3 results (0.003 seconds)

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

cobalt is a media downloader that doesn't piss you off. A malicious cobalt instance could serve links with the `javascript:` protocol, resulting in Cross-site Scripting (XSS) when the user tries to download an item from a picker. This issue has been present since commit `66bac03e`, was mitigated in commit `97977efa` (correctly configured web instances were no longer vulnerable) and fully fixed in commit `c4be1d3a` (included in release version 10.2.1). Users are advised to upgrade. Users unable to upgrade should enable a content-security-policy. cobalt es un descargador de medios que no te molesta. • https://github.com/imputnet/cobalt/commit/66bac03e3078e4e781d2d3903c05ad66a883a354 https://github.com/imputnet/cobalt/commit/97977efabd92375f270d1818f38de3b0682c2f19 https://github.com/imputnet/cobalt/commit/c4be1d3a37b0deb6b6087ec7a815262ac942daf1 https://github.com/imputnet/cobalt/security/advisories/GHSA-cm4c-v4cm-3735 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. En Ashlar-Vellum Cobalt, Xenon, Argon, Lithium y Cobalt Share v12 SP0 Build (1204.77), las aplicaciones afectadas carecen de una validación adecuada de los datos proporcionados por el usuario al analizar archivos XE. Esto podría provocar una escritura fuera de los límites. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in CoBaLT 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) urun.asp, (2) admin/bayi_listele.asp, (3) admin/urun_grup_listele.asp, and (4) admin/urun_listele.asp. Vulnerabilidad de inyección SQL en CoBaLT v1.0 permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro "id" de (1) urun.asp, (2) admin/bayi_listele.asp, (3) admin/urun_grup_listele.asp, y (4) admin/urun_listele.asp. • https://www.exploit-db.com/exploits/5373 https://exchange.xforce.ibmcloud.com/vulnerabilities/48835 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •