Page 2 of 190 results (0.005 seconds)

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

Review Board: URL processing gives unauthorized users access to review lists Review Board: el procesamiento de URL otorga acceso a usuarios no autorizados en listas de revisión. • http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120619.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119819.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119820.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119830.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119831.html http://www.securityfocus.com/bid/63023 https://access.redhat.com/security/cve/cve-2013-4411 https:/& • CWE-863: Incorrect Authorization •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

ReviewBoard: has an access-control problem in REST API ReviewBoard: presenta un problema de control de acceso en la API REST. • http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120619.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119819.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119820.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119830.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119831.html http://www.securityfocus.com/bid/63022 https://access.redhat.com/security/cve/cve-2013-4410 https:/& • CWE-863: Incorrect Authorization •

CVSS: 6.1EPSS: 0%CPEs: 4EXPL: 1

Cross-site scripting (XSS) vulnerability in templates/openid-selector.tmpl in ikiwiki before 3.20150329 allows remote attackers to inject arbitrary web script or HTML via the openid_identifier parameter in a verify action to ikiwiki.cgi. Una vulnerabilidad de tipo cross-site scripting (XSS) en el archivo templates/openid-selector.tmpl en ikiwiki versiones anteriores a 3.20150329, permite a atacantes remotos inyectar script web o HTML arbitrario por medio del parámetro openid_identifier en una acción de comprobación para el archivo ikiwiki.cgi. • http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157001.html http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157023.html http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157025.html http://openwall.com/lists/oss-security/2015/03/30/5 http://openwall.com/lists/oss-security/2015/03/31/1 http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=18dfba868fe2fb9c64706b2123eb0b3a3ce66a77 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=7 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

Trusted Boot (tboot) before 1.8.2 has a 'loader.c' Security Bypass Vulnerability Trusted Boot (tboot) anterior a la versión 1.8.2 tiene una vulnerabilidad de omisión de seguridad en "loader.c" • http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136768.html http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136778.html http://www.openwall.com/lists/oss-security/2014/07/30/4 http://www.securityfocus.com/bid/68960 https://exchange.xforce.ibmcloud.com/vulnerabilities/95063 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 2%CPEs: 6EXPL: 0

Chrony before 1.29.1 has traffic amplification in cmdmon protocol Chrony versiones anteriores a la versión 1.29.1, tiene amplificación de tráfico en el protocolo cmdmon. • http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127837.html http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128753.html http://www.openwall.com/lists/oss-security/2014/01/17/9 http://www.openwall.com/lists/oss-security/2014/01/18/1 http://www.openwall.com/lists/oss-security/2014/01/18/2 http://www.openwall.com/lists/oss-security/2014/01/18/3 http://www.openwall.com/lists/oss-security/2014/01/19/1 http://www.securit •