Логотип exploitDog
bind:CVE-2021-34422
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-34422

Количество 3

Количество 3

nvd логотип

CVE-2021-34422

около 4 лет назад

The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-rr44-rmpx-9h3q

больше 3 лет назад

The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.

EPSS: Низкий
fstec логотип

BDU:2022-06097

больше 4 лет назад

Уязвимость клиента каталога открытых ключей Keybase для Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-34422

The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.

CVSS3: 7.2
0%
Низкий
около 4 лет назад
github логотип
GHSA-rr44-rmpx-9h3q

The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06097

Уязвимость клиента каталога открытых ключей Keybase для Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу