id stringlengths 13 16 | published stringlengths 19 19 | modified timestamp[ns] | details stringlengths 30 3.87k | severity listlengths 1 1 ⌀ | repo_url stringlengths 23 68 | cwes listlengths 0 1 | commits listlengths 1 4 |
|---|---|---|---|---|---|---|---|
CVE-2020-36372 | 2021-05-28T21:15:08 | 2025-01-14T08:46:06.523732 | Stack overflow vulnerability in parse_plus_minus Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2020-36367 | 2021-05-28T21:15:08 | 2025-01-14T08:46:06.473243 | Stack overflow vulnerability in parse_block Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2020-36375 | 2021-05-28T21:15:08 | 2025-01-14T08:46:07.272948 | Stack overflow vulnerability in parse_equality Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46509 | 2022-01-27T21:15:09 | 2025-01-14T10:04:47.994826 | Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46525 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.495290 | Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46516 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.452999 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_stack_size at mjs/src/mjs_core.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46553 | 2022-01-27T21:15:11 | 2025-01-14T10:04:53.664123 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_set_internal at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46545 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.797432 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x4b44b. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46548 | 2022-01-27T21:15:11 | 2025-01-14T10:04:53.555439 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via add_lineno_map_item at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46511 | 2022-01-27T21:15:09 | 2025-01-14T10:04:48.753651 | There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46554 | 2022-01-27T21:15:11 | 2025-01-14T10:04:54.064034 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_json_stringify at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46537 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.029837 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x9a30e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46543 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.476011 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x18e810. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46541 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.669086 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c6ae. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46556 | 2022-01-27T21:15:11 | 2025-01-14T10:04:54.619540 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_bcode_insert_offset at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46523 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.671013 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46517 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.908780 | There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46522 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.789659 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46538 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.468364 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_compact_strings at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46529 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.362836 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8814e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46513 | 2022-01-27T21:15:09 | 2025-01-14T10:04:47.575879 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46520 | 2022-01-27T21:15:09 | 2025-01-14T10:04:50.488639 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46535 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.415032 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0xe533e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46508 | 2022-01-27T21:15:09 | 2025-01-14T10:04:48.791111 | There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46542 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.578534 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_print at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46518 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.062052 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46547 | 2022-01-27T21:15:11 | 2025-01-14T10:04:54.110505 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c17e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46528 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.908319 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x5361e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46532 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.831241 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via exec_expr at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46531 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.405588 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8d28e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46521 | 2022-01-27T21:15:09 | 2025-01-14T10:04:50.666617 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46544 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.525757 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x59e19. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46510 | 2022-01-27T21:15:09 | 2025-01-14T10:04:47.750865 | There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46512 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.248891 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_apply at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46519 | 2022-01-27T21:15:09 | 2025-01-14T10:04:50.426951 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46514 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.729863 | There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46534 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.345315 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via getprop_builtin_foreign at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46527 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.402187 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46526 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.750087 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46539 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.558798 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x45a1f. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46540 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.621175 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_get_mjs at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46550 | 2022-01-27T21:15:11 | 2025-01-14T10:04:53.750223 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via free_json_frame at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46546 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.266898 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_next at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46549 | 2022-01-27T21:15:11 | 2025-01-14T10:04:53.426978 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via parse_cval_type at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46530 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.436235 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_execute at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46515 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.700449 | There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46524 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.806146 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33443 | 2022-07-26T13:15:08 | 2025-01-14T09:16:39.653537 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in mjs_execute() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33446 | 2022-07-26T13:15:08 | 2025-01-14T09:16:36.831095 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_next() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33437 | 2022-07-26T13:15:08 | 2025-01-14T09:16:32.677083 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There are memory leaks in frozen_cb() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33440 | 2022-07-26T13:15:08 | 2025-01-14T09:16:34.133447 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_commit() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33449 | 2022-07-26T13:15:09 | 2025-01-14T09:16:38.187810 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_part_get_by_offset() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33439 | 2022-07-26T13:15:08 | 2025-01-14T09:16:31.700220 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33442 | 2022-07-26T13:15:08 | 2025-01-14T09:16:39.493621 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in json_printf() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33448 | 2022-07-26T13:15:09 | 2025-01-14T09:16:39.422434 | An issue was discovered in mjs(mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow at 0x7fffe9049390. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33445 | 2022-07-26T13:15:08 | 2025-01-14T09:16:36.469441 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_string_char_code_at() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33444 | 2022-07-26T13:15:08 | 2025-01-14T09:16:38.308559 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in getprop_builtin_foreign() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33441 | 2022-07-26T13:15:08 | 2025-01-14T09:16:35.496020 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in exec_expr() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33447 | 2022-07-26T13:15:09 | 2025-01-14T09:16:37.934389 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_print() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33438 | 2022-07-26T13:15:08 | 2025-01-14T09:16:35.471264 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in json_parse_array() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2024-36127 | 2024-06-03T15:15:09 | 2025-01-15T05:14:12.640349 | apko is an apk-based OCI image builder. apko exposures HTTP basic auth credentials from repository and keyring URLs in log output. This vulnerability is fixed in v0.14.5. | null | https://github.com/chainguard-dev/apko | [] | [
"1781b2d946ac3b37647d87f28ab6c47a81d705a7"
] |
CVE-2017-16762 | 2017-11-10T09:29:00 | 2025-01-14T07:07:47.791182 | Sanic before 0.5.1 allows reading arbitrary files with directory traversal, as demonstrated by the /static/..%2f substring. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/channelcat/sanic | [] | [
"e5fdc7fdd08a29bab1f63f73816028033fdafdc3"
] |
CVE-2023-47105 | 2024-09-18T17:15:18 | 2024-10-08T03:54:33.554557 | exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication. | null | https://github.com/chaosblade-io/chaosblade | [] | [
"176699f18bff9e4afdf43e8fb31d9dd79907ef5d"
] |
CVE-2022-29180 | 2022-05-07T04:15:09 | 2025-01-15T02:19:59.266976 | A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `cha... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/charmbracelet/charm | [] | [
"b7d991650ccde9b7d0e466c2aa2966b724217e23"
] |
CVE-2024-41956 | 2024-08-01T22:15:29 | 2024-10-08T04:20:32.560687 | Soft Serve is a self-hostable Git server for the command line. Prior to 0.7.5, it is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git. The issue is that Soft Serve passes all environment variables given by the client to git subp... | null | https://github.com/charmbracelet/soft-serve | [] | [
"9021825f7be1015bb278ce4df4d464830be9c6e7"
] |
CVE-2023-43809 | 2023-10-04T21:15:10 | 2025-01-15T04:58:37.841405 | Soft Serve is a self-hostable Git server for the command line. Prior to version 0.6.2, a security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public ke... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/charmbracelet/soft-serve | [] | [
"9021825f7be1015bb278ce4df4d464830be9c6e7"
] |
CVE-2025-22130 | 2025-01-08T16:15:38 | 2025-01-15T05:17:22.033575 | Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them p... | null | https://github.com/charmbracelet/soft-serve | [] | [
"9021825f7be1015bb278ce4df4d464830be9c6e7"
] |
CVE-2023-40050 | 2023-10-31T15:15:09 | 2025-01-14T11:54:43.847142 | Upload profile either
through API or user interface in Chef Automate prior to and including version 4.10.29 using InSpec
check command with maliciously crafted profile allows remote code execution.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/chef/automate | [] | [
"98981657948fc0a85a0d72556c8a6d447ca143d4"
] |
CVE-2023-28864 | 2023-07-17T20:15:13 | 2025-01-14T11:38:59.452667 | Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes creden... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/chef/chef-server | [] | [
"d55f1ceb0bc66348cbb3c50c16c9cf695e10a4a5"
] |
CVE-2024-29862 | 2024-03-21T04:15:09 | 2025-01-15T05:11:46.019332 | The Kerlink firewall in ChirpStack chirpstack-mqtt-forwarder before 4.2.1 and chirpstack-gateway-bridge before 4.0.11 wrongly accepts certain TCP packets when a connection is not in the ESTABLISHED state. | null | https://github.com/chirpstack/chirpstack-gateway-bridge | [] | [
"b5e6125844a89cf1ac11f639860aab6bbb0136f9"
] |
CVE-2021-28954 | 2021-03-21T05:15:13 | 2025-01-14T09:04:08.359530 | In Chris Walz bit before 1.0.5 on Windows, attackers can run arbitrary code via a .exe file in a crafted repository. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/chriswalz/bit | [] | [
"83f458c7d5955f113e7546932640855c0d9c914b"
] |
CVE-2023-28114 | 2023-03-22T19:15:12 | 2025-01-15T04:49:32.013587 | `cilium-cli` is the command line interface to install, manage, and troubleshoot Kubernetes clusters running Cilium. Prior to version 0.13.2,`cilium-cli`, when used to configure cluster mesh functionality, can remove the enforcement of user permissions on the `etcd` store used to mirror local cluster information to remo... | [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cilium/cilium-cli | [] | [
"34db9d12626abb316341c19f03c034206cce44bb"
] |
CVE-2023-46254 | 2023-11-06T19:15:09 | 2025-01-15T04:59:49.817772 | capsule-proxy is a reverse proxy for Capsule kubernetes multi-tenancy framework. A bug in the RoleBinding reflector used by `capsule-proxy` gives ServiceAccount tenant owners the right to list Namespaces of other tenants backed by the same owner kind and name. For example consider two tenants `solar` and `wind`. Tenant... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/clastix/capsule | [] | [
"1bbaebbc90ac159cb54f3b89790cfd4017a31ccc"
] |
CVE-2022-46167 | 2022-12-02T19:15:11 | 2025-01-15T04:05:54.845221 | Capsule is a multi-tenancy and policy-based framework for Kubernetes. Prior to version 0.1.3, a ServiceAccount deployed in a Tenant Namespace, when granted with `PATCH` capabilities on its own Namespace, is able to edit it and remove the Owner Reference, breaking the reconciliation of the Capsule Operator and removing ... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/clastix/capsule | [] | [
"1bbaebbc90ac159cb54f3b89790cfd4017a31ccc"
] |
CVE-2023-48312 | 2023-11-24T18:15:07 | 2025-01-15T05:01:26.658337 | capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disa... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/clastix/capsule-proxy | [] | [
"55a1cb1e56c1cc02f674223011fc86f599db34bc"
] |
CVE-2022-23652 | 2022-02-22T20:15:07 | 2025-01-15T02:16:39.050911 | capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for ... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/clastix/capsule-proxy | [] | [
"55a1cb1e56c1cc02f674223011fc86f599db34bc"
] |
CVE-2024-42480 | 2024-08-12T16:15:15 | 2024-10-08T04:21:05.170693 | Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an "open at the top" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/clastix/kamaji | [] | [
"d4d38c8eafef0879366dbd6240347ab627c5945a"
] |
CVE-2022-26315 | 2022-02-28T19:15:12 | 2025-01-14T10:53:05.815856 | qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/claudiodangelis/qrcp | [] | [
"b2293923e8acc33563c19604949628895998122b"
] |
CVE-2021-41130 | 2021-10-07T19:15:08 | 2025-01-15T02:04:11.625098 | Extensible Service Proxy, a.k.a. ESP is a proxy which enables API management capabilities for JSON/REST or gRPC API services. ESPv1 can be configured to authenticate a JWT token. Its verified JWT claim is passed to the application by HTTP header "X-Endpoint-API-UserInfo", the application can use it to do authorization.... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudendpoints/esp | [] | [
"c5c579cf15600661c37fbac84388738c386e7615"
] |
CVE-2021-29994 | 2021-11-08T13:15:07 | 2025-01-14T09:08:01.366426 | Cloudera Hue 4.6.0 allows XSS. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudera/hue | [] | [
"5326efbf509f39da41cf568fbaccb0fe2586d461"
] |
CVE-2021-32481 | 2021-11-08T13:15:07 | 2025-01-14T09:14:24.390787 | Cloudera Hue 4.6.0 allows XSS via the type parameter. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudera/hue | [] | [
"5326efbf509f39da41cf568fbaccb0fe2586d461"
] |
CVE-2016-4946 | 2017-03-07T16:59:00 | 2025-01-14T06:37:39.162436 | Multiple cross-site scripting (XSS) vulnerabilities in Cloudera HUE 3.9.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) First name or (2) Last name field in the HUE Users page. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudera/hue | [] | [
"5326efbf509f39da41cf568fbaccb0fe2586d461"
] |
CVE-2016-4947 | 2017-03-07T16:59:00 | 2025-01-14T06:37:44.752934 | Cloudera HUE 3.9.0 and earlier allows remote attackers to enumerate user accounts via a request to desktop/api/users/autocomplete. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudera/hue | [] | [
"5326efbf509f39da41cf568fbaccb0fe2586d461"
] |
CVE-2024-28110 | 2024-03-06T22:15:57 | 2025-01-15T05:10:58.289573 | Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is popula... | null | https://github.com/cloudevents/sdk-go | [] | [
"67e389964131d55d65cd14b4eb32d57a47312695"
] |
CVE-2023-1732 | 2023-05-10T12:15:10 | 2025-01-14T11:21:10.343588 | When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.
The tkn20 and blindrsa components did not check whether enou... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudflare/circl | [] | [
"769d73f14c245a9a54a860640516c1b799a398d0"
] |
CVE-2023-1314 | 2023-03-21T12:15:10 | 2025-01-14T11:20:05.950598 | A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. This vulnerability exists because the MSI installer used by cloudflared relied on a world-writable... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudflare/cloudflared | [] | [
"20466dacb7e8428df93e9c5da1096e54daa0cd1c"
] |
CVE-2020-24356 | 2020-10-02T15:15:12 | 2025-01-14T08:38:59.463916 | `cloudflared` versions prior to 2020.8.1 contain a local privilege escalation vulnerability on Windows systems. When run on a Windows system, `cloudflared` searches for configuration files which could be abused by a malicious entity to execute commands as a privileged user. Version 2020.8.1 fixes this issue. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudflare/cloudflared | [] | [
"20466dacb7e8428df93e9c5da1096e54daa0cd1c"
] |
CVE-2022-2529 | 2022-09-30T11:15:09 | 2025-01-14T10:52:11.762169 | sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudflare/goflow | [] | [
"835a8829e3f7ba96b33acf6d2ea1bac23644d1be"
] |
CVE-2018-15800 | 2018-12-10T19:29:25 | 2025-01-14T07:23:57.160431 | Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage. | [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/bits-service-release | [] | [
"11f66fb1ee9cc511c882a877df2f9678e7b1af86"
] |
CVE-2019-3786 | 2019-04-24T16:29:01 | 2025-01-14T07:59:44.967922 | Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in th... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/bosh-backup-and-restore | [] | [
"d723a8704da53e848283aab44fce9757c1feb5c7"
] |
CVE-2019-3782 | 2019-02-13T16:29:00 | 2025-01-14T07:59:34.699502 | Cloud Foundry CredHub CLI, versions prior to 2.2.1, inadvertently writes authentication credentials provided via environment variables to its persistent config file. A local authenticated malicious user with access to the CredHub CLI config file can use these credentials to retrieve and modify credentials stored in Cre... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/credhub-cli | [] | [
"bfbb05b8c9539c80929b2d14a453c33b7f6f466b"
] |
CVE-2019-3779 | 2019-03-08T16:29:00 | 2025-02-19T02:58:20.963754 | Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability... | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/kubo-release | [] | [
"413988c8a75a64ed2482d1c58666a1970284b6c4"
] |
CVE-2019-3780 | 2019-03-08T16:29:00 | 2025-02-19T02:58:05.127668 | Cloud Foundry Container Runtime, versions prior to 0.28.0, deploys K8s worker nodes that contains a configuration file with IAAS credentials. A malicious user with access to the k8s nodes can obtain IAAS credentials allowing the user to escalate privileges to gain access to the IAAS account. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/kubo-release | [] | [
"413988c8a75a64ed2482d1c58666a1970284b6c4"
] |
CVE-2019-3783 | 2019-03-07T18:29:00 | 2025-01-14T07:59:49.815456 | Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/stratos | [] | [
"b4fa724ebe0e1eea8178686d03ab1f013dd9f94c"
] |
CVE-2019-3784 | 2019-03-07T18:29:00 | 2025-01-14T07:59:50.055828 | Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote authenticated malicious user can switch sessions to another user with the same session id. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/stratos | [] | [
"b4fa724ebe0e1eea8178686d03ab1f013dd9f94c"
] |
CVE-2018-1231 | 2018-03-27T16:29:00 | 2025-01-14T07:22:15.395312 | Cloud Foundry BOSH CLI, versions prior to v3.0.1, contains an improper access control vulnerability. A user with access to an instance using the BOSH CLI can access the BOSH CLI configuration file and use its contents to perform authenticated requests to BOSH. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/bosh-cli | [] | [
"e94aeebdeed26c840d96c33a02126f523d7b226a"
] |
CVE-2020-5422 | 2020-10-02T17:15:12 | 2025-01-14T08:47:34.909098 | BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/bosh-system-metrics-server-release | [] | [
"18f6dc0a995c90af3daad2070902280adf925894"
] |
CVE-2023-34061 | 2024-01-12T07:15:11 | 2025-02-19T03:33:43.964602 | Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/cf-deployment | [] | [
"11822083b7d80dea7c1ff40e89812787c6d4fbe3",
"1bf516e1fffd86002d92d1d8c016d541c9d7a95b",
"1ef1fcda375fca5d7dc0cbbb9ba3d5de31efa83d",
"36c1ff1a3fc4175c910aed00d423ea2edf457603"
] |
CVE-2024-22279 | 2024-06-10T20:15:12 | 2025-02-19T03:37:00.610180 | Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade
the service availability of the Cloud Foundry deployment if performed at scale. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/cf-deployment | [] | [
"e4caeeffdbc19d9db0e4eb10a5e109acf1017fe5"
] |
CVE-2023-34041 | 2023-09-08T08:15:07 | 2025-02-19T03:33:43.527965 | Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/cf-deployment | [] | [
"11822083b7d80dea7c1ff40e89812787c6d4fbe3",
"1bf516e1fffd86002d92d1d8c016d541c9d7a95b",
"1ef1fcda375fca5d7dc0cbbb9ba3d5de31efa83d",
"36c1ff1a3fc4175c910aed00d423ea2edf457603"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.