Show filters
813 Total Results
Displaying 331-340 of 813
Sort by:
Attacker Value
Unknown
CVE-2021-37713
Disclosure Date: August 31, 2021 (last updated February 23, 2025)
The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\path`. If the drive letter does not match the extraction target, for example `D:\extraction\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directo…
0
Attacker Value
Unknown
CVE-2021-23430
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization.
0
Attacker Value
Unknown
CVE-2021-35465
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
Certain Arm products before 2021-08-23 do not properly consider the effect of exceptions on a VLLDM instruction. A Non-secure handler may have read or write access to part of a Secure context. This affects Arm Cortex-M33 r0p0 through r1p0, Arm Cortex-M35P r0, Arm Cortex-M55 r0p0 through r1p0, and Arm China STAR-MC1 (in the STAR SE configuration).
0
Attacker Value
Unknown
CVE-2021-37750
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
0
Attacker Value
Unknown
CVE-2020-23069
Disclosure Date: August 18, 2021 (last updated February 23, 2025)
Path Traversal vulneraility exists in webTareas 2.0 via the extpath parameter in general_serv.php, which could let a malicious user read arbitrary files.
0
Attacker Value
Unknown
CVE-2021-38511
Disclosure Date: August 10, 2021 (last updated February 23, 2025)
An issue was discovered in the tar crate before 0.4.36 for Rust. When symlinks are present in a TAR archive, extraction can create arbitrary directories via .. traversal.
0
Attacker Value
Unknown
CVE-2021-34570
Disclosure Date: August 03, 2021 (last updated February 23, 2025)
Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.
0
Attacker Value
Unknown
CVE-2021-32803
Disclosure Date: August 03, 2021 (last updated February 23, 2025)
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replac…
0
Attacker Value
Unknown
CVE-2021-32804
Disclosure Date: August 03, 2021 (last updated February 23, 2025)
The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerab…
0
Attacker Value
Unknown
CVE-2021-33485
Disclosure Date: August 03, 2021 (last updated February 23, 2025)
CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.
0