Page 7 of 33 results (0.003 seconds)

CVSS: 5.0EPSS: 2%CPEs: 19EXPL: 0

The mod_authz_svn module in Subversion 1.0.7 and earlier does not properly restrict access to all metadata on unreadable paths, which could allow remote attackers to gain sensitive information via (1) svn log -v, (2) svn propget, or (3) svn blame, and other commands that follow renames. El módulo mod_authz_svn en Subversion 1.0.7 y anteriores no restringe adecuadamente el acceso a todos los metadatos en rutas ilegibles, lo que podría permitir a atacantes remotos ganar información sensible mediante (1) svn log -v, (2) svn propget, o (3) svn blame, y otras órdenes que siguen cambios de de nombre. • http://fedoranews.org/updates/FEDORA-2004-318.shtml http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt http://www.gentoo.org/security/en/glsa/glsa-200409-35.xml http://www.securityfocus.com/bid/11243 https://exchange.xforce.ibmcloud.com/vulnerabilities/17472 •

CVSS: 10.0EPSS: 31%CPEs: 7EXPL: 0

libsvn_ra_svn in Subversion 1.0.4 trusts the length field of (1) svn://, (2) svn+ssh://, and (3) other svn protocol URL strings, which allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via an integer overflow that leads to a heap-based buffer overflow. libsvn_ra_svn en Subversion 1.0.4 confía en el campo de longitud de (1) svn://, (2) svn+ssh://, y (3) otras cadenas de protocolo svn, lo que permite a atacantes remotos causar una denegación de servicio (consumición de memoria) y posiblemente ejecutar código de su elección mediante un desbordamiento de enteros que conduce a un desbordamiento basado en la pila. • http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt http://www.gentoo.org/security/en/glsa/glsa-200406-07.xml http://www.novell.com/linux/security/advisories/2004_18_subversion.html http://www.securityfocus.com/advisories/6847 http://www.securityfocus.com/archive/1/365836 http://www.securityfocus.com/bid/10519 https://bugzilla.fedora.us/show_bug.cgi?id=1748 https://exchange.xforce.ibmcloud.com/vulnerabilities/16396 •

CVSS: 7.5EPSS: 96%CPEs: 3EXPL: 5

Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and earlier allows remote attackers to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command. Desbordamiento basado en la pila durante la conversión de datos apr_time en Subversion 1.0.2 y anteriores permite a atacantes remotos ejecutar código arbitrairo mediante: (1) una consulta DAV2 REPORT o (2) una orden get-dated-rev svn-protocol • https://www.exploit-db.com/exploits/304 https://www.exploit-db.com/exploits/9935 https://www.exploit-db.com/exploits/16284 http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021737.html http://marc.info/?l=bugtraq&m=108498676517697&w=2 http://secunia.com/advisories/11642 http://secunia.com/advisories/11675 http://security.e-matters.de/advisories/082004.html http://subversion.tigris.org/svn-sscanf-advisory.txt http://www.gentoo.org/security/en/glsa/glsa-2004 •