Page 3 of 16 results (0.007 seconds)

CVSS: 7.5EPSS: 9%CPEs: 13EXPL: 0

CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests. Vulnerabilidad desconocida en servidores CVS anteriores a 1.11.10 puede permitir a atacantes causar que el servidor CVS cree directorios y ficheros en el directorio raíz del sistema de ficheros. • ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc http://ccvs.cvshome.org/servlets/NewsItemView?newsID=84&JServSessionIdservlets=8u3x1myav1 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000808 http://marc.info/?l=bugtraq&m=107168035515554&w=2 http://marc.info/?l=bugtraq&m=107540163908129&w=2 http://secunia.com/advisories/10601 http://www.debian.org/security/2004/dsa-422 http&# •

CVSS: 7.5EPSS: 32%CPEs: 13EXPL: 1

Double-free vulnerability in CVS 1.11.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed Directory request, as demonstrated by bypassing write checks to execute Update-prog and Checkin-prog commands. Vulnerabilidad de doble liberación de memoria en CVS 1.11.4 y anteriores permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante una petición de de directorio mal formada, como ha sido demostrado evitando las comprobaciones de escritura para ejecutar los comandos Update-prog y Checkin-prog. • https://www.exploit-db.com/exploits/22187 http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14 http://marc.info/?l=bugtraq&m=104333092200589&w=2 http://marc.info/?l=bugtraq&m=104342550612736&w=2 http://marc.info/?l=bugtraq&m=104428571204468&w=2 http://marc.info/? • CWE-415: Double Free •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Off-by-one overflow in the CVS PreservePermissions of rcs.c for CVSD before 1.11.2 allows local users to execute arbitrary code. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-035.0.txt ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0081.html http://marc.info/?l=bugtraq&m=102233767925177&w=2 http://www.redhat.com/support/errata/RHSA-2004-004.html http://www.securityfocus.com/bid/4829 https://exchange.xforce.ibmcloud.com/vulnerabilities/9175 https://access.redhat.com/security/cve/CVE-2002-0844 https://bugzilla&# • CWE-193: Off-by-one Error •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

CVS before 1.10.8 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (server crash) via the diff capability. CVS anteriores a 1.10.8 no inicializa adecudamente una variable global, lo que permite a atacantes remotos causar una denegación de servicio (caída del servidor) mediante la capacidad diff. • http://marc.info/?l=vuln-dev&m=101422243817321&w=2 http://marc.info/?l=vuln-dev&m=101433077724524&w=2 http://www.debian.org/security/2002/dsa-117 http://www.iss.net/security_center/static/8366.php http://www.redhat.com/support/errata/RHSA-2002-026.html http://www.securityfocus.com/bid/4234 https://access.redhat.com/security/cve/CVE-2002-0092 https://bugzilla.redhat.com/show_bug.cgi?id=1616742 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 3

The CVS 1.10.8 client trusts pathnames that are provided by the CVS server, which allows the server to force the client to create arbitrary files. • https://www.exploit-db.com/exploits/20107 http://www.securityfocus.com/bid/1523 http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3Dhvou2daoebb.fsf%40serein.m17n.org •