Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu cvs vulnerabilities and exploits
(subscribe to this query)
454
VMScore
CVE-2017-12836
CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote malicious users to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
Gnu Cvs 1.12.12
Gnu Cvs 1.12.6
Gnu Cvs 1.12.3
Gnu Cvs 1.12.11
Gnu Cvs 1.12.10
Gnu Cvs 1.12.9
Gnu Cvs 1.12.7
Gnu Cvs 1.12.13
Gnu Cvs 1.12.5
Gnu Cvs 1.12.1
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Debian Debian Linux 9.0
Debian Debian Linux 8.0
445
VMScore
CVE-2004-0778
CVS 1.11.x prior to 1.11.17, and 1.12.x prior to 1.12.9, allows remote malicious users to determine the existence of arbitrary files and directories via the -X command for an alternate history file, which causes different error messages to be returned.
Gnu Cvs
445
VMScore
CVE-2004-1343
CVS 1.12 and previous versions on Debian GNU/Linux does not properly handle when a mapping for the current repository does not exist in the cvs-repouids file, which allows remote malicious users to cause a denial of service (server crash).
Cvs Cvs 1.10.7
Cvs Cvs 1.11
Cvs Cvs 1.11.16
Cvs Cvs 1.11.3
Cvs Cvs 1.11.1 P1
Cvs Cvs 1.11.10
Cvs Cvs 1.11.11
Cvs Cvs 1.11.14
Cvs Cvs 1.10
Cvs Cvs 1.10.6
Cvs Cvs 1.11.5
Cvs Cvs 1.11.6
Cvs Cvs 1.12
Cvs Cvs 1.10.8
Cvs Cvs 1.11.1
Cvs Cvs 1.11.15
Cvs Cvs 1.11.2
Cvs Cvs 1.11.4
668
VMScore
CVE-2004-1342
CVS 1.12 and previous versions on Debian GNU/Linux, when using the repouid patch, allows remote malicious users to bypass authentication via the pserver access method.
Cvs Cvs 1.11.1
Cvs Cvs 1.11.10
Cvs Cvs 1.11.4
Cvs Cvs 1.11.6
Cvs Cvs 1.11.14
Cvs Cvs 1.11.15
Cvs Cvs 1.11.16
Cvs Cvs 1.11.2
Cvs Cvs 1.10
Cvs Cvs 1.10.6
Cvs Cvs 1.10.7
Cvs Cvs 1.10.8
Cvs Cvs 1.12
Cvs Cvs 1.11
Cvs Cvs 1.11.1 P1
Cvs Cvs 1.11.11
Cvs Cvs 1.11.3
Cvs Cvs 1.11.5
668
VMScore
CVE-2006-1320
util.c in rssh 2.3.0 in Debian GNU/Linux does not use braces to make a block, which causes a check for CVS to always succeed and allows rsync and rdist to bypass intended access restrictions in rssh.conf.
Rssh Rssh 2.3.0
409
VMScore
CVE-2003-0440
The (1) semi MIME library 1.14.5 and previous versions, and (2) wemi 1.14.0 and possibly other versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
Semi Semi 1.14.3
Debian Debian Linux 3.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started