3 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web). • https://github.com/trustcves/CVE-2023-25262 http://stimulsoft.com https://cloud-trustit.spp.at/s/HjEksN86SfsMaJM https://cves.at/posts/cve-2023-25262/writeup • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion. • https://github.com/trustcves/CVE-2023-25260 http://stimulsoft.com https://cloud-trustit.spp.at/s/K9ZXWzEmftaxa3C https://cves.at/posts/cve-2023-25260/writeup •

CVSS: 9.8EPSS: 1%CPEs: 5EXPL: 1

Certain Stimulsoft GmbH products are affected by: Remote Code Execution. This affects Stimulsoft Designer (Desktop) 2023.1.4 and Stimulsoft Designer (Web) 2023.1.3 and Stimulsoft Viewer (Web) 2023.1.3. Access to the local file system is not prohibited in any way. Therefore, an attacker may include source code which reads or writes local directories and files. It is also possible for the attacker to prepare a report which has a variable that holds the gathered data and render it in the report. • https://github.com/trustcves/CVE-2023-25261 http://stimulsoft.com https://cloud-trustit.spp.at/s/Rskwb3jKXQQsJy2 https://cves.at/posts/cve-2023-25261/writeup •