Page 8 of 41 results (0.005 seconds)

CVSS: 6.0EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in Subversion before 1.4.5, as used by TortoiseSVN before 1.4.5 and possibly other products, when run on Windows-based systems, allows remote authenticated users to overwrite and create arbitrary files via a ..\ (dot dot backslash) sequence in the filename, as stored in the file repository. Vulnerabilidad de salto de directorio en Subversion anterior a 1.4.5, utilizado en TortoiseSVN anterior a 1.4.5 y posiblemente otros productos, cuando se ejecuta en sistemas basados en Windows, permite a usuarios autenticados remotamente sobrescribir y crear archivos de su elección mediante una secuencia ..\ (punto punto barra invertida) en el nombre de archivo, almacenado en el repositorio de archivos. • http://crisp.cs.du.edu/?q=node/36 http://osvdb.org/40118 http://osvdb.org/40119 http://secunia.com/advisories/26625 http://secunia.com/advisories/26632 http://securitytracker.com/id?1018617 http://subversion.tigris.org/servlets/NewsItemView?newsItemID=1941 http://subversion.tigris.org/servlets/ReadMsg?list=users&msgNo=69413 http://tortoisesvn.net/node/291 http://www.securityfocus.com/bid/25468 http://www.vupen.com/english/advisories/2007/3003 http://www.vupen.com • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Subversion 1.4.3 and earlier does not properly implement the "partial access" privilege for users who have access to changed paths but not copied paths, which allows remote authenticated users to obtain sensitive information (revision properties) via svn (1) propget, (2) proplist, or (3) propedit. Subversion 1.4.3 y versiones anteriores no implementa apropiadamente el privilegio "acceso parcial" para usuarios que tienen acceso a rutas cambiadas pero no rutas copiadas, lo cual permite a usuarios remotos autenticados obtener información confidencial (propiedades de revisión) mediante svn (1) propget, (2) proplist, ó (3) propedit. • http://osvdb.org/36070 http://secunia.com/advisories/43139 http://securitytracker.com/id?1018237 http://subversion.tigris.org/security/CVE-2007-2448-advisory.txt http://www.securityfocus.com/bid/24463 http://www.ubuntu.com/usn/USN-1053-1 http://www.vupen.com/english/advisories/2007/2230 http://www.vupen.com/english/advisories/2011/0264 https://issues.rpath.com/browse/RPL-1896 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

The mod_authz_svn Apache module for Subversion 1.0.4-r1 and earlier allows remote authenticated users, with write access to the repository, to read unauthorized parts of the repository via the svn copy command. • http://securityreason.com/securityalert/60 http://securitytracker.com/id?1010779 http://svn.collab.net/repos/svn/tags/1.0.6/CHANGES http://www.gentoo.org/security/en/glsa/glsa-200407-20.xml http://www.securityfocus.com/bid/10800 https://exchange.xforce.ibmcloud.com/vulnerabilities/16803 •

CVSS: 5.0EPSS: 2%CPEs: 19EXPL: 0

The mod_authz_svn module in Subversion 1.0.7 and earlier does not properly restrict access to all metadata on unreadable paths, which could allow remote attackers to gain sensitive information via (1) svn log -v, (2) svn propget, or (3) svn blame, and other commands that follow renames. El módulo mod_authz_svn en Subversion 1.0.7 y anteriores no restringe adecuadamente el acceso a todos los metadatos en rutas ilegibles, lo que podría permitir a atacantes remotos ganar información sensible mediante (1) svn log -v, (2) svn propget, o (3) svn blame, y otras órdenes que siguen cambios de de nombre. • http://fedoranews.org/updates/FEDORA-2004-318.shtml http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt http://www.gentoo.org/security/en/glsa/glsa-200409-35.xml http://www.securityfocus.com/bid/11243 https://exchange.xforce.ibmcloud.com/vulnerabilities/17472 •

CVSS: 10.0EPSS: 31%CPEs: 7EXPL: 0

libsvn_ra_svn in Subversion 1.0.4 trusts the length field of (1) svn://, (2) svn+ssh://, and (3) other svn protocol URL strings, which allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via an integer overflow that leads to a heap-based buffer overflow. libsvn_ra_svn en Subversion 1.0.4 confía en el campo de longitud de (1) svn://, (2) svn+ssh://, y (3) otras cadenas de protocolo svn, lo que permite a atacantes remotos causar una denegación de servicio (consumición de memoria) y posiblemente ejecutar código de su elección mediante un desbordamiento de enteros que conduce a un desbordamiento basado en la pila. • http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt http://www.gentoo.org/security/en/glsa/glsa-200406-07.xml http://www.novell.com/linux/security/advisories/2004_18_subversion.html http://www.securityfocus.com/advisories/6847 http://www.securityfocus.com/archive/1/365836 http://www.securityfocus.com/bid/10519 https://bugzilla.fedora.us/show_bug.cgi?id=1748 https://exchange.xforce.ibmcloud.com/vulnerabilities/16396 •