Логотип exploitDog
bind:CVE-2026-40024
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-40024

Количество 5

Количество 5

ubuntu логотип

CVE-2026-40024

4 дня назад

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2026-40024

5 дней назад

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

CVSS3: 7.1
EPSS: Низкий
msrc логотип

CVE-2026-40024

3 дня назад

Sleuth Kit tsk_recover Path Traversal

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2026-40024

5 дней назад

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-995r-jc2c-558w

4 дня назад

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-40024

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

CVSS3: 7.1
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-40024

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

CVSS3: 7.1
0%
Низкий
5 дней назад
msrc логотип
CVE-2026-40024

Sleuth Kit tsk_recover Path Traversal

CVSS3: 7.1
0%
Низкий
3 дня назад
debian логотип
CVE-2026-40024

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability ...

CVSS3: 7.1
0%
Низкий
5 дней назад
github логотип
GHSA-995r-jc2c-558w

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

CVSS3: 7.1
0%
Низкий
4 дня назад

Уязвимостей на страницу