Datasets:

id
stringlengths
13
16
published
stringlengths
19
19
modified
timestamp[ns]
details
stringlengths
30
3.87k
severity
listlengths
1
1
repo_url
stringlengths
23
68
cwes
listlengths
0
1
commits
listlengths
1
4
CVE-2020-36372
2021-05-28T21:15:08
2025-01-14T08:46:06.523732
Stack overflow vulnerability in parse_plus_minus Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2020-36367
2021-05-28T21:15:08
2025-01-14T08:46:06.473243
Stack overflow vulnerability in parse_block Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2020-36375
2021-05-28T21:15:08
2025-01-14T08:46:07.272948
Stack overflow vulnerability in parse_equality Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46509
2022-01-27T21:15:09
2025-01-14T10:04:47.994826
Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46525
2022-01-27T21:15:10
2025-01-14T10:04:50.495290
Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46516
2022-01-27T21:15:09
2025-01-14T10:04:49.452999
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_stack_size at mjs/src/mjs_core.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46553
2022-01-27T21:15:11
2025-01-14T10:04:53.664123
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_set_internal at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46545
2022-01-27T21:15:10
2025-01-14T10:04:53.797432
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x4b44b. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46548
2022-01-27T21:15:11
2025-01-14T10:04:53.555439
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via add_lineno_map_item at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46511
2022-01-27T21:15:09
2025-01-14T10:04:48.753651
There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46554
2022-01-27T21:15:11
2025-01-14T10:04:54.064034
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_json_stringify at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46537
2022-01-27T21:15:10
2025-01-14T10:04:52.029837
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x9a30e. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46543
2022-01-27T21:15:10
2025-01-14T10:04:53.476011
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x18e810. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46541
2022-01-27T21:15:10
2025-01-14T10:04:52.669086
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c6ae. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46556
2022-01-27T21:15:11
2025-01-14T10:04:54.619540
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_bcode_insert_offset at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46523
2022-01-27T21:15:10
2025-01-14T10:04:50.671013
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46517
2022-01-27T21:15:09
2025-01-14T10:04:49.908780
There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46522
2022-01-27T21:15:10
2025-01-14T10:04:50.789659
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46538
2022-01-27T21:15:10
2025-01-14T10:04:51.468364
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_compact_strings at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46529
2022-01-27T21:15:10
2025-01-14T10:04:51.362836
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8814e. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46513
2022-01-27T21:15:09
2025-01-14T10:04:47.575879
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46520
2022-01-27T21:15:09
2025-01-14T10:04:50.488639
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46535
2022-01-27T21:15:10
2025-01-14T10:04:52.415032
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0xe533e. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46508
2022-01-27T21:15:09
2025-01-14T10:04:48.791111
There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46542
2022-01-27T21:15:10
2025-01-14T10:04:51.578534
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_print at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46518
2022-01-27T21:15:09
2025-01-14T10:04:49.062052
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46547
2022-01-27T21:15:11
2025-01-14T10:04:54.110505
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c17e. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46528
2022-01-27T21:15:10
2025-01-14T10:04:50.908319
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x5361e. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46532
2022-01-27T21:15:10
2025-01-14T10:04:51.831241
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via exec_expr at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46531
2022-01-27T21:15:10
2025-01-14T10:04:52.405588
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8d28e. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46521
2022-01-27T21:15:09
2025-01-14T10:04:50.666617
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46544
2022-01-27T21:15:10
2025-01-14T10:04:53.525757
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x59e19. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46510
2022-01-27T21:15:09
2025-01-14T10:04:47.750865
There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46512
2022-01-27T21:15:09
2025-01-14T10:04:49.248891
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_apply at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46519
2022-01-27T21:15:09
2025-01-14T10:04:50.426951
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46514
2022-01-27T21:15:09
2025-01-14T10:04:49.729863
There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46534
2022-01-27T21:15:10
2025-01-14T10:04:53.345315
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via getprop_builtin_foreign at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46527
2022-01-27T21:15:10
2025-01-14T10:04:50.402187
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46526
2022-01-27T21:15:10
2025-01-14T10:04:50.750087
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46539
2022-01-27T21:15:10
2025-01-14T10:04:52.558798
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x45a1f. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46540
2022-01-27T21:15:10
2025-01-14T10:04:51.621175
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_get_mjs at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46550
2022-01-27T21:15:11
2025-01-14T10:04:53.750223
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via free_json_frame at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46546
2022-01-27T21:15:10
2025-01-14T10:04:53.266898
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_next at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46549
2022-01-27T21:15:11
2025-01-14T10:04:53.426978
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via parse_cval_type at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46530
2022-01-27T21:15:10
2025-01-14T10:04:53.436235
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_execute at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46515
2022-01-27T21:15:09
2025-01-14T10:04:49.700449
There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-46524
2022-01-27T21:15:10
2025-01-14T10:04:50.806146
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33443
2022-07-26T13:15:08
2025-01-14T09:16:39.653537
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in mjs_execute() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33446
2022-07-26T13:15:08
2025-01-14T09:16:36.831095
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_next() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33437
2022-07-26T13:15:08
2025-01-14T09:16:32.677083
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There are memory leaks in frozen_cb() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33440
2022-07-26T13:15:08
2025-01-14T09:16:34.133447
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_commit() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33449
2022-07-26T13:15:09
2025-01-14T09:16:38.187810
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_part_get_by_offset() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33439
2022-07-26T13:15:08
2025-01-14T09:16:31.700220
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33442
2022-07-26T13:15:08
2025-01-14T09:16:39.493621
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in json_printf() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33448
2022-07-26T13:15:09
2025-01-14T09:16:39.422434
An issue was discovered in mjs(mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow at 0x7fffe9049390.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33445
2022-07-26T13:15:08
2025-01-14T09:16:36.469441
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_string_char_code_at() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33444
2022-07-26T13:15:08
2025-01-14T09:16:38.308559
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in getprop_builtin_foreign() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33441
2022-07-26T13:15:08
2025-01-14T09:16:35.496020
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in exec_expr() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33447
2022-07-26T13:15:09
2025-01-14T09:16:37.934389
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_print() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2021-33438
2022-07-26T13:15:08
2025-01-14T09:16:35.471264
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in json_parse_array() in mjs.c.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cesanta/mjs
[]
[ "2827bd00b59bdc176a010b22fc4acde9b580d6c2" ]
CVE-2024-36127
2024-06-03T15:15:09
2025-01-15T05:14:12.640349
apko is an apk-based OCI image builder. apko exposures HTTP basic auth credentials from repository and keyring URLs in log output. This vulnerability is fixed in v0.14.5.
null
https://github.com/chainguard-dev/apko
[]
[ "1781b2d946ac3b37647d87f28ab6c47a81d705a7" ]
CVE-2017-16762
2017-11-10T09:29:00
2025-01-14T07:07:47.791182
Sanic before 0.5.1 allows reading arbitrary files with directory traversal, as demonstrated by the /static/..%2f substring.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/channelcat/sanic
[]
[ "e5fdc7fdd08a29bab1f63f73816028033fdafdc3" ]
CVE-2023-47105
2024-09-18T17:15:18
2024-10-08T03:54:33.554557
exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.
null
https://github.com/chaosblade-io/chaosblade
[]
[ "176699f18bff9e4afdf43e8fb31d9dd79907ef5d" ]
CVE-2022-29180
2022-05-07T04:15:09
2025-01-15T02:19:59.266976
A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `cha...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/charmbracelet/charm
[]
[ "b7d991650ccde9b7d0e466c2aa2966b724217e23" ]
CVE-2024-41956
2024-08-01T22:15:29
2024-10-08T04:20:32.560687
Soft Serve is a self-hostable Git server for the command line. Prior to 0.7.5, it is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git. The issue is that Soft Serve passes all environment variables given by the client to git subp...
null
https://github.com/charmbracelet/soft-serve
[]
[ "9021825f7be1015bb278ce4df4d464830be9c6e7" ]
CVE-2023-43809
2023-10-04T21:15:10
2025-01-15T04:58:37.841405
Soft Serve is a self-hostable Git server for the command line. Prior to version 0.6.2, a security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public ke...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/charmbracelet/soft-serve
[]
[ "9021825f7be1015bb278ce4df4d464830be9c6e7" ]
CVE-2025-22130
2025-01-08T16:15:38
2025-01-15T05:17:22.033575
Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them p...
null
https://github.com/charmbracelet/soft-serve
[]
[ "9021825f7be1015bb278ce4df4d464830be9c6e7" ]
CVE-2023-40050
2023-10-31T15:15:09
2025-01-14T11:54:43.847142
Upload profile either through API or user interface in Chef Automate prior to and including version 4.10.29 using InSpec check command with maliciously crafted profile allows remote code execution.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/chef/automate
[]
[ "98981657948fc0a85a0d72556c8a6d447ca143d4" ]
CVE-2023-28864
2023-07-17T20:15:13
2025-01-14T11:38:59.452667
Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes creden...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/chef/chef-server
[]
[ "d55f1ceb0bc66348cbb3c50c16c9cf695e10a4a5" ]
CVE-2024-29862
2024-03-21T04:15:09
2025-01-15T05:11:46.019332
The Kerlink firewall in ChirpStack chirpstack-mqtt-forwarder before 4.2.1 and chirpstack-gateway-bridge before 4.0.11 wrongly accepts certain TCP packets when a connection is not in the ESTABLISHED state.
null
https://github.com/chirpstack/chirpstack-gateway-bridge
[]
[ "b5e6125844a89cf1ac11f639860aab6bbb0136f9" ]
CVE-2021-28954
2021-03-21T05:15:13
2025-01-14T09:04:08.359530
In Chris Walz bit before 1.0.5 on Windows, attackers can run arbitrary code via a .exe file in a crafted repository.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/chriswalz/bit
[]
[ "83f458c7d5955f113e7546932640855c0d9c914b" ]
CVE-2023-28114
2023-03-22T19:15:12
2025-01-15T04:49:32.013587
`cilium-cli` is the command line interface to install, manage, and troubleshoot Kubernetes clusters running Cilium. Prior to version 0.13.2,`cilium-cli`, when used to configure cluster mesh functionality, can remove the enforcement of user permissions on the `etcd` store used to mirror local cluster information to remo...
[ { "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/cilium/cilium-cli
[]
[ "34db9d12626abb316341c19f03c034206cce44bb" ]
CVE-2023-46254
2023-11-06T19:15:09
2025-01-15T04:59:49.817772
capsule-proxy is a reverse proxy for Capsule kubernetes multi-tenancy framework. A bug in the RoleBinding reflector used by `capsule-proxy` gives ServiceAccount tenant owners the right to list Namespaces of other tenants backed by the same owner kind and name. For example consider two tenants `solar` and `wind`. Tenant...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/clastix/capsule
[]
[ "1bbaebbc90ac159cb54f3b89790cfd4017a31ccc" ]
CVE-2022-46167
2022-12-02T19:15:11
2025-01-15T04:05:54.845221
Capsule is a multi-tenancy and policy-based framework for Kubernetes. Prior to version 0.1.3, a ServiceAccount deployed in a Tenant Namespace, when granted with `PATCH` capabilities on its own Namespace, is able to edit it and remove the Owner Reference, breaking the reconciliation of the Capsule Operator and removing ...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/clastix/capsule
[]
[ "1bbaebbc90ac159cb54f3b89790cfd4017a31ccc" ]
CVE-2023-48312
2023-11-24T18:15:07
2025-01-15T05:01:26.658337
capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disa...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/clastix/capsule-proxy
[]
[ "55a1cb1e56c1cc02f674223011fc86f599db34bc" ]
CVE-2022-23652
2022-02-22T20:15:07
2025-01-15T02:16:39.050911
capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for ...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/clastix/capsule-proxy
[]
[ "55a1cb1e56c1cc02f674223011fc86f599db34bc" ]
CVE-2024-42480
2024-08-12T16:15:15
2024-10-08T04:21:05.170693
Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an "open at the top" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/clastix/kamaji
[]
[ "d4d38c8eafef0879366dbd6240347ab627c5945a" ]
CVE-2022-26315
2022-02-28T19:15:12
2025-01-14T10:53:05.815856
qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/claudiodangelis/qrcp
[]
[ "b2293923e8acc33563c19604949628895998122b" ]
CVE-2021-41130
2021-10-07T19:15:08
2025-01-15T02:04:11.625098
Extensible Service Proxy, a.k.a. ESP is a proxy which enables API management capabilities for JSON/REST or gRPC API services. ESPv1 can be configured to authenticate a JWT token. Its verified JWT claim is passed to the application by HTTP header "X-Endpoint-API-UserInfo", the application can use it to do authorization....
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudendpoints/esp
[]
[ "c5c579cf15600661c37fbac84388738c386e7615" ]
CVE-2021-29994
2021-11-08T13:15:07
2025-01-14T09:08:01.366426
Cloudera Hue 4.6.0 allows XSS.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudera/hue
[]
[ "5326efbf509f39da41cf568fbaccb0fe2586d461" ]
CVE-2021-32481
2021-11-08T13:15:07
2025-01-14T09:14:24.390787
Cloudera Hue 4.6.0 allows XSS via the type parameter.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudera/hue
[]
[ "5326efbf509f39da41cf568fbaccb0fe2586d461" ]
CVE-2016-4946
2017-03-07T16:59:00
2025-01-14T06:37:39.162436
Multiple cross-site scripting (XSS) vulnerabilities in Cloudera HUE 3.9.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) First name or (2) Last name field in the HUE Users page.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudera/hue
[]
[ "5326efbf509f39da41cf568fbaccb0fe2586d461" ]
CVE-2016-4947
2017-03-07T16:59:00
2025-01-14T06:37:44.752934
Cloudera HUE 3.9.0 and earlier allows remote attackers to enumerate user accounts via a request to desktop/api/users/autocomplete.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudera/hue
[]
[ "5326efbf509f39da41cf568fbaccb0fe2586d461" ]
CVE-2024-28110
2024-03-06T22:15:57
2025-01-15T05:10:58.289573
Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is popula...
null
https://github.com/cloudevents/sdk-go
[]
[ "67e389964131d55d65cd14b4eb32d57a47312695" ]
CVE-2023-1732
2023-05-10T12:15:10
2025-01-14T11:21:10.343588
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enou...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudflare/circl
[]
[ "769d73f14c245a9a54a860640516c1b799a398d0" ]
CVE-2023-1314
2023-03-21T12:15:10
2025-01-14T11:20:05.950598
A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. This vulnerability exists because the MSI installer used by cloudflared relied on a world-writable...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudflare/cloudflared
[]
[ "20466dacb7e8428df93e9c5da1096e54daa0cd1c" ]
CVE-2020-24356
2020-10-02T15:15:12
2025-01-14T08:38:59.463916
`cloudflared` versions prior to 2020.8.1 contain a local privilege escalation vulnerability on Windows systems. When run on a Windows system, `cloudflared` searches for configuration files which could be abused by a malicious entity to execute commands as a privileged user. Version 2020.8.1 fixes this issue.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudflare/cloudflared
[]
[ "20466dacb7e8428df93e9c5da1096e54daa0cd1c" ]
CVE-2022-2529
2022-09-30T11:15:09
2025-01-14T10:52:11.762169
sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudflare/goflow
[]
[ "835a8829e3f7ba96b33acf6d2ea1bac23644d1be" ]
CVE-2018-15800
2018-12-10T19:29:25
2025-01-14T07:23:57.160431
Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage.
[ { "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry-incubator/bits-service-release
[]
[ "11f66fb1ee9cc511c882a877df2f9678e7b1af86" ]
CVE-2019-3786
2019-04-24T16:29:01
2025-01-14T07:59:44.967922
Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in th...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry-incubator/bosh-backup-and-restore
[]
[ "d723a8704da53e848283aab44fce9757c1feb5c7" ]
CVE-2019-3782
2019-02-13T16:29:00
2025-01-14T07:59:34.699502
Cloud Foundry CredHub CLI, versions prior to 2.2.1, inadvertently writes authentication credentials provided via environment variables to its persistent config file. A local authenticated malicious user with access to the CredHub CLI config file can use these credentials to retrieve and modify credentials stored in Cre...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry-incubator/credhub-cli
[]
[ "bfbb05b8c9539c80929b2d14a453c33b7f6f466b" ]
CVE-2019-3779
2019-03-08T16:29:00
2025-02-19T02:58:20.963754
Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability...
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry-incubator/kubo-release
[]
[ "413988c8a75a64ed2482d1c58666a1970284b6c4" ]
CVE-2019-3780
2019-03-08T16:29:00
2025-02-19T02:58:05.127668
Cloud Foundry Container Runtime, versions prior to 0.28.0, deploys K8s worker nodes that contains a configuration file with IAAS credentials. A malicious user with access to the k8s nodes can obtain IAAS credentials allowing the user to escalate privileges to gain access to the IAAS account.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry-incubator/kubo-release
[]
[ "413988c8a75a64ed2482d1c58666a1970284b6c4" ]
CVE-2019-3783
2019-03-07T18:29:00
2025-01-14T07:59:49.815456
Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry-incubator/stratos
[]
[ "b4fa724ebe0e1eea8178686d03ab1f013dd9f94c" ]
CVE-2019-3784
2019-03-07T18:29:00
2025-01-14T07:59:50.055828
Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote authenticated malicious user can switch sessions to another user with the same session id.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry-incubator/stratos
[]
[ "b4fa724ebe0e1eea8178686d03ab1f013dd9f94c" ]
CVE-2018-1231
2018-03-27T16:29:00
2025-01-14T07:22:15.395312
Cloud Foundry BOSH CLI, versions prior to v3.0.1, contains an improper access control vulnerability. A user with access to an instance using the BOSH CLI can access the BOSH CLI configuration file and use its contents to perform authenticated requests to BOSH.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry/bosh-cli
[]
[ "e94aeebdeed26c840d96c33a02126f523d7b226a" ]
CVE-2020-5422
2020-10-02T17:15:12
2025-01-14T08:47:34.909098
BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry/bosh-system-metrics-server-release
[]
[ "18f6dc0a995c90af3daad2070902280adf925894" ]
CVE-2023-34061
2024-01-12T07:15:11
2025-02-19T03:33:43.964602
Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry/cf-deployment
[]
[ "11822083b7d80dea7c1ff40e89812787c6d4fbe3", "1bf516e1fffd86002d92d1d8c016d541c9d7a95b", "1ef1fcda375fca5d7dc0cbbb9ba3d5de31efa83d", "36c1ff1a3fc4175c910aed00d423ea2edf457603" ]
CVE-2024-22279
2024-06-10T20:15:12
2025-02-19T03:37:00.610180
Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade the service availability of the Cloud Foundry deployment if performed at scale.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry/cf-deployment
[]
[ "e4caeeffdbc19d9db0e4eb10a5e109acf1017fe5" ]
CVE-2023-34041
2023-09-08T08:15:07
2025-02-19T03:33:43.527965
Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/cloudfoundry/cf-deployment
[]
[ "11822083b7d80dea7c1ff40e89812787c6d4fbe3", "1bf516e1fffd86002d92d1d8c016d541c9d7a95b", "1ef1fcda375fca5d7dc0cbbb9ba3d5de31efa83d", "36c1ff1a3fc4175c910aed00d423ea2edf457603" ]