CVE-2014-3701
https://notcve.org/view.php?id=CVE-2014-3701
eDeploy has tmp file race condition flaws eDeploy tiene fallos de condición de carrera de archivos tmp. • https://access.redhat.com/security/cve/cve-2014-3701 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3701 https://security-tracker.debian.org/tracker/CVE-2014-3701 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2014-3699
https://notcve.org/view.php?id=CVE-2014-3699
eDeploy has RCE via cPickle deserialization of untrusted data eDeploy tiene una RCE por medio de la deserialización cPickle de datos no seguros. • https://access.redhat.com/security/cve/cve-2014-3699 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3699 https://security-tracker.debian.org/tracker/CVE-2014-3699 • CWE-502: Deserialization of Untrusted Data •
CVE-2014-3700
https://notcve.org/view.php?id=CVE-2014-3700
eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data eDeploy hasta al menos el 14-10-2014, presenta una ejecución de código remota debido a la función eval() de datos no confiables. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3700 https://security-tracker.debian.org/tracker/CVE-2014-3700 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2014-3702
https://notcve.org/view.php?id=CVE-2014-3702
Directory traversal vulnerability in eNovance eDeploy allows remote attackers to create arbitrary directories and files and consequently cause a denial of service (resource consumption) via a .. (dot dot) the session parameter. Vulnerabilidad de salto de directorio en eNovance eDeploy permite que atacantes remotos creen directorios y archivos arbitrarios y, en consecuencia, provoquen una denegación de servicio (consumo de recursos) mediante un .. (punto punto) en el parámetro sesión. • https://bugzilla.redhat.com/show_bug.cgi?id=1153470 https://github.com/redhat-cip/edeploy/issues/231 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2014-8174
https://notcve.org/view.php?id=CVE-2014-8174
eDeploy makes it easier for remote attackers to execute arbitrary code by leveraging use of HTTP to download files. eDeploy facilita que los atacantes remotos ejecuten código arbitrario mediante el uso de HTTP para descargar archivos. • https://bugzilla.redhat.com/show_bug.cgi?id=1202972 https://github.com/redhat-cip/edeploy/issues/230 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •