{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T08:14:47.248","vulnerabilities":[{"cve":{"id":"CVE-2026-27884","sourceIdentifier":"security-advisories@github.com","published":"2026-02-26T01:16:25.293","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. An attacker can craft a filename in an SMB share that includes these characters, which when spider_plus crawls and downloads, can write or overwrite arbitrary files. The issue is patched in v1.5.1. As a workaround, do not run spider_plus with DOWNLOAD=true against targets."},{"lang":"es","value":"NetExec es una herramienta de ejecución de red. Antes de la versión 1.5.1, el módulo spider_plus crea incorrectamente la ruta del archivo y la carpeta de salida al guardar archivos de recursos compartidos SMB. No tiene en cuenta que es posible que los recursos compartidos SMB de Linux contengan caracteres de salto de ruta como '../'. Un atacante puede crear un nombre de archivo en un recurso compartido SMB que incluya estos caracteres, lo que, cuando spider_plus rastrea y descarga, puede escribir o sobrescribir archivos arbitrarios. El problema está parcheado en la v1.5.1. Como solución alternativa, no ejecute spider_plus con DOWNLOAD=true contra los objetivos."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"references":[{"url":"https://github.com/Pennyw0rth/NetExec/commit/7d027f2774d0520b322d60f9c99b9ab3edb4035e","source":"security-advisories@github.com"},{"url":"https://github.com/Pennyw0rth/NetExec/issues/1120","source":"security-advisories@github.com"},{"url":"https://github.com/Pennyw0rth/NetExec/pull/1121","source":"security-advisories@github.com"},{"url":"https://github.com/Pennyw0rth/NetExec/security/advisories/GHSA-fccr-6qm2-7h27","source":"security-advisories@github.com"}]}}]}