15 results (0.011 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

examples/framework/news/news3.py in Kiwi 1.9.22 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. examples/framework/news/news3.py en Kiwi 1.9.22 no valida cadenas antes de iniciar el programa especificado por la variable de entorno BROWSER. Esto podría permitir que atacantes remotos lleven a cabo ataques de inyección de argumentos mediante una URL manipulada. • https://security-tracker.debian.org/tracker/CVE-2017-17532 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

kiwi before 4.98.05, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in an image name. kiwi anterior a 4.98.05, utilizado en SUSE Studio Onsite 1.2 anterior a 1.2.1 y SUSE Studio Extension para System z 1.2 anterior a 1.2.1, permite a atacantes ejecutar comandos arbitrarios a través de metacaracteres de shell en un nombre de imagen. • http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00015.html http://www.openwall.com/lists/oss-security/2011/11/02/4 https://github.com/openSUSE/kiwi/commit/88bf491d16942766016c606e4210b4e072c1019f •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile." kiwi anterior a 4.85.1, utilizado en SUSE Studio Onsite 1.2 anterior a 1.2.1 y SUSE Studio Extension para System z 1.2 anterior a 1.2.1, permite a atacantes ejecutar comandos arbitrarios tal y como fue demostrado por "comillas dobles en kiwi_oemtitle de .profile." • http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00015.html •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown. kiwi anterior a 4.98.08, utilizado en SUSE Studio Onsite 1.2 anterior a 1.2.1 y SUSE Studio Extension para System z 1.2 anterior a 1.2.1, permite a atacantes ejecutar comandos arbitrarios a través de metacaracteres de shell en la ruta de un archivo superpuesto, relacionado con chown. • http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00015.html http://www.openwall.com/lists/oss-security/2011/11/02/4 https://github.com/openSUSE/kiwi/commit/f0f74b3f6ac6d47f7919aa9db380c0ad41ffe55f# •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in Kiwi before 3.74.2, as used in SUSE Studio 1.1 before 1.1.4, allows remote attackers to inject arbitrary web script or HTML via a crafted archive file list that is used in an overlay file. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados en Kiwi antes de v3.74.2, como se utiliza en SUSE Studio v1.1 antes de v1.1.4, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de una lista de archivos manipulados que se utiliza en un archivo de superposición. • http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00013.html http://support.novell.com/security/cve/CVE-2011-2652.html http://www.securityfocus.com/bid/49236 https://bugzilla.novell.com/show_bug.cgi?id=702320 https://exchange.xforce.ibmcloud.com/vulnerabilities/69287 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •