.exploit-db.com/exploits/45809 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2018-19042 – Media File Manager <= 1.4.2 - Directory Traversal to Arbitrary File Relocation
https://notcve.org/view.php?id=CVE-2018-19042
11 May 2018 — The Media File Manager plugin 1.4.2 for WordPress allows arbitrary file movement via a ../ directory traversal in the dir_from and dir_to parameters of an mrelocator_move action to the wp-admin/admin-ajax.php URI. El plugin Media File Manager 1.4.2 para WordPress permite el movimiento de archivos arbitrario mediante un salto de directorio por ../ en los parámetros dir_from y dir_to de una acción mrelocator_move en el URI wp-admin/admin-ajax.php. • https://www.exploit-db.com/exploits/45809 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2018-19043 – Media File Manager <= 1.4.2 - Directory Traversal to Arbitrary File Read
https://notcve.org/view.php?id=CVE-2018-19043
11 May 2018 — The Media File Manager plugin 1.4.2 for WordPress allows arbitrary file renaming (specifying a "from" and "to" filename) via a ../ directory traversal in the dir parameter of an mrelocator_rename action to the wp-admin/admin-ajax.php URI. El plugin Media File Manager 1.4.2 para WordPress permite renombrar archivos arbitrarios (especificando un nombre de archivo "from" y "to") mediante un salto de directorio por ../ en el parámetro dir de una acción mrelocator_rename en el URI wp-admin/admin-ajax.php. The Me... • https://www.exploit-db.com/exploits/45809 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2018-9059 – Easy File Sharing Web Server 7.2 - 'UserID' Remote Buffer Overflow (DEP Bypass)
https://notcve.org/view.php?id=CVE-2018-9059
18 Apr 2018 — Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 7.2 allows remote attackers to execute arbitrary code via a malicious login request to forum.ghp. NOTE: this may overlap CVE-2014-3791. Desbordamiento de búfer basado en pila en Easy File Sharing (EFS) Web Server 7.2 permite que atacantes remotos ejecuten código arbitrario mediante un inicio de sesión malicioso en forum.ghp. NOTA: podría solaparse con CVE-2014-3791. Easy File Sharing Web Server version 7.2 suffers from a buffer overflow vulne... • https://packetstorm.news/files/id/147336 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-17831 – SourceTree Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-17831
21 Dec 2017 — GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a "url =" line in a .lfsconfig file within a repository. GitHub Git LFS en versiones anteriores a la 2.1.1 permite que los atacantes remotos ejecuten comandos arbitrarios mediante una URL ssh con un carácter guión inicial en el nombre del host, que se encuentra en una línea "url =" en un archivo .lfsconfig dentro de un repositorio. Sourcetree for macOS v... • http://blog.recurity-labs.com/2017-08-10/scm-vulns • CWE-20: Improper Input Validation •

CVE-2017-1000249 – Gentoo Linux Security Advisory 201710-02
https://notcve.org/view.php?id=CVE-2017-1000249
07 Sep 2017 — An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017). Se introdujo un fallo en la función file() en un commit con ID 9611f31313a93aa036389c5f3b15eea53510d4d1 (octubre 2016) que permite a un atacante sobrescribir un búfer de pila fijo de 20 bytes con una sección .notes especial... • http://www.debian.org/security/2017/dsa-3965 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-8297
https://notcve.org/view.php?id=CVE-2017-8297
27 Apr 2017 — A path traversal vulnerability exists in simple-file-manager before 2017-04-26, affecting index.php (the sole "Simple PHP File Manager" component). Existe una vulnerabilidad de salto de directorio en el gestor de archivos Simple PHP File Manager anterior al 26-04-2017, que afecta a index.php (el único componente de "Simple PHP File Manager"). • https://github.com/jcampbell1/simple-file-manager/commit/de52e7ee61a842d8fdf791f2a5b7c91b6c5cdb56 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2016-7162 – Ubuntu Security Notice USN-3074-1
https://notcve.org/view.php?id=CVE-2016-7162
09 Sep 2016 — The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive. La función _g_file_remove_directory en file-utils.c en File Roller 3.5.4 hasta la versión 3.20.2 permite a atacantes remotos eliminar archivos arbitrarios a través de un ataque de enlace simbólico en una carpeta en un archivo. It was discovered that File Roller incorrectly handled symlinks. If a user were tricked into extr... • http://ftp.gnome.org/mirror/gnome.org/sources/file-roller/3.20/file-roller-3.20.3.news • CWE-20: Improper Input Validation •

CVE-2015-7747 – Ubuntu Security Notice USN-2787-1
https://notcve.org/view.php?id=CVE-2015-7747
29 Oct 2015 — Buffer overflow in the afReadFrames function in audiofile (aka libaudiofile and Audio File Library) allows user-assisted remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted audio file, as demonstrated by sixteen-stereo-to-eight-mono.c. Un desbordamiento del búfer en la función afReadFrames en audiofile (también se conoce como libaudiofile and Audio File Library), permite a atacantes remotos asistidos por el usuario causar una denegación de servicio ... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170387.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2015-4379
https://notcve.org/view.php?id=CVE-2015-4379
15 Jun 2015 — Cross-site request forgery (CSRF) vulnerability in the Webform Multiple File Upload module 6.x-1.x before 6.x-1.3 and 7.x-1.x before 7.x-1.3 for Drupal allows remote attackers to hijack the authentication of certain users for requests that delete files via unspecified vectors. Vulnerabilidad de CSRF en el módulo Webform Multiple File Upload 6.x-1.x anterior a 6.x-1.3 y 7.x-1.x anterior a 7.x-1.3 para Drupal permite a atacantes remotos secuestrar la autenticación de ciertos usuarios para solicitudes que elim... • http://www.openwall.com/lists/oss-security/2015/04/25/6 • CWE-352: Cross-Site Request Forgery (CSRF) •