Page 2 of 7 results (0.003 seconds)

CVSS: 5.8EPSS: 2%CPEs: 1EXPL: 1

Uscan in devscripts 2.13.5, when USCAN_EXCLUSION is enabled, allows remote attackers to delete arbitrary files via a whitespace character in a filename. Uscan en devscripts 2.13.5, cuando se activa USCAN_EXCLUSION, permite a atacantes remotos eliminar archivos arbitrarios a través de un caracter de espacio en blanco en un nombre de archivo. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732006 http://osvdb.org/100917 http://www.openwall.com/lists/oss-security/2013/12/12/9 http://www.openwall.com/lists/oss-security/2013/12/13/2 http://www.securityfocus.com/bid/64258 https://exchange.xforce.ibmcloud.com/vulnerabilities/89669 • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 1%CPEs: 8EXPL: 0

The get_main_source_dir function in scripts/uscan.pl in devscripts before 2.13.8, when using USCAN_EXCLUSION, allows remote attackers to execute arbitrary commands via shell metacharacters in a directory name. La función get_main_source_dir en scripts/uscan.pl en devscripts anterior a 2.13.8, al utilizar USCAN_EXCLUSION, permite a atacantes remotos ejecutar comandos arbitrarios mediante metacaracteres de shell en un nombre de directorio. • http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git%3Ba=commitdiff%3Bh=91f05b5 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849 http://osvdb.org/100855 http://seclists.org/oss-sec/2013/q4/470 http://seclists.org/oss-sec/2013/q4/486 http://www.securityfocus.com/bid/64241 https://bugzilla.redhat.com/show_bug.cgi?id=1040266 https://exchange.xforce.ibmcloud.com/vulnerabilities/89666 • CWE-94: Improper Control of Generation of Code ('Code Injection') •