Page 2 of 8 results (0.001 seconds)

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 0

plugins/scmcvs/www/cvsweb.php in the CVSWeb CGI in GForge 4.5.16 before 20070524, aka gforge-plugin-scmcvs, allows remote attackers to execute arbitrary commands via shell metacharacters in the PATH_INFO. plugins/scmcvs/www/cvsweb.php en el CGI CVSWeb de GForge 4.5.16 anterior al 24/05/2007, también conocido como gforge-plugin-scmcvs, permite a atacantes remotos ejecutar comandos de su elección mediante metacaracteres de línea de comandos en el PATH_INFO. • http://gforge.org/scm/viewvc.php/branches/Branch_4_5/gforge/plugins/scmcvs/www/cvsweb.php?root=gforge&r1=5849&r2=6038&pathrev=6038 http://osvdb.org/36526 http://secunia.com/advisories/25395 http://secunia.com/advisories/25416 http://www.debian.org/security/2007/dsa-1297 http://www.securityfocus.com/bid/24141 http://www.vupen.com/english/advisories/2007/1942 https://exchange.xforce.ibmcloud.com/vulnerabilities/34510 •

CVSS: 6.4EPSS: 1%CPEs: 4EXPL: 2

viewFile.php in the scm component of Gforge before 4.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file_name parameter. • https://www.exploit-db.com/exploits/25693 http://marc.info/?l=bugtraq&m=111695779919830&w=2 http://secunia.com/advisories/13845 http://www.securityfocus.com/bid/13716 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Directory traversal vulnerability in GForge 3.3 and earlier allows remote attackers to list arbitrary directories via a .. (dot dot) in the (1) dir parameter to controller.php or (2) dir_name parameter to controlleroo.php. • http://marc.info/?l=bugtraq&m=110627132209963&w=2 http://securitytracker.com/id?1012950 http://www.securityfocus.com/bid/12318 https://exchange.xforce.ibmcloud.com/vulnerabilities/18988 •