18 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Heap-based buffer overflow in the proxy_connect function in src/client.c in CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP response. Desbordamiento de búfer basado en memoria dinámica en la funcion proxy_connect en src/client.c en CVS v1.11 y v1.12 permite a los servidores proxy HTTP remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de una respuesta HTTP manipulada. • http://lists.opensuse.org/opensuse-updates/2012-02/msg00064.html http://rhn.redhat.com/errata/RHSA-2012-0321.html http://secunia.com/advisories/47869 http://secunia.com/advisories/48063 http://secunia.com/advisories/48142 http://secunia.com/advisories/48150 http://ubuntu.com/usn/usn-1371-1 http://www.debian.org/security/2012/dsa-2407 http://www.mandriva.com/security/advisories?name=MDVSA-2012:044 http://www.osvdb.org/78987 http://www.securityfocus.com/bid/51943 h • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

cvsbug in CVS 1.12.12 and earlier creates temporary files insecurely, which allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:20.cvsbug.asc http://secunia.com/advisories/16765 http://securitytracker.com/id?1014857 http://www.debian.org/security/2005/dsa-802 http://www.debian.org/security/2005/dsa-806 http://www.redhat.com/support/errata/RHSA-2005-756.html http://www.vupen.com/english/advisories/2005/1667 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166366 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.m •

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

CVS 1.12 and earlier on Debian GNU/Linux, when using the repouid patch, allows remote attackers to bypass authentication via the pserver access method. • http://www.debian.org/security/2005/dsa-715 •

CVSS: 7.5EPSS: 84%CPEs: 17EXPL: 0

Buffer overflow in CVS before 1.11.20 allows remote attackers to execute arbitrary code. • http://bugs.gentoo.org/attachment.cgi?id=54352&action=view http://secunia.com/advisories/14976 http://www.debian.org/security/2005/dsa-742 http://www.gentoo.org/security/en/glsa/glsa-200504-16.xml http://www.novell.com/linux/security/advisories/2005_24_cvs.html http://www.redhat.com/support/errata/RHSA-2005-387.html https://exchange.xforce.ibmcloud.com/vulnerabilities/20148 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9688 https://access •

CVSS: 7.1EPSS: 1%CPEs: 111EXPL: 1

Format string vulnerability in wrapper.c in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a wrapper line. • https://www.exploit-db.com/exploits/24182 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:14.cvs.asc http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html http://security.e-matters.de/advisories/092004.html http://www.securityfocus.com/bid/10499 https://exchange.xforce.ibmcloud.com/vulnerabilities/16365 •