3 results (0.011 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Instances of the Apollo Router running versions >=1.21.0 and < 1.52.1 are impacted by a denial of service vulnerability if _all_ of the following are true: 1. The Apollo Router has been configured to support [External Coprocessing](https://www.apollographql.com/docs/router/customizations/coprocessor). 2. The Apollo Router has been configured to send request bodies to coprocessors. This is a non-default configuration and must be configured intentionally by administrators. • https://github.com/apollographql/router/commit/7a9c020608a62dcaa306b72ed0f6980f15923b14 https://github.com/apollographql/router/releases/tag/v1.52.1 https://github.com/apollographql/router/security/advisories/GHSA-x6xq-whh3-gg32 https://www.apollographql.com/docs/router/configuration/overview/#request-limits https://www.apollographql.com/docs/router/customizations/coprocessor https://www.apollographql.com/docs/router/customizations/native • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The Apollo Router is a graph router written in Rust to run a federated supergraph that uses Apollo Federation. Versions 0.9.5 until 1.40.2 are subject to a Denial-of-Service (DoS) type vulnerability. When receiving compressed HTTP payloads, affected versions of the Router evaluate the `limits.http_max_request_bytes` configuration option after the entirety of the compressed payload is decompressed. If affected versions of the Router receive highly compressed payloads, this could result in significant memory consumption while the compressed payload is expanded. Router version 1.40.2 has a fix for the vulnerability. • https://github.com/apollographql/router/commit/9e9527c73c8f34fc8438b09066163cd42520f413 https://github.com/apollographql/router/security/advisories/GHSA-cgqf-3cq5-wvcj • CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Cisco routers 9.17 and earlier allow remote attackers to bypass security restrictions via certain IP source routed packets that should normally be denied using the "no ip source-route" command. • http://ciac.llnl.gov/ciac/bulletins/d-15.shtml http://www.cert.org/advisories/CA-1993-07.html https://exchange.xforce.ibmcloud.com/vulnerabilities/541 •