Page 40 of 294 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Mismanaged state in GRPCWebToHTTP2ServerCodec.swift in gRPC Swift 1.1.0 and 1.1.1 allows remote attackers to deny service by sending malformed requests. Un estado administrado inapropiadamente en el archivo GRPCWebToHTTP2ServerCodec.swift en gRPC Swift versiones 1.1.0 y 1.1.1, permite a atacantes remotos denegar el servicio mediante el envío de peticiones malformadas • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35267 https://github.com/grpc/grpc-swift/releases https://github.com/grpc/grpc-swift/security/advisories/GHSA-2jx2-qcm4-rf9h •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

LengthPrefixedMessageReader in gRPC Swift 1.1.0 and earlier allocates buffers of arbitrary length, which allows remote attackers to cause uncontrolled resource consumption and deny service. La función LengthPrefixedMessageReader en gRPC Swift versiones 1.1.0 y anteriores asigna búferes de longitud arbitraria, lo que permite a atacantes remotos causar un consumo no controlado de recursos y denegar el servicio • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35303 https://github.com/grpc/grpc-swift/releases https://github.com/grpc/grpc-swift/security/advisories/GHSA-rxmj-hg9v-vp3p • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

HTTP2ToRawGRPCServerCodec in gRPC Swift 1.1.1 and earlier allows remote attackers to deny service via the delivery of many small messages within a single HTTP/2 frame, leading to Uncontrolled Recursion and stack consumption. La función HTTP2ToRawGRPCServerCodec en gRPC Swift versiones 1.1.1 y anteriores, permite a atacantes remotos denegar el servicio por medio de la entrega de muchos mensajes pequeños dentro de una sola trama HTTP/2, conllevando a una Recursión no controlada y un consumo de la pila • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35274 https://github.com/grpc/grpc-swift/releases https://github.com/grpc/grpc-swift/security/advisories/GHSA-4rhq-vq24-88gw • CWE-674: Uncontrolled Recursion •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In `@backstage/techdocs-common` versions prior to 0.6.3, a malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`. • https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208 https://github.com/backstage/backstage/releases/tag/release-2021-05-27 https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

Backstage is an open platform for building developer portals. In versions of Backstage's Techdocs Plugin (`@backstage/plugin-techdocs`) prior to 0.9.5, a malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`. • https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c https://github.com/backstage/backstage/releases/tag/release-2021-06-03 https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-434: Unrestricted Upload of File with Dangerous Type •