Page 6 of 104 results (0.008 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended program is not found in any directory listed in `PATH`. The vulnerability occurs because when Git LFS detects that the program it intends to run does not exist in any directory listed in `PATH` then Git LFS passes an empty string as the executable file path to the Go `os/exec` package, which contains a bug such that, on Windows, it prepends the name of the current working directory (i.e., `.`) to the empty string without adding a path separator, and as a result searches in that directory for a file with the base name `.` combined with any file extension from `PATHEXT`, executing the first one it finds. • https://github.com/git-lfs/git-lfs/releases https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj • CWE-426: Untrusted Search Path •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

An Unquoted Service Path vulnerability exists in Ext2Fsd v0.68 via a specially crafted file in the Ext2Srv Service executable service path. Se presenta una vulnerabilidad de ruta de servicio no citada en Ext2Fsd versión v0.68, por medio de un archivo especialmente diseñado en la ruta de servicio ejecutable de Ext2Srv Service • https://exchange.xforce.ibmcloud.com/vulnerabilities/198746 https://github.com/M507/Miner https://www.exploit-db.com/exploits/49706 • CWE-428: Unquoted Search Path or Element •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Path Traversal in GitHub repository prasathmani/tinyfilemanager prior to 2.4.7. Un Salto de Ruta en el repositorio de GitHub prasathmani/tinyfilemanager versiones anteriores a 2.4.7 • https://github.com/prasathmani/tinyfilemanager/commit/154947ef83efeb68fc2b921065392b6a7fc9c965 https://huntr.dev/bounties/5995a93f-0c4b-4f7d-aa59-a64424219424 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 18%CPEs: 1EXPL: 8

A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution. Una vulnerabilidad de cruce de rutas en la funcionalidad de carga de archivos en tinyfilemanager.php en Tiny File Manager antes de la versión 2.4.7 permite a los atacantes remotos (con cuentas de usuario válidas) cargar archivos PHP maliciosos en la raíz web, lo que lleva a la ejecución de código Tiny File Manager version 2.4.6 suffers from an authenticated remote shell upload vulnerability. • https://www.exploit-db.com/exploits/50828 https://github.com/BKreisel/CVE-2021-45010 https://github.com/Syd-SydneyJr/CVE-2021-45010 https://github.com/febinrev/CVE-2021-45010-TinyFileManager-Exploit http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html https://febin0x4e4a.wordpress.com/2022/01/23/tiny-file-manager-authenticated-rce https://github.com/febinrev/tinyfilemanager-2.4.3-exploit/raw/main/exploit.sh https://github.com/prasathmani/tinyfilemanager/commit • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_read_data() in "/ok_png.c". David Brackeen ok-file-formats versión 203defd es vulnerable a un Desbordamiento del Búfer. Cuando es usada la función del proyecto ok-file-formats, es producido un desbordamiento del búfer de la pila en la función ok_png_read_data() en "/ok_png.c" • https://github.com/brackeen/ok-file-formats/issues/18 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •