19 results (0.011 seconds)

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

29 Oct 2019 — Mercurial before 1.6.4 fails to verify the Common Name field of SSL certificates which allows remote attackers who acquire a certificate signed by a Certificate Authority to perform a man-in-the-middle attack. Mercurial versiones anteriores a 1.6.4, no puede comprobar el campo Common Name de los certificados SSL lo que permite a atacantes remotos que adquieren un certificado firmado por una Autoridad Certificada llevar a cabo un ataque de tipo man-in-the-middle. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598841 • CWE-295: Improper Certificate Validation •

CVSS: 5.9EPSS: 1%CPEs: 3EXPL: 0

22 Apr 2019 — A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to defeat Mercurial's path-checking logic and write files outside a repository. Se encontró un defecto en Mercurial, en versiones anteriores a la 4.9. Era posible utilizar enlaces simbólicos y subrepositorios para acabar con la lógica de comprobación de rutas de Mercurial y escribir archivos fuera de un repositorio. It was discovered that Mercurial mishandled symlinks in subrepositories. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3902 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

04 Oct 2018 — cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a malformed manifest entry. cext/manifest.c en Mercurial en versiones anteriores a la 4.7.2 tiene una lectura fuera de límites durante el análisis de una entrada manifest mal formada. It was discovered that Mercurial mishandled symlinks in subrepositories. An attacker could use this issue to write arbitrary files to the target’s filesystem. It was discovered that Mercurial incorrectly handled certain manifest files. An att... • https://www.mercurial-scm.org/repo/hg/rev/5405cb1a7901 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

06 Jul 2018 — The mpatch_apply function in mpatch.c in Mercurial before 4.6.1 incorrectly proceeds in cases where the fragment start is past the end of the original data, aka OVE-20180430-0004. La función mpatch_apply en mpatch.c en Mercurial en versiones anteriores a la 4.6.1 procede incorrectamente en casos en los que el inicio del fragmento está tras el final de los datos originales. Esto también se conoce como OVE-20180430-0004. Mercurial is a fast, lightweight source control management system designed for efficient ... • https://access.redhat.com/errata/RHSA-2019:2276 • CWE-20: Improper Input Validation CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

06 Jul 2018 — mpatch.c in Mercurial before 4.6.1 mishandles integer addition and subtraction, aka OVE-20180430-0002. mpatch.c en Mercurial en versiones anteriores a la 4.6.1 gestiona de manera incorrecta la suma y resta de enteros. Esto también se conoce como OVE-20180430-0002. Mercurial is a fast, lightweight source control management system designed for efficient handling of very large distributed projects. Issues addressed include a bypass vulnerability. • https://access.redhat.com/errata/RHSA-2019:2276 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

06 Jul 2018 — The mpatch_decode function in mpatch.c in Mercurial before 4.6.1 mishandles certain situations where there should be at least 12 bytes remaining after the current position in the patch data, but actually are not, aka OVE-20180430-0001. La función mpatch_decode en mpatch.c en Mercurial en versiones anteriores a la 4.6.1 gestiona de manera incorrecta ciertas situaciones en las que debería haber, al menos, 12 bytes sobrantes tras la posición actual en los datos del parche, pero en realidad no los hay. Esto tam... • https://lists.debian.org/debian-lts-announce/2020/07/msg00032.html • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

14 Mar 2018 — Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1. Mercurial, en versiones 4.5 y anteriores, contiene una vulnerabilidad de control de acceso incorrecto (CWE-285) en el servidor de protocolo que puede resultar en el acceso a datos sin autorización. Este ataque parece ser explotable med... • https://access.redhat.com/errata/RHSA-2019:2276 • CWE-20: Improper Input Validation CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 10.0EPSS: 18%CPEs: 3EXPL: 0

07 Dec 2017 — In Mercurial before 4.4.1, it is possible that a specially malformed repository can cause Git subrepositories to run arbitrary code in the form of a .git/hooks/post-update script checked into the repository. Typical use of Mercurial prevents construction of such repositories, but they can be created programmatically. En Mercurial, en versiones anteriores a la 4.4.1, es posible que un repositorio especialmente mal formado provoque que los subrepositorios Git ejecuten código arbitrario en la forma de un scrip... • http://www.securityfocus.com/bid/102926 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.5EPSS: 2%CPEs: 13EXPL: 0

11 Aug 2017 — Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository Las versiones anteriores a la 4.3 de Mercurial son vulnerables a una falta de comprobación de symlink. Los repositorios maliciosos pueden aprovecharse de esto para modificar archivos fuera del repositorio. A vulnerability was found in the way Mercurial handles path auditing and caches the results. An attacker could abuse a repository with a series of commits mixing s... • http://www.debian.org/security/2017/dsa-3963 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 10.0EPSS: 3%CPEs: 13EXPL: 0

11 Aug 2017 — Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks. Las versiones anteriores a la 4.3 de Mercurial no sanitizaban adecuadamente los nombres de host pasados a ssh, lo que conducía a posibles ataques de inyección de shell. A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Mercurial. This can be exploited to execute shell commands with the privileges of the user running the Mercurial client, for examp... • http://www.debian.org/security/2017/dsa-3963 • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •