6 results (0.019 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. En Ashlar-Vellum Cobalt, Xenon, Argon, Lithium y Cobalt Share v12 SP0 Build (1204.77), las aplicaciones afectadas carecen de una validación adecuada de los datos proporcionados por el usuario al analizar archivos XE. Esto podría provocar una escritura fuera de los límites. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

In Ashlar-Vellum Graphite v13.0.48, the affected application lacks proper validation of user-supplied data when parsing VC6 files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. En Ashlar-Vellum Graphite v13.0.48, la aplicación afectada carece de una validación adecuada de los datos proporcionados por el usuario al analizar archivos VC6. Esto podría dar lugar a una lectura fuera de los límites. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. La función send_email en el archivo graphite-web/webapp/graphite/composer/views.py en Graphite versiones hasta 1.1.5 es susceptible a una vulnerabilidad de tipo SSRF. • https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html#second-bug-internal-graphite-ssrf https://github.com/graphite-project/graphite-web/issues/2008 https://github.com/graphite-project/graphite-web/pull/2499 https://github.com/graphite-project/graphite-web/security/advisories/GHSA-vfj6-275q-4pvm https://lists.debian.org/debian-lts-announce/2019/10/msg00030.html https://www.youtube.com/watch?v=ds4Gp4xoaeA • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Graphite before 0.9.11 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades XSS en Graphite anterior a v0.9.11 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a través de vectores no especificados. • http://secunia.com/advisories/54556 https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 1%CPEs: 6EXPL: 0

Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093. Graphite 0.9.5 hasta la versión 0.9.10 usa el módulo pickle en Python de forma insegura, lo que permite a atacantes remotos ejecutar código arbitrario a través de un objeto serializado manipulado, relacionado con (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, y (4) whitelist/views.py, una vulnerabilidad diferente a CVE-2013-5093. • http://secunia.com/advisories/54556 https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst • CWE-94: Improper Control of Generation of Code ('Code Injection') •