Page 27 of 193 results (0.002 seconds)

CVSS: 10.0EPSS: 91%CPEs: 2EXPL: 3

The search function in TWiki 20030201 allows remote attackers to execute arbitrary commands via shell metacharacters in a search string. • https://www.exploit-db.com/exploits/642 https://www.exploit-db.com/exploits/16894 http://archives.neohapsis.com/archives/bugtraq/2004-11/0201.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000918 http://marc.info/?l=bugtraq&m=110037207516456&w=2 http://security.gentoo.org/glsa/glsa-200411-33.xml http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithSearch http://www.ciac.org/ciac/bulletins/p-039.shtml http://www.securityfocus.com/bid/11674 https& •

CVSS: 5.0EPSS: 2%CPEs: 19EXPL: 0

The mod_authz_svn module in Subversion 1.0.7 and earlier does not properly restrict access to all metadata on unreadable paths, which could allow remote attackers to gain sensitive information via (1) svn log -v, (2) svn propget, or (3) svn blame, and other commands that follow renames. El módulo mod_authz_svn en Subversion 1.0.7 y anteriores no restringe adecuadamente el acceso a todos los metadatos en rutas ilegibles, lo que podría permitir a atacantes remotos ganar información sensible mediante (1) svn log -v, (2) svn propget, o (3) svn blame, y otras órdenes que siguen cambios de de nombre. • http://fedoranews.org/updates/FEDORA-2004-318.shtml http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt http://www.gentoo.org/security/en/glsa/glsa-200409-35.xml http://www.securityfocus.com/bid/11243 https://exchange.xforce.ibmcloud.com/vulnerabilities/17472 •

CVSS: 10.0EPSS: 0%CPEs: 15EXPL: 0

Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028590.html http://secunia.com/advisories/13167 http://www.debian.org/security/2004/dsa-592 http://www.gentoo.org/security/en/glsa/glsa-200411-20.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:129 http://www.securityfocus.com/bid/11657 https://exchange.xforce.ibmcloud.com/vulnerabilities/18032 •

CVSS: 7.5EPSS: 96%CPEs: 48EXPL: 2

RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/968818 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •

CVSS: 10.0EPSS: 0%CPEs: 20EXPL: 0

Buffer overflow in the getnickuserhost function in BNC 2.8.9, and possibly other versions, allows remote IRC servers to execute arbitrary code via an IRC server response that contains many (1) ! (exclamation) or (2) @ (at sign) characters. • http://marc.info/?l=bugtraq&m=110011817627839&w=2 http://secunia.com/advisories/13149 http://security.lss.hr/en/index.php?page=details&ID=LSS-2004-11-03 http://www.debian.org/security/2004/dsa-595 http://www.securityfocus.com/bid/11647 https://exchange.xforce.ibmcloud.com/vulnerabilities/18013 •