CVE-2023-39427 – Ashlar-Vellum Cobalt, Xenon, Argon, Lithium Out-of-bounds Write
https://notcve.org/view.php?id=CVE-2023-39427
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. En Ashlar-Vellum Cobalt, Xenon, Argon, Lithium y Cobalt Share v12 SP0 Build (1204.77), las aplicaciones afectadas carecen de una validación adecuada de los datos proporcionados por el usuario al analizar archivos XE. Esto podría provocar una escritura fuera de los límites. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03 • CWE-787: Out-of-bounds Write •
CVE-2023-39936 – Ashlar-Vellum Graphite Out-of-bounds Read
https://notcve.org/view.php?id=CVE-2023-39936
In Ashlar-Vellum Graphite v13.0.48, the affected application lacks proper validation of user-supplied data when parsing VC6 files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. En Ashlar-Vellum Graphite v13.0.48, la aplicación afectada carece de una validación adecuada de los datos proporcionados por el usuario al analizar archivos VC6. Esto podría dar lugar a una lectura fuera de los límites. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03 • CWE-125: Out-of-bounds Read •
CVE-2017-18638
https://notcve.org/view.php?id=CVE-2017-18638
send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. La función send_email en el archivo graphite-web/webapp/graphite/composer/views.py en Graphite versiones hasta 1.1.5 es susceptible a una vulnerabilidad de tipo SSRF. • https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html#second-bug-internal-graphite-ssrf https://github.com/graphite-project/graphite-web/issues/2008 https://github.com/graphite-project/graphite-web/pull/2499 https://github.com/graphite-project/graphite-web/security/advisories/GHSA-vfj6-275q-4pvm https://lists.debian.org/debian-lts-announce/2019/10/msg00030.html https://www.youtube.com/watch?v=ds4Gp4xoaeA • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2013-5943
https://notcve.org/view.php?id=CVE-2013-5943
Multiple cross-site scripting (XSS) vulnerabilities in Graphite before 0.9.11 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades XSS en Graphite anterior a v0.9.11 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a través de vectores no especificados. • http://secunia.com/advisories/54556 https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •