Page 5 of 60 results (0.018 seconds)

CVSS: 9.8EPSS: 68%CPEs: 24EXPL: 11

06 Oct 2018 — Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character. Git en versiones anteriores a la 2.14.5, versiones 2.15.x anteriores a la 2.15.3, versiones 2.16.x anteriores a la 2.16.5, versiones 2.17.x anteriores a la 2.17.2, versiones 2.18.x anteriores a la 2.18.1 y versiones 2.... • https://packetstorm.news/files/id/150380 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 8.0EPSS: 0%CPEs: 1EXPL: 0

11 Sep 2018 — A privilege escalation flaw was found in the Ansible Tower. When Tower before 3.0.3 deploys a PostgreSQL database, it incorrectly configures the trust level of postgres user. An attacker could use this vulnerability to gain admin level access to the database. Se ha encontrado un error de escalado de privilegios en Ansible Tower. Cuando Tower en versiones anteriores a la 3.0.3 despliega una base de datos PostgreSQL, configura incorrectamente el nivel de confianza del usuario postgres. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7070 • CWE-264: Permissions, Privileges, and Access Controls CWE-266: Incorrect Privilege Assignment •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

22 Aug 2018 — Ansible Tower before versions 3.1.8 and 3.2.6 is vulnerable to cross-site request forgery (CSRF) in awx/api/authentication.py. An attacker could exploit this by tricking already authenticated users into visiting a malicious site and hijacking the authtoken cookie. Ansible Tower en versiones anteriores a la 3.1.8 y 3.2.6 es vulnerable a Cross-Site Request Forgery (CSRF) en awx/api/authentication.py. Un atacante podría explotarlo engañando a usuarios ya autenticados para que visiten un sitio malicioso y secue... • http://www.securityfocus.com/bid/105136 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 6%CPEs: 8EXPL: 0

01 Aug 2018 — _XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows remote attackers to cause denial of service or potentially code execution via a one-byte heap overflow. _XcursorThemeInherits en library.c en libXcursor en versiones anteriores a la 1.1.15 permite que atacantes remotos provoquen una denegación de servicio (DoS) o una potencial ejecución de código mediante un desbordamiento de memoria dinámica (heap) de un byte. X.Org is an open-source implementation of the X Window System. It provides the... • https://access.redhat.com/errata/RHSA-2018:3059 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

28 Jul 2018 — An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression. Se ha descubierto un problema en mspack/chmd.c en libmspack en versiones anteriores a la 0.7alpha. Hay un error por un paso en la macro TOLOWER() para la descompresión CHM. Hanno Boeck discovered that libmspack incorrectly handled certain CHM files. • http://www.openwall.com/lists/oss-security/2018/07/26/1 • CWE-193: Off-by-one Error •

CVSS: 6.5EPSS: 0%CPEs: 16EXPL: 0

28 Jul 2018 — An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames. Se ha descubierto un problema en mspack/chmd.c en libmspack en versiones anteriores a la 0.7alpha. No rechaza los nombres de archivos CHM en blanco. Several vulnerabilities were discovered in libsmpack, a library used to handle Microsoft compression formats. • http://www.openwall.com/lists/oss-security/2018/07/26/1 • CWE-20: Improper Input Validation CWE-193: Off-by-one Error •

CVSS: 6.5EPSS: 0%CPEs: 17EXPL: 0

28 Jul 2018 — An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash). Se ha descubierto un problema en mspack/chmd.c en libmspack en versiones anteriores a la 0.7alpha. Hay un error por un paso en las comprobaciones de validez de los números de chunk de CHM PMGI/PMGL que podría conducir a una denegación de servicio (referencia de datos... • http://www.openwall.com/lists/oss-security/2018/07/26/1 • CWE-193: Off-by-one Error •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

28 Jul 2018 — An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite. Se ha descubierto un problema en kwajd_read_headers en mspack/kwajd.c en libmspack en versiones anteriores a la 0.7alpha. Las extensiones de encabezado de archivo KWAJ incorrectas pueden provocar una sobrescritura de uno o dos bytes. Hanno Boeck discovered that libmspack incorrectly handled certain CHM files. • http://www.openwall.com/lists/oss-security/2018/07/26/1 • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 10EXPL: 1

22 Jul 2018 — Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file. Poppler hasta la versión 0.62 contiene una vulnerabilidad de lectura fuera de límites debido a un acceso incorrecto a la memoria que no se mapea en su espacio de memoria, tal y como queda demostrado con pdfuni... • https://packetstorm.news/files/id/148661 • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 13EXPL: 0

03 Jul 2018 — The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname. La función get_cookies en soup-cookie-jar.c en libsoup 2.63.2 permite que los atacantes provoquen un impacto no especificado mediante un nombre de host vacío. An out-of-bounds read has been discovered in libsoup when getting cookies from a URI with empty hostname. An attacker may use this flaw to cause a crash in the application. GNOME is the default desktop environment of Red H... • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html • CWE-125: Out-of-bounds Read •