14 results (0.034 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

scripts/licensecheck.pl in devscripts before 2.15.7 allows local users to execute arbitrary shell commands. scripts/licensecheck.pl en devscripts en versiones anteriores a la 2.15.7 permite que los usuarios locales ejecuten comandos shell arbitrarios. • http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163705.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163710.html http://www.openwall.com/lists/oss-security/2015/08/01/7 http://www.securityfocus.com/bid/76143 https://anonscm.debian.org/cgit/collab-maint/devscripts.git/commit/?id=c0687bcde23108dd42e146573c368b6905e6b8e8 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794260 https://bugzilla.redhat.com/show_bug.cgi?id=1249635 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Argument injection vulnerability in devscripts before 2.15.7 allows remote attackers to write to arbitrary files via a crafted symlink and crafted filename. Una vulnerabilidad de inyección de argumentos en versiones anteriores a la 2.15.7 de devscripts permite a atacantes escribir en archivos arbitrarios utilizando un enlace simbólico y un nombre de archivo manipulados. • http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163705.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163710.html http://www.openwall.com/lists/oss-security/2015/08/01/7 https://anonscm.debian.org/cgit/collab-maint/devscripts.git/commit/?id=d8f8fa1d8e4151fa62997cb74403f97ab0d7e1a2 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794260 https://bugzilla.redhat.com/show_bug.cgi?id=1249645 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Directory traversal vulnerability in uupdate in devscripts 2.14.1 allows remote attackers to modify arbitrary files via a crafted .orig.tar file, related to a symlink. Vulnerabilidad de salto de directorio en uupdate en Devscripts 2.14.1 permite a atacantes remotos modificar archivos arbitrarios a través de un archivo .orig.tar manipulado, relacionado a un symlink. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737160 http://osvdb.org/102748 http://www.openwall.com/lists/oss-security/2014/01/31/11 http://www.openwall.com/lists/oss-security/2014/01/31/7 http://www.securityfocus.com/bid/65260 http://www.ubuntu.com/usn/USN-2649-1 https://bugzilla.redhat.com/show_bug.cgi?id=1059947 https://exchange.xforce.ibmcloud.com/vulnerabilities/90842 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 10%CPEs: 9EXPL: 0

Uscan in devscripts before 2.13.9 allows remote attackers to execute arbitrary code via a crafted tarball. Uscan en devscripts anteriores a 2.13.9 permite a atacantes remotos ejecutar código arbitrario a través de un tarball manipulado. • http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git%3Ba=commitdiff%3Bh=02c6850d973e3e1246fde72edab27f03d63acc52 http://marc.info/?l=oss-security&m=138900586911271&w=2 http://secunia.com/advisories/56192 http://secunia.com/advisories/56579 http://www.debian.org/security/2014/dsa-2836 http://www.securityfocus.com/bid/64656 http://www.ubuntu.com/usn/USN-2084-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/90107 •

CVSS: 5.8EPSS: 2%CPEs: 1EXPL: 1

Uscan in devscripts 2.13.5, when USCAN_EXCLUSION is enabled, allows remote attackers to delete arbitrary files via a whitespace character in a filename. Uscan en devscripts 2.13.5, cuando se activa USCAN_EXCLUSION, permite a atacantes remotos eliminar archivos arbitrarios a través de un caracter de espacio en blanco en un nombre de archivo. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732006 http://osvdb.org/100917 http://www.openwall.com/lists/oss-security/2013/12/12/9 http://www.openwall.com/lists/oss-security/2013/12/13/2 http://www.securityfocus.com/bid/64258 https://exchange.xforce.ibmcloud.com/vulnerabilities/89669 • CWE-20: Improper Input Validation •