
CVE-2022-24826 – Git LFS can execute a binary from the current directory on Windows
https://notcve.org/view.php?id=CVE-2022-24826
19 Apr 2022 — On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current w... • https://github.com/git-lfs/git-lfs/releases • CWE-426: Untrusted Search Path •

CVE-2021-40907
https://notcve.org/view.php?id=CVE-2021-40907
24 Jan 2022 — SQL injection vulnerability in Sourcecodester Storage Unit Rental Management System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter to /storage/classes/Login.php. Una vulnerabilidad de inyección SQL en Sourcecodester Storage Unit Rental Management System versión v1 by oretnom23, permite a atacantes ejecutar comandos SQL arbitrarios por medio del parámetro username en el archivo /storage/classes/Login.php • https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-08-09072021 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2021-45253
https://notcve.org/view.php?id=CVE-2021-45253
21 Dec 2021 — The id parameter in view_storage.php from Simple Cold Storage Management System 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. El parámetro id en el archivo view_storage.php de Simple Cold Storage Management System versión 1.0, parece ser vulnerable a ataques de inyec... • https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CSMS-1.0 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2021-20291 – containers/storage: DoS via malicious image
https://notcve.org/view.php?id=CVE-2021-20291
01 Apr 2021 — A deadlock vulnerability was found in 'github.com/containers/storage' in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, wou... • https://bugzilla.redhat.com/show_bug.cgi?id=1939485 • CWE-667: Improper Locking •

CVE-2021-21237 – Git LFS can execute a Git binary from the current directory on Windows
https://notcve.org/view.php?id=CVE-2021-21237
15 Jan 2021 — Git LFS is a command line extension for managing large files with Git. On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This is the result of an incomplete fix for CVE-2020-27955. This issue occurs because on Windows, Go includes (and prefers) the current directory when the name of a command run does not contain a directory se... • https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27955 • CWE-426: Untrusted Search Path •

CVE-2020-27955 – Git Remote Code Execution via git-lfs (CVE-2020-27955)
https://notcve.org/view.php?id=CVE-2020-27955
05 Nov 2020 — Git LFS 2.12.0 allows Remote Code Execution. Git LFS versión 2.12.0, permite una ejecución de código remota • https://packetstorm.news/files/id/164180 • CWE-427: Uncontrolled Search Path Element •

CVE-2015-9544
https://notcve.org/view.php?id=CVE-2015-9544
07 Apr 2020 — An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages. Se detectó un problema en xdLocalStorage versiones hasta 2.0.5. La función ReceiveMessage() en el archivo xdLocalS... • https://github.com/ofirdagan/cross-domain-local-storage • CWE-20: Improper Input Validation •

CVE-2020-11610
https://notcve.org/view.php?id=CVE-2020-11610
07 Apr 2020 — An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends. Se detectó un problema en xdLocalStorage versiones hasta 2.0.5. La función postData() en el archivo xdLocalStoragePostMessageApi.js especifica el comodín ... • https://github.com/ofirdagan/cross-domain-local-storage • CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2020-11611
https://notcve.org/view.php?id=CVE-2020-11611
07 Apr 2020 — An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends. Se detectó un problema en xdLocalStorage versiones hasta 2.0.5. La función buildMessage() en el archivo xdLocalStorage.js especifica el comodín (*) como targetOrigin cuando se llama a l... • https://github.com/ofirdagan/cross-domain-local-storage • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2015-9545
https://notcve.org/view.php?id=CVE-2015-9545
07 Apr 2020 — An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages. Se detectó un problema en xdLocalStorage versiones hasta 2.0.5. La función ReceiveMessage() en el archivo xdLocalStorage.js no i... • https://github.com/ofirdagan/cross-domain-local-storage • CWE-20: Improper Input Validation •