Page 3 of 12 results (0.009 seconds)

CVSS: 7.5EPSS: 1%CPEs: 13EXPL: 0

Directory traversal vulnerability in ZNC before 0.072 allows remote attackers to overwrite arbitrary files via a crafted DCC SEND request. Vulnerabilidad de salto de directorio en ZNC anterior a v0.072 permite a atacantes remotos sobrescribir ficheros de su elección a través de una petición DCC SEND manipulada. • http://en.znc.in/w/index.php?title=ZNC&oldid=3209#WARNING http://en.znc.in/wiki/ChangeLog/0.072 http://secunia.com/advisories/35916 http://www.debian.org/security/2009/dsa-1848 http://www.openwall.com/lists/oss-security/2009/07/21/5 http://znc.svn.sourceforge.net/viewvc/znc?view=rev&sortby=rev&sortdir=down&revision=1570 https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00965.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

Multiple CRLF injection vulnerabilities in webadmin in ZNC before 0.066 allow remote authenticated users to modify the znc.conf configuration file and gain privileges via CRLF sequences in the quit message and other vectors. Múltiples vulnerabilidades de inyección de retorno de carro y salto de línea (CRLF) en ZNC antes de v0.066 permite a usuarios remotos autentificados modificar el fichero de configuración znc.conf y conseguir un aumento de privilegios a través de secuencias CRLF en el mensaje "quit" y otros vectores. • http://osvdb.org/52295 http://secunia.com/advisories/34230 http://www.debian.org/security/2009/dsa-1735 http://www.openwall.com/lists/oss-security/2009/03/01/2 http://znc.svn.sourceforge.net/viewvc/znc/trunk/modules/webadmin.cpp?view=log&sortby=rev&sortdir=down&pathrev=1395 http://znc.svn.sourceforge.net/viewvc/znc?view=rev&sortby=rev&sortdir=down&revision=1395 http://znc.svn.sourceforge.net/viewvc/znc?view=rev&sortby=rev&sortdir=down&revision=1396 • CWE-94: Improper Control of Generation of Code ('Code Injection') •