Описание
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 12 (включая)
cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*
Конфигурация 2Версия до 13.0.48 (включая)
cpe:2.3:a:ashlar:graphite:*:*:*:*:*:*:*:*
Конфигурация 3Версия до 12 (включая)
cpe:2.3:a:ashlar:xenon:*:*:*:*:*:*:*:*
Конфигурация 4Версия до 12 (включая)
cpe:2.3:a:ashlar:argon:*:*:*:*:*:*:*:*
Конфигурация 5Версия до 12 (включая)
cpe:2.3:a:ashlar:lithium:*:*:*:*:*:*:*:*
EPSS
Процентиль: 28%
0.00099
Низкий
7.8 High
CVSS3
Дефекты
CWE-787
CWE-787
Связанные уязвимости
CVSS3: 7.8
github
почти 2 года назад
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
EPSS
Процентиль: 28%
0.00099
Низкий
7.8 High
CVSS3
Дефекты
CWE-787
CWE-787