2 results (0.008 seconds)

CVSS: 7.5EPSS: 71%CPEs: 1EXPL: 1

Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname. desbordamiento de búfer basado en pila en la función process_path en gmetad/server.c en Ganglia v3.1.1 permite a atacantes remotos provocar una denegación de servicio (caida) a través de un petición al servicio gmetad con un nombre de ruta largo. • https://www.exploit-db.com/exploits/32726 http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223 http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html http://secunia.com/advisories/33506 http://secunia.com/advisories/34228 http://secunia.com/advisories/35416 http://security.gentoo.org/glsa/glsa-200903-22.xml http://www.mail-archive.com/ganglia-developers%40lists.sourceforge.net/msg04929.html http://www.securityfocus.com/bid/33299 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in ganglia-web in Ganglia before 3.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) c and (2) h parameters to (a) web/host_gmetrics.php; the (3) G, (4) me, (5) x, (6) n, (7) v, (8) l, (9) vl, and (10) st parameters to (b) web/graph.php; and the (11) c, (12) G, (13) h, (14) r, (15) m, (16) s, (17) cr, (18) hc, (19) sh, (20) p, (21) t, (22) jr, (23) js, (24) gw, (25) z, and (26) gs parameters to (c) web/get_context.php. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en ganglia-web de Ganglia anterior a 3.0.6 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de los parámetros (1) c y (2) h de (a) web/host_gmetrics.php; los parámetros (3) G, (4) me, (5) x, (6) n, (7) v, (8) l, (9) vl, y (10) st de (b) web/graph.php;y los parámetros (11) c, (12) G, (13) h, (14) r, (15) m, (16) s, (17) cr, (18) hc, (19) sh, (20) p, (21) t, (22) jr, (23) js, (24) gw, (25) z, y (26) gs de (c) web/get_context.php. NOTA: algunos de estos detalles se han obtenido de información de terceros. • http://secunia.com/advisories/28116 http://sourceforge.net/project/shownotes.php?release_id=562168 http://www.osvdb.org/39515 http://www.osvdb.org/39516 http://www.osvdb.org/39517 http://www.securityfocus.com/bid/26895 http://www.vupen.com/english/advisories/2007/4250 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •