WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
Max CVSS
10.0
EPSS Score
95.63%
Published
2021-05-18
Updated
2022-01-01
Cross-site scripting (XSS) vulnerability in WebSVN 2.3.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the path parameter to log.php.
Max CVSS
6.1
EPSS Score
0.29%
Published
2016-04-07
Updated
2016-12-03
Multiple cross-site scripting (XSS) vulnerabilities in (1) revision.php, (2) log.php, (3) listing.php, and (4) comp.php in WebSVN allow context-dependent attackers to inject arbitrary web script or HTML via the name of a (a) file or (b) directory in a repository.
Max CVSS
6.1
EPSS Score
0.19%
Published
2016-05-11
Updated
2016-05-16
WebSVN 2.3.3 allows remote authenticated users to read arbitrary files via a symlink attack in a commit.
Max CVSS
3.5
EPSS Score
0.17%
Published
2015-01-21
Updated
2016-08-26
Cross-site scripting (XSS) vulnerability in the getLog function in svnlook.php in WebSVN before 2.3.1 allows remote attackers to inject arbitrary web script or HTML via the path parameter to (1) comp.php, (2) diff.php, or (3) revision.php.
Max CVSS
4.3
EPSS Score
0.34%
Published
2012-10-25
Updated
2017-08-29
A flaw was found in WebSVN 2.3.2. Without prior authentication, if the 'allowDownload' option is enabled in config.php, an attacker can invoke the dl.php script and pass a well formed 'path' argument to execute arbitrary commands against the underlying operating system.
Max CVSS
9.8
EPSS Score
0.29%
Published
2021-10-26
Updated
2021-10-29
Cross-site scripting (XSS) vulnerability in filedetails.php in WebSVN 2.0rc4, and possibly earlier, allows remote attackers to inject arbitrary web script or HTML via the path parameter.
Max CVSS
4.3
EPSS Score
2.01%
Published
2007-06-06
Updated
2017-07-29
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!