2 results (0.005 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

apt-cacher before 1.7.15 and apt-cacher-ng before 3.4 allow HTTP response splitting via encoded newline characters, related to lack of blocking for the %0[ad] regular expression. apt-cacher en versiones anteriores a 1.7.15 y apt-cacher-ng en versiones anteriores a 3.4 permiten división de respuestas HTTP a través de caracteres de nueva línea codificados, relacionados con la falta de bloqueo para la expresión regular de%0[ad] • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858739 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858833 • CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in job.cc in apt-cacher-ng 0.7.26 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. Vulnerabilidad de XSS en job.cc en apt-cacher-ng 0.7.26 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de una URL manipulada. • http://anonscm.debian.org/cgit/apt-cacher-ng/apt-cacher-ng.git/diff/?id=6f08e6a3995d1bed4e837889a3945b6dc650f6ad http://seclists.org/oss-sec/2014/q2/602 http://seclists.org/oss-sec/2014/q2/603 http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/net-misc/apt-cacher-ng/files/apt-cacher-ng-0.7.26-CVE-2014-4510.patch?view=markup http://www.securityfocus.com/bid/68136 https://bugzilla.redhat.com/show_bug.cgi?id=1111807 • CWE-352: Cross-Site Request Forgery (CSRF) •