Page 2 of 9 results (0.011 seconds)

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 2

In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems. • https://github.com/trustcves/CVE-2023-25263 http://stimulsoft.com https://cloud-trustit.spp.at/s/Db8ZfNq2WYiNCHa https://cves.at/posts/cve-2023-25263/writeup • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 9.8EPSS: 1%CPEs: 5EXPL: 1

Certain Stimulsoft GmbH products are affected by: Remote Code Execution. This affects Stimulsoft Designer (Desktop) 2023.1.4 and Stimulsoft Designer (Web) 2023.1.3 and Stimulsoft Viewer (Web) 2023.1.3. Access to the local file system is not prohibited in any way. Therefore, an attacker may include source code which reads or writes local directories and files. It is also possible for the attacker to prepare a report which has a variable that holds the gathered data and render it in the report. • https://github.com/trustcves/CVE-2023-25261 http://stimulsoft.com https://cloud-trustit.spp.at/s/Rskwb3jKXQQsJy2 https://cves.at/posts/cve-2023-25261/writeup •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0, when Compilation Mode is used, allows an attacker to execute arbitrary C# code on any machine that renders a report, including the application server or a user's local machine, as demonstrated by System.Diagnostics.Process.Start. Stimulsoft (también conocido como Stimulsoft Reports) 2013.1.1600.0, cuando se utiliza Compilation Mode, permite a un atacante ejecutar código C# arbitrario en cualquier máquina que genere un informe, incluido el servidor de aplicaciones o la máquina local de un usuario, como lo demuestra System.Diagnostics.Process.Start. • http://burninatorsec.blogspot.com/2022/04/library-rce-object-chaining-cve-2021.html • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 1

A Remote Code Execution vulnerability in Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0 allows an attacker to encode C# scripts as base-64 in the report XML file so that they will be compiled and executed on the server that processes this file. This can be used to fully compromise the server. Una vulnerabilidad de ejecución de código remota en Stimulsoft (también se conoce como Stimulsoft Reports) versiones 2013.1.1600.0, permite a un atacante codificar scripts C# como base-64 en el archivo XML del reporte para que sean compilados y ejecutados en el servidor que procesa este archivo. Esto puede ser utilizado para comprometer completamente el servidor. • http://burninatorsec.blogspot.com/2018/11/reporting-c-serialization-remote-code.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •