{"id":"CVE-2023-46045","details":"Graphviz 2.36.0 through 9.x before 10.0.1 has an out-of-bounds read via a crafted config6a file. NOTE: exploitability may be uncommon because this file is typically owned by root.","modified":"2026-05-15T11:54:42.805319070Z","published":"2024-02-02T00:00:00Z","related":["CGA-jjfh-2g79-3r6x","SUSE-SU-2024:1351-1","SUSE-SU-2024:1351-2","openSUSE-SU-2024:13761-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46045.json","cna_assigner":"mitre"},"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/176816/graphviz-2.43.0-Buffer-Overflow-Code-Execution.html"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Jan/62"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Jan/73"},{"type":"WEB","url":"https://seclists.org/fulldisclosure/2024/Feb/24"},{"type":"WEB","url":"https://seclists.org/fulldisclosure/2024/Jan/73"},{"type":"WEB","url":"https://www.openwall.com/lists/oss-security/2024/02/01/2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46045.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46045"},{"type":"REPORT","url":"https://gitlab.com/graphviz/graphviz/-/issues/2441"},{"type":"ARTICLE","url":"http://seclists.org/fulldisclosure/2024/Feb/24"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}