6 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

26 Oct 2023 — In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. En Ashlar-Vellum Cobalt, Xenon, Argon, Lithium y Cobalt Share v12 SP0 Build (1204.77), las aplicaciones afectadas carecen de una validación adecuada de los datos proporcionad... • https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

26 Oct 2023 — In Ashlar-Vellum Graphite v13.0.48, the affected application lacks proper validation of user-supplied data when parsing VC6 files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. En Ashlar-Vellum Graphite v13.0.48, la aplicación afectada carece de una validación adecuada de los datos proporcionados por el usuario al analizar archivos VC6. Esto podría dar lugar a una lectura fuera de los límites. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 87%CPEs: 1EXPL: 2

11 Oct 2019 — send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. La función send_email en el archivo graphite-web/webapp/graphite/composer/views.py en Graphite versiones ... • https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html#second-bug-internal-graphite-ssrf • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.8EPSS: 1%CPEs: 6EXPL: 0

27 Sep 2013 — Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093. Graphite 0.9.5 hasta la versión 0.9.10 usa el módulo pickle en Python de forma insegura, lo que permite a atacantes remotos ejecutar código arbitrario a través de un objeto serializado manipulado, relaciona... • http://secunia.com/advisories/54556 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

27 Sep 2013 — Multiple cross-site scripting (XSS) vulnerabilities in Graphite before 0.9.11 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades XSS en Graphite anterior a v0.9.11 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a través de vectores no especificados. • http://secunia.com/advisories/54556 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 84%CPEs: 6EXPL: 7

21 Aug 2013 — The renderLocalView function in render/views.py in graphite-web in Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object. La función renderLocalView en render/views.py en graphite-web en Graphite v0.9.5 hasta v0.9.10 utiliza el módulo pickle de Python de forma insegura, lo que permite a atacantes remotos ejecutar código arbitrario a través de un objeto serializado manipulado. • https://packetstorm.news/files/id/122884 • CWE-94: Improper Control of Generation of Code ('Code Injection') •