3 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

27 Dec 2022 — Dragonfly is a Java runtime dependency management library. Dragonfly v0.3.0-SNAPSHOT does not configure DocumentBuilderFactory to prevent XML external entity (XXE) attacks. This issue is patched in 0.3.1-SNAPSHOT. As a workaround, since Dragonfly only parses XML `SNAPSHOT` versions are being resolved, this vulnerability may be avoided by not trying to resolve `SNAPSHOT` versions. Dragonfly es una librería de gestión de dependencias en tiempo de ejecución de Java. • https://github.com/HyperaDev/Dragonfly/commit/9661375e1135127ca6cdb5712e978bec33cc06b3 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 9.8EPSS: 92%CPEs: 1EXPL: 4

29 May 2021 — An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility. Una vulnerabilidad de inyección de argumentos en Dragonfly gem versiones anteriores a 1.4.0 para Ruby, permite a atacantes remotos leer y escribir en archivos arbitrarios... • https://github.com/mlr0p/CVE-2021-33564 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 2

31 Dec 2005 — The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running. • http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html •