Page 9 of 45 results (0.015 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Subversion 1.4.3 and earlier does not properly implement the "partial access" privilege for users who have access to changed paths but not copied paths, which allows remote authenticated users to obtain sensitive information (revision properties) via svn (1) propget, (2) proplist, or (3) propedit. Subversion 1.4.3 y versiones anteriores no implementa apropiadamente el privilegio "acceso parcial" para usuarios que tienen acceso a rutas cambiadas pero no rutas copiadas, lo cual permite a usuarios remotos autenticados obtener información confidencial (propiedades de revisión) mediante svn (1) propget, (2) proplist, ó (3) propedit. • http://osvdb.org/36070 http://secunia.com/advisories/43139 http://securitytracker.com/id?1018237 http://subversion.tigris.org/security/CVE-2007-2448-advisory.txt http://www.securityfocus.com/bid/24463 http://www.ubuntu.com/usn/USN-1053-1 http://www.vupen.com/english/advisories/2007/2230 http://www.vupen.com/english/advisories/2011/0264 https://issues.rpath.com/browse/RPL-1896 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

The mod_authz_svn Apache module for Subversion 1.0.4-r1 and earlier allows remote authenticated users, with write access to the repository, to read unauthorized parts of the repository via the svn copy command. • http://securityreason.com/securityalert/60 http://securitytracker.com/id?1010779 http://svn.collab.net/repos/svn/tags/1.0.6/CHANGES http://www.gentoo.org/security/en/glsa/glsa-200407-20.xml http://www.securityfocus.com/bid/10800 https://exchange.xforce.ibmcloud.com/vulnerabilities/16803 •

CVSS: 5.0EPSS: 2%CPEs: 19EXPL: 0

The mod_authz_svn module in Subversion 1.0.7 and earlier does not properly restrict access to all metadata on unreadable paths, which could allow remote attackers to gain sensitive information via (1) svn log -v, (2) svn propget, or (3) svn blame, and other commands that follow renames. El módulo mod_authz_svn en Subversion 1.0.7 y anteriores no restringe adecuadamente el acceso a todos los metadatos en rutas ilegibles, lo que podría permitir a atacantes remotos ganar información sensible mediante (1) svn log -v, (2) svn propget, o (3) svn blame, y otras órdenes que siguen cambios de de nombre. • http://fedoranews.org/updates/FEDORA-2004-318.shtml http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt http://www.gentoo.org/security/en/glsa/glsa-200409-35.xml http://www.securityfocus.com/bid/11243 https://exchange.xforce.ibmcloud.com/vulnerabilities/17472 •

CVSS: 10.0EPSS: 31%CPEs: 7EXPL: 0

libsvn_ra_svn in Subversion 1.0.4 trusts the length field of (1) svn://, (2) svn+ssh://, and (3) other svn protocol URL strings, which allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via an integer overflow that leads to a heap-based buffer overflow. libsvn_ra_svn en Subversion 1.0.4 confía en el campo de longitud de (1) svn://, (2) svn+ssh://, y (3) otras cadenas de protocolo svn, lo que permite a atacantes remotos causar una denegación de servicio (consumición de memoria) y posiblemente ejecutar código de su elección mediante un desbordamiento de enteros que conduce a un desbordamiento basado en la pila. • http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt http://www.gentoo.org/security/en/glsa/glsa-200406-07.xml http://www.novell.com/linux/security/advisories/2004_18_subversion.html http://www.securityfocus.com/advisories/6847 http://www.securityfocus.com/archive/1/365836 http://www.securityfocus.com/bid/10519 https://bugzilla.fedora.us/show_bug.cgi?id=1748 https://exchange.xforce.ibmcloud.com/vulnerabilities/16396 •

CVSS: 7.5EPSS: 96%CPEs: 3EXPL: 4

Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and earlier allows remote attackers to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command. Desbordamiento basado en la pila durante la conversión de datos apr_time en Subversion 1.0.2 y anteriores permite a atacantes remotos ejecutar código arbitrairo mediante: (1) una consulta DAV2 REPORT o (2) una orden get-dated-rev svn-protocol • https://www.exploit-db.com/exploits/304 https://www.exploit-db.com/exploits/9935 https://www.exploit-db.com/exploits/16284 http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021737.html http://marc.info/?l=bugtraq&m=108498676517697&w=2 http://secunia.com/advisories/11642 http://secunia.com/advisories/11675 http://security.e-matters.de/advisories/082004.html http://subversion.tigris.org/svn-sscanf-advisory.txt http://www.gentoo.org/security/en/glsa/glsa-2004 •