3 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

15 Jan 2025 — In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS. En Genivia gSOAP con una configuración específica, un atacante remoto no autenticado puede generar una alta carga de CPU al forzar el análisis de un XML que tiene atributos de identificación duplicados, lo que puede conducir a un DoS. • https://sourceforge.net/p/gsoap2/code/HEAD/tree/changelog.md • CWE-834: Excessive Iteration •

CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 0

09 Feb 2019 — Genivia gSOAP 2.7.x and 2.8.x before 2.8.75 allows attackers to cause a denial of service (application abort) or possibly have unspecified other impact if a server application is built with the -DWITH_COOKIES flag. This affects the C/C++ libgsoapck/libgsoapck++ and libgsoapssl/libgsoapssl++ libraries, as these are built with that flag. Genivia gSOAP, en versiones 2.7.x y versiones 2.8.x anteriores a la 2.8.75, permite que los atacantes provoquen una denegación de servicio (aborto de la aplicación) u otro im... • https://lists.debian.org/debian-lts-announce/2019/02/msg00027.html • CWE-787: Out-of-bounds Write •

CVSS: 8.1EPSS: 38%CPEs: 66EXPL: 1

20 Jul 2017 — Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general-purpose computers. Desbordamiento de enteros en la función soap_get en Genivia gSOAP, en versiones 2.7.x y 2.8.... • http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions • CWE-190: Integer Overflow or Wraparound •