Page 8 of 41 results (0.009 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 2

npm/KyleRoss windows-cpu all versions vulnerable to command injection resulting in code execution as Node.js user npm/KyleRoss windows-cpu en todas sus versiones, es vulnerable a la inyección de comandos, lo que provoca la ejecución de código como usuario de Node.js. • https://github.com/ossf-cve-benchmark/CVE-2017-1000219 https://nodesecurity.io/advisories/336 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Untrusted search path vulnerability in Git 1.x for Windows allows local users to gain privileges via a Trojan horse git.exe file in the current working directory. NOTE: 2.x is unaffected. Vulnerabilidad de ruta de acceso no confiable en Git 1.x para Windows permite a los usuarios locales obtener privilegios a través de un archivo caballo de Troya git.exe en el directorio de trabajo actual. NOTA: 2.x no se ve afectada. • http://www.securityfocus.com/bid/94289 https://github.com/git-for-windows/git/issues/944 https://www.youtube.com/watch?v=S7jOLv0sul0 • CWE-426: Untrusted Search Path •

CVSS: 9.3EPSS: 16%CPEs: 8EXPL: 0

Stack-based buffer overflow in the Intel Indeo41 codec for Windows Media Player in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via crafted compressed video data in an IV41 stream in a media file, leading to many loop iterations, as demonstrated by data in an AVI file. Desbordamiento del búfer de la pila en el codec Intel Indeo41 codec para Windows Media Player en Microsoft Windows 2000 SP4, XP SP2 y SP3, y Server 2003 SP2 permite a atacantes remotos ejecutar código arbitrario a través de datos de vídeo comprimidos debidamente manipulados en un stream en un fichero multimedia que lleve a demasiadas iteraciones, como se demuestra con un fichero AVI. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the Intel Indeo41 codec which is accessed by various applications through the Video Compression Manager. This codec is registered to handle IV41 streams within a container such as the AVI format. • http://secunia.com/advisories/37592 http://securitytracker.com/id?1023302 http://support.microsoft.com/kb/954157 http://support.microsoft.com/kb/955759 http://support.microsoft.com/kb/976138 http://www.microsoft.com/technet/security/advisory/954157.mspx http://www.osvdb.org/60856 http://www.securityfocus.com/archive/1/508335/100/0/threaded http://www.securityfocus.com/bid/37251 http://www.vupen.com/english/advisories/2009/3440 http://zerodayinitiative.com/advisories/ZDI-09& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

k23productions TFTPUtil GUI 1.2.0 and 1.3.0 allows remote attackers to cause a denial of service (service crash) via a long filename in a crafted request. k23productions TFTPUtil GUI v1.2.0 y v1.3.0; permite a atacantes remotos provocar una denegación de servicio (caída del servicio) a través de un nombre de fichero largo en una solicitud manipulada. • http://sourceforge.net/forum/forum.php?forum_id=894598 http://www.princeofnigeria.org/blogs/index.php/2009/01/14/tftputil-gui-tftp-server-denial-of-servi?blog=1 http://www.securityfocus.com/archive/1/500107/100/0/threaded http://www.securityfocus.com/bid/33289 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in k23productions TFTPUtil GUI 1.2.0 and 1.3.0 allows remote attackers to read arbitrary files outside the TFTP root directory via directory traversal sequences in a GET request. Vulnerabilidad de salto de directorio en k23productions TFTPUtil GUI 1.2.0 y 1.3.0, que permite a los atacantes remotos leer arbitrariamente archivos fuera del directorio raíz TFTP a través de una secuencia de salto de directorio en una petición GET. • http://secunia.com/advisories/33561 http://sourceforge.net/forum/forum.php?forum_id=894598 http://www.princeofnigeria.org/blogs/index.php/2009/01/14/tftputil-gui-tftp-directory-traversal http://www.securityfocus.com/archive/1/500106/100/0/threaded http://www.securityfocus.com/bid/33287 https://exchange.xforce.ibmcloud.com/vulnerabilities/48019 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •