Page 141 of 3085 results (0.025 seconds)

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 1

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. El paquete git versiones anteriores a 1.11.0, es vulnerable a una inyección de comandos por medio de una inyección de argumentos git. Cuando es llamada a la función fetch(remote = "origin", opts = {}), el parámetro remoto es pasado al subcomando git fetch de forma que pueden establecerse flags adicionales. • https://github.com/ruby-git/ruby-git/pull/569 https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0 https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTJUF6SFPL4ZVSJQHGQ36KFPFO5DQVYZ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q2V3HOFU4ZVTQZHAVAVL3EX2KU53SP7R https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNJ • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sface() sfh->boundary_entry_objects Edge_of. Se presentan múltiples vulnerabilidades de ejecución de código en la funcionalidad de análisis de polígonos Nef de CGAL libcgal versión CGAL-5.1.1. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html https://security.gentoo.org/glsa/202305-34 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sface() SD.link_as_face_cycle(). Se presentan múltiples vulnerabilidades de ejecución de código en la funcionalidad de análisis de polígonos Nef de CGAL libcgal versión CGAL-5.1.1. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html https://security.gentoo.org/glsa/202305-34 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sface() sfh->center_vertex(). Se presentan múltiples vulnerabilidades de ejecución de código la funcionalidad de análisis de polígonos Nef de CGAL libcgal versión CGAL-5.1.1. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html https://security.gentoo.org/glsa/202305-34 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sloop() slh->facet(). Se presentan múltiples vulnerabilidades de ejecución de código en la funcionalidad de análisis de polígonos Nef de CGAL libcgal versión CGAL-5.1.1. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html https://security.gentoo.org/glsa/202305-34 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •