Page 5 of 24 results (0.012 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Off-by-one overflow in the CVS PreservePermissions of rcs.c for CVSD before 1.11.2 allows local users to execute arbitrary code. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-035.0.txt ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0081.html http://marc.info/?l=bugtraq&m=102233767925177&w=2 http://www.redhat.com/support/errata/RHSA-2004-004.html http://www.securityfocus.com/bid/4829 https://exchange.xforce.ibmcloud.com/vulnerabilities/9175 https://access.redhat.com/security/cve/CVE-2002-0844 https://bugzilla&# • CWE-193: Off-by-one Error •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

CVS before 1.10.8 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (server crash) via the diff capability. CVS anteriores a 1.10.8 no inicializa adecudamente una variable global, lo que permite a atacantes remotos causar una denegación de servicio (caída del servidor) mediante la capacidad diff. • http://marc.info/?l=vuln-dev&m=101422243817321&w=2 http://marc.info/?l=vuln-dev&m=101433077724524&w=2 http://www.debian.org/security/2002/dsa-117 http://www.iss.net/security_center/static/8366.php http://www.redhat.com/support/errata/RHSA-2002-026.html http://www.securityfocus.com/bid/4234 https://access.redhat.com/security/cve/CVE-2002-0092 https://bugzilla.redhat.com/show_bug.cgi?id=1616742 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 3

The CVS 1.10.8 client trusts pathnames that are provided by the CVS server, which allows the server to force the client to create arbitrary files. • https://www.exploit-db.com/exploits/20107 http://www.securityfocus.com/bid/1523 http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3Dhvou2daoebb.fsf%40serein.m17n.org •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 3

The CVS 1.10.8 server does not properly restrict users from creating arbitrary Checkin.prog or Update.prog programs, which allows remote CVS committers to modify or create Trojan horse programs with the Checkin.prog or Update.prog names, then performing a CVS commit action. • https://www.exploit-db.com/exploits/20108 http://www.securityfocus.com/bid/1524 http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3Dhvou2daoebb.fsf%40serein.m17n.org •