Page 10 of 47 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 26EXPL: 0

The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation. El módulo mod_dav_svn para Apache HTTP Server, como se distribuye en Apache Subversion v1.5.x y v1.6.x anteriores a 1.6.17,cuando la opción SVNPathAuthz short_circuit está deshabilitada no se aplican correctamente los permisos para los archivos que habían sido legibles públicamente en el pasado, lo que permite a atacantes remotos obtener información sensible a través de una operación de reproducción de INFORMES. • http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html http://secunia.com/advisories/44633 http://secunia.com/advisories/44681 http://secunia.com/advisories/44849 http://secunia.com/advisories/44888 http://secunia.com/advisories/45162 http://subversion.apache.org/security/CVE-2011-1921-advisory.txt http://support.ap • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 0%CPEs: 5EXPL: 1

Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code. Multiples vulenerabilidades de cadena de formato en (1) neon 0.24.4 y anteriores, y otros productos que usan neon incluyendo (2) Cadaver, (3) Subversion, o (4) OpenOffice, permite a servidores remotos WebDAV maliciosos ejecutar código arbitrario. • https://www.exploit-db.com/exploits/23999 ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc http://lists.suse.com/archive/suse-security-announce/2004-Apr/0002.html http://lists.suse.com/archive/suse-security-announce/2004-Apr/0003.html http://marc.info/?l=bugtraq&m=108213873203477&w=2 http://marc.info/?l=bugtraq&m=108214147022626&w=2 http://secunia.com/advisories/11363 http://security.gentoo.org/glsa/glsa-200405-01.xml http://security.gentoo. • CWE-134: Use of Externally-Controlled Format String •