id
stringlengths 13
16
| published
stringlengths 19
19
| modified
timestamp[ns] | details
stringlengths 30
3.87k
| severity
listlengths 1
1
⌀ | repo_url
stringlengths 23
68
| cwes
sequencelengths 0
1
| commits
sequencelengths 1
4
|
---|---|---|---|---|---|---|---|
CVE-2020-36372 | 2021-05-28T21:15:08 | 2025-01-14T08:46:06.523732 | Stack overflow vulnerability in parse_plus_minus Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2020-36367 | 2021-05-28T21:15:08 | 2025-01-14T08:46:06.473243 | Stack overflow vulnerability in parse_block Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2020-36375 | 2021-05-28T21:15:08 | 2025-01-14T08:46:07.272948 | Stack overflow vulnerability in parse_equality Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46509 | 2022-01-27T21:15:09 | 2025-01-14T10:04:47.994826 | Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46525 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.495290 | Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46516 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.452999 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_stack_size at mjs/src/mjs_core.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46553 | 2022-01-27T21:15:11 | 2025-01-14T10:04:53.664123 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_set_internal at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46545 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.797432 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x4b44b. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46548 | 2022-01-27T21:15:11 | 2025-01-14T10:04:53.555439 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via add_lineno_map_item at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46511 | 2022-01-27T21:15:09 | 2025-01-14T10:04:48.753651 | There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46554 | 2022-01-27T21:15:11 | 2025-01-14T10:04:54.064034 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_json_stringify at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46537 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.029837 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x9a30e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46543 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.476011 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x18e810. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46541 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.669086 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c6ae. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46556 | 2022-01-27T21:15:11 | 2025-01-14T10:04:54.619540 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_bcode_insert_offset at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46523 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.671013 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46517 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.908780 | There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46522 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.789659 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46538 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.468364 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_compact_strings at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46529 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.362836 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8814e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46513 | 2022-01-27T21:15:09 | 2025-01-14T10:04:47.575879 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46520 | 2022-01-27T21:15:09 | 2025-01-14T10:04:50.488639 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46535 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.415032 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0xe533e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46508 | 2022-01-27T21:15:09 | 2025-01-14T10:04:48.791111 | There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46542 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.578534 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_print at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46518 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.062052 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46547 | 2022-01-27T21:15:11 | 2025-01-14T10:04:54.110505 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c17e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46528 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.908319 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x5361e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46532 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.831241 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via exec_expr at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46531 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.405588 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8d28e. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46521 | 2022-01-27T21:15:09 | 2025-01-14T10:04:50.666617 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46544 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.525757 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x59e19. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46510 | 2022-01-27T21:15:09 | 2025-01-14T10:04:47.750865 | There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46512 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.248891 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_apply at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46519 | 2022-01-27T21:15:09 | 2025-01-14T10:04:50.426951 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46514 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.729863 | There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46534 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.345315 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via getprop_builtin_foreign at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46527 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.402187 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46526 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.750087 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46539 | 2022-01-27T21:15:10 | 2025-01-14T10:04:52.558798 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x45a1f. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46540 | 2022-01-27T21:15:10 | 2025-01-14T10:04:51.621175 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_get_mjs at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46550 | 2022-01-27T21:15:11 | 2025-01-14T10:04:53.750223 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via free_json_frame at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46546 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.266898 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_next at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46549 | 2022-01-27T21:15:11 | 2025-01-14T10:04:53.426978 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via parse_cval_type at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46530 | 2022-01-27T21:15:10 | 2025-01-14T10:04:53.436235 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_execute at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46515 | 2022-01-27T21:15:09 | 2025-01-14T10:04:49.700449 | There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-46524 | 2022-01-27T21:15:10 | 2025-01-14T10:04:50.806146 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33443 | 2022-07-26T13:15:08 | 2025-01-14T09:16:39.653537 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in mjs_execute() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33446 | 2022-07-26T13:15:08 | 2025-01-14T09:16:36.831095 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_next() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33437 | 2022-07-26T13:15:08 | 2025-01-14T09:16:32.677083 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There are memory leaks in frozen_cb() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33440 | 2022-07-26T13:15:08 | 2025-01-14T09:16:34.133447 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_commit() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33449 | 2022-07-26T13:15:09 | 2025-01-14T09:16:38.187810 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_part_get_by_offset() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33439 | 2022-07-26T13:15:08 | 2025-01-14T09:16:31.700220 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33442 | 2022-07-26T13:15:08 | 2025-01-14T09:16:39.493621 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in json_printf() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33448 | 2022-07-26T13:15:09 | 2025-01-14T09:16:39.422434 | An issue was discovered in mjs(mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow at 0x7fffe9049390. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33445 | 2022-07-26T13:15:08 | 2025-01-14T09:16:36.469441 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_string_char_code_at() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33444 | 2022-07-26T13:15:08 | 2025-01-14T09:16:38.308559 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in getprop_builtin_foreign() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33441 | 2022-07-26T13:15:08 | 2025-01-14T09:16:35.496020 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in exec_expr() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33447 | 2022-07-26T13:15:09 | 2025-01-14T09:16:37.934389 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_print() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2021-33438 | 2022-07-26T13:15:08 | 2025-01-14T09:16:35.471264 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in json_parse_array() in mjs.c. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cesanta/mjs | [] | [
"2827bd00b59bdc176a010b22fc4acde9b580d6c2"
] |
CVE-2024-36127 | 2024-06-03T15:15:09 | 2025-01-15T05:14:12.640349 | apko is an apk-based OCI image builder. apko exposures HTTP basic auth credentials from repository and keyring URLs in log output. This vulnerability is fixed in v0.14.5. | null | https://github.com/chainguard-dev/apko | [] | [
"1781b2d946ac3b37647d87f28ab6c47a81d705a7"
] |
CVE-2017-16762 | 2017-11-10T09:29:00 | 2025-01-14T07:07:47.791182 | Sanic before 0.5.1 allows reading arbitrary files with directory traversal, as demonstrated by the /static/..%2f substring. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/channelcat/sanic | [] | [
"e5fdc7fdd08a29bab1f63f73816028033fdafdc3"
] |
CVE-2023-47105 | 2024-09-18T17:15:18 | 2024-10-08T03:54:33.554557 | exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication. | null | https://github.com/chaosblade-io/chaosblade | [] | [
"176699f18bff9e4afdf43e8fb31d9dd79907ef5d"
] |
CVE-2022-29180 | 2022-05-07T04:15:09 | 2025-01-15T02:19:59.266976 | A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `charm` instances update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. ### Additional notes * Encrypted user data uploaded to the Charm server is safe as Charm servers cannot decrypt user data. This includes filenames, paths, and all key-value data. * Users running the official Charm [Docker images](https://github.com/charmbracelet/charm/blob/main/docker.md) are at minimal risk because the exploit is limited to the containerized filesystem. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/charmbracelet/charm | [] | [
"b7d991650ccde9b7d0e466c2aa2966b724217e23"
] |
CVE-2024-41956 | 2024-08-01T22:15:29 | 2024-10-08T04:20:32.560687 | Soft Serve is a self-hostable Git server for the command line. Prior to 0.7.5, it is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git. The issue is that Soft Serve passes all environment variables given by the client to git subprocesses. This includes environment variables that control program execution, such as LD_PRELOAD. This vulnerability is fixed in 0.7.5. | null | https://github.com/charmbracelet/soft-serve | [] | [
"9021825f7be1015bb278ce4df4d464830be9c6e7"
] |
CVE-2023-43809 | 2023-10-04T21:15:10 | 2025-01-15T04:58:37.841405 | Soft Serve is a self-hostable Git server for the command line. Prior to version 0.6.2, a security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public key requires additional client-side verification for example using FIDO2 or GPG. This is due to insufficient validation procedures of the public key step during SSH request handshake, granting unauthorized access if the keyboard-interaction mode is utilized. An attacker could exploit this vulnerability by presenting manipulated SSH requests using keyboard-interactive authentication mode. This could potentially result in unauthorized access to the Soft Serve. Users should upgrade to the latest Soft Serve version `v0.6.2` to receive the patch for this issue. To workaround this vulnerability without upgrading, users can temporarily disable Keyboard-Interactive SSH Authentication using the `allow-keyless` setting. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/charmbracelet/soft-serve | [] | [
"9021825f7be1015bb278ce4df4d464830be9c6e7"
] |
CVE-2025-22130 | 2025-01-08T16:15:38 | 2025-01-15T05:17:22.033575 | Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them permissions. This is patched in v0.8.2. | null | https://github.com/charmbracelet/soft-serve | [] | [
"9021825f7be1015bb278ce4df4d464830be9c6e7"
] |
CVE-2023-40050 | 2023-10-31T15:15:09 | 2025-01-14T11:54:43.847142 | Upload profile either
through API or user interface in Chef Automate prior to and including version 4.10.29 using InSpec
check command with maliciously crafted profile allows remote code execution.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/chef/automate | [] | [
"98981657948fc0a85a0d72556c8a6d447ca143d4"
] |
CVE-2023-28864 | 2023-07-17T20:15:13 | 2025-01-14T11:38:59.452667 | Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the "chef-server-ctl reconfigure" command. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/chef/chef-server | [] | [
"d55f1ceb0bc66348cbb3c50c16c9cf695e10a4a5"
] |
CVE-2024-29862 | 2024-03-21T04:15:09 | 2025-01-15T05:11:46.019332 | The Kerlink firewall in ChirpStack chirpstack-mqtt-forwarder before 4.2.1 and chirpstack-gateway-bridge before 4.0.11 wrongly accepts certain TCP packets when a connection is not in the ESTABLISHED state. | null | https://github.com/chirpstack/chirpstack-gateway-bridge | [] | [
"b5e6125844a89cf1ac11f639860aab6bbb0136f9"
] |
CVE-2021-28954 | 2021-03-21T05:15:13 | 2025-01-14T09:04:08.359530 | In Chris Walz bit before 1.0.5 on Windows, attackers can run arbitrary code via a .exe file in a crafted repository. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/chriswalz/bit | [] | [
"83f458c7d5955f113e7546932640855c0d9c914b"
] |
CVE-2023-28114 | 2023-03-22T19:15:12 | 2025-01-15T04:49:32.013587 | `cilium-cli` is the command line interface to install, manage, and troubleshoot Kubernetes clusters running Cilium. Prior to version 0.13.2,`cilium-cli`, when used to configure cluster mesh functionality, can remove the enforcement of user permissions on the `etcd` store used to mirror local cluster information to remote clusters. Users who have set up cluster meshes using the Cilium Helm chart are not affected by this issue.
Due to an incorrect mount point specification, the settings specified by the `initContainer` that configures `etcd` users and their permissions are overwritten when using `cilium-cli` to configure a cluster mesh. An attacker who has already gained access to a valid key and certificate for an `etcd` cluster compromised in this manner could then modify state in that `etcd` cluster.
This issue is patched in `cilium-cli` 0.13.2. As a workaround, one may use Cilium's Helm charts to create their cluster. | [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cilium/cilium-cli | [] | [
"34db9d12626abb316341c19f03c034206cce44bb"
] |
CVE-2023-46254 | 2023-11-06T19:15:09 | 2025-01-15T04:59:49.817772 | capsule-proxy is a reverse proxy for Capsule kubernetes multi-tenancy framework. A bug in the RoleBinding reflector used by `capsule-proxy` gives ServiceAccount tenant owners the right to list Namespaces of other tenants backed by the same owner kind and name. For example consider two tenants `solar` and `wind`. Tenant `solar`, owned by a ServiceAccount named `tenant-owner` in the Namespace `solar`. Tenant `wind`, owned by a ServiceAccount named `tenant-owner` in the Namespace `wind`. The Tenant owner `solar` would be able to list the namespaces of the Tenant `wind` and vice-versa, although this is not correct. The bug introduces an exfiltration vulnerability since allows the listing of Namespace resources of other Tenants, although just in some specific conditions: 1. `capsule-proxy` runs with the `--disable-caching=false` (default value: `false`) and 2. Tenant owners are ServiceAccount, with the same resource name, but in different Namespaces. This vulnerability doesn't allow any privilege escalation on the outer tenant Namespace-scoped resources, since the Kubernetes RBAC is enforcing this. This issue has been addressed in version 0.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/clastix/capsule | [] | [
"1bbaebbc90ac159cb54f3b89790cfd4017a31ccc"
] |
CVE-2022-46167 | 2022-12-02T19:15:11 | 2025-01-15T04:05:54.845221 | Capsule is a multi-tenancy and policy-based framework for Kubernetes. Prior to version 0.1.3, a ServiceAccount deployed in a Tenant Namespace, when granted with `PATCH` capabilities on its own Namespace, is able to edit it and remove the Owner Reference, breaking the reconciliation of the Capsule Operator and removing all the enforcement like Pod Security annotations, Network Policies, Limit Range and Resource Quota items. An attacker could detach the Namespace from a Tenant that is forbidding starting privileged Pods using the Pod Security labels by removing the OwnerReference, removing the enforcement labels, and being able to start privileged containers that would be able to start a generic Kubernetes privilege escalation. Patches have been released for version 0.1.3. No known workarounds are available.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/clastix/capsule | [] | [
"1bbaebbc90ac159cb54f3b89790cfd4017a31ccc"
] |
CVE-2023-48312 | 2023-11-24T18:15:07 | 2025-01-15T05:01:26.658337 | capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disable (set to `false`) are affected since it would be possible to bypass the token review mechanism, interacting with the upper Kubernetes API Server. This privilege escalation cannot be exploited if you're relying only on client certificates (SSL/TLS). This vulnerability has been addressed in version 0.4.6. Users are advised to upgrade. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/clastix/capsule-proxy | [] | [
"55a1cb1e56c1cc02f674223011fc86f599db34bc"
] |
CVE-2022-23652 | 2022-02-22T20:15:07 | 2025-01-15T02:16:39.050911 | capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for an exploit of the `cluster-admin` Role bound to `capsule-proxy`. There are no known workarounds for this issue. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/clastix/capsule-proxy | [] | [
"55a1cb1e56c1cc02f674223011fc86f599db34bc"
] |
CVE-2024-42480 | 2024-08-12T16:15:15 | 2024-10-08T04:21:05.170693 | Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an "open at the top" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/clastix/kamaji | [] | [
"d4d38c8eafef0879366dbd6240347ab627c5945a"
] |
CVE-2022-26315 | 2022-02-28T19:15:12 | 2025-01-14T10:53:05.815856 | qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/claudiodangelis/qrcp | [] | [
"b2293923e8acc33563c19604949628895998122b"
] |
CVE-2021-41130 | 2021-10-07T19:15:08 | 2025-01-15T02:04:11.625098 | Extensible Service Proxy, a.k.a. ESP is a proxy which enables API management capabilities for JSON/REST or gRPC API services. ESPv1 can be configured to authenticate a JWT token. Its verified JWT claim is passed to the application by HTTP header "X-Endpoint-API-UserInfo", the application can use it to do authorization. But if there are two "X-Endpoint-API-UserInfo" headers from the client, ESPv1 only replaces the first one, the 2nd one will be passed to the application. An attacker can send two "X-Endpoint-API-UserInfo" headers, the second one with a fake JWT claim. Application may use the fake JWT claim to do the authorization. This impacts following ESPv1 usages: 1) Users have configured ESPv1 to do JWT authentication with Google ID Token as described in the referenced google endpoint document. 2) Users backend application is using the info in the "X-Endpoint-API-UserInfo" header to do the authorization. It has been fixed by v1.58.0. You need to patch it in the following ways: * If your docker image is using tag ":1", needs to re-start the container to pick up the new version. The tag ":1" will automatically point to the latest version. * If your docker image tag pings to a specific minor version, e.g. ":1.57". You need to update it to ":1.58" and re-start the container. There are no workaround for this issue. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudendpoints/esp | [] | [
"c5c579cf15600661c37fbac84388738c386e7615"
] |
CVE-2021-29994 | 2021-11-08T13:15:07 | 2025-01-14T09:08:01.366426 | Cloudera Hue 4.6.0 allows XSS. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudera/hue | [] | [
"5326efbf509f39da41cf568fbaccb0fe2586d461"
] |
CVE-2021-32481 | 2021-11-08T13:15:07 | 2025-01-14T09:14:24.390787 | Cloudera Hue 4.6.0 allows XSS via the type parameter. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudera/hue | [] | [
"5326efbf509f39da41cf568fbaccb0fe2586d461"
] |
CVE-2016-4946 | 2017-03-07T16:59:00 | 2025-01-14T06:37:39.162436 | Multiple cross-site scripting (XSS) vulnerabilities in Cloudera HUE 3.9.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) First name or (2) Last name field in the HUE Users page. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudera/hue | [] | [
"5326efbf509f39da41cf568fbaccb0fe2586d461"
] |
CVE-2016-4947 | 2017-03-07T16:59:00 | 2025-01-14T06:37:44.752934 | Cloudera HUE 3.9.0 and earlier allows remote attackers to enumerate user accounts via a request to desktop/api/users/autocomplete. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudera/hue | [] | [
"5326efbf509f39da41cf568fbaccb0fe2586d461"
] |
CVE-2024-28110 | 2024-03-06T22:15:57 | 2025-01-15T05:10:58.289573 | Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue. | null | https://github.com/cloudevents/sdk-go | [] | [
"67e389964131d55d65cd14b4eb32d57a47312695"
] |
CVE-2023-1732 | 2023-05-10T12:15:10 | 2025-01-14T11:21:10.343588 | When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.
The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudflare/circl | [] | [
"769d73f14c245a9a54a860640516c1b799a398d0"
] |
CVE-2023-1314 | 2023-03-21T12:15:10 | 2025-01-14T11:20:05.950598 | A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. This vulnerability exists because the MSI installer used by cloudflared relied on a world-writable directory.
An attacker with local access to the device (without Administrator rights) can use symbolic links to trick the MSI installer into deleting files in locations that the attacker would otherwise have no access to. By creating a symlink from the world-writable directory to the target file, the attacker can manipulate the MSI installer's repair functionality to delete the target file during the repair process.
Exploitation of this vulnerability could allow an attacker to delete important system files or replace them with malicious files, potentially leading to the affected device being compromised.
The cloudflared client itself is not affected by this vulnerability, only the installer for 32-bit Windows devices.
| [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudflare/cloudflared | [] | [
"20466dacb7e8428df93e9c5da1096e54daa0cd1c"
] |
CVE-2020-24356 | 2020-10-02T15:15:12 | 2025-01-14T08:38:59.463916 | `cloudflared` versions prior to 2020.8.1 contain a local privilege escalation vulnerability on Windows systems. When run on a Windows system, `cloudflared` searches for configuration files which could be abused by a malicious entity to execute commands as a privileged user. Version 2020.8.1 fixes this issue. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudflare/cloudflared | [] | [
"20466dacb7e8428df93e9c5da1096e54daa0cd1c"
] |
CVE-2022-2529 | 2022-09-30T11:15:09 | 2025-01-14T10:52:11.762169 | sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudflare/goflow | [] | [
"835a8829e3f7ba96b33acf6d2ea1bac23644d1be"
] |
CVE-2018-15800 | 2018-12-10T19:29:25 | 2025-01-14T07:23:57.160431 | Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage. | [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/bits-service-release | [] | [
"11f66fb1ee9cc511c882a877df2f9678e7b1af86"
] |
CVE-2019-3786 | 2019-04-24T16:29:01 | 2025-01-14T07:59:44.967922 | Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in this metadata script were only maintained in the cfcr-etcd-release, so clusters deployed with the BBR job for etcd in this release are vulnerable. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/bosh-backup-and-restore | [] | [
"d723a8704da53e848283aab44fce9757c1feb5c7"
] |
CVE-2019-3782 | 2019-02-13T16:29:00 | 2025-01-14T07:59:34.699502 | Cloud Foundry CredHub CLI, versions prior to 2.2.1, inadvertently writes authentication credentials provided via environment variables to its persistent config file. A local authenticated malicious user with access to the CredHub CLI config file can use these credentials to retrieve and modify credentials stored in CredHub that are authorized to the targeted user. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/credhub-cli | [] | [
"bfbb05b8c9539c80929b2d14a453c33b7f6f466b"
] |
CVE-2019-3779 | 2019-03-08T16:29:00 | 2025-02-19T02:58:20.963754 | Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/kubo-release | [] | [
"413988c8a75a64ed2482d1c58666a1970284b6c4"
] |
CVE-2019-3780 | 2019-03-08T16:29:00 | 2025-02-19T02:58:05.127668 | Cloud Foundry Container Runtime, versions prior to 0.28.0, deploys K8s worker nodes that contains a configuration file with IAAS credentials. A malicious user with access to the k8s nodes can obtain IAAS credentials allowing the user to escalate privileges to gain access to the IAAS account. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/kubo-release | [] | [
"413988c8a75a64ed2482d1c58666a1970284b6c4"
] |
CVE-2019-3783 | 2019-03-07T18:29:00 | 2025-01-14T07:59:49.815456 | Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/stratos | [] | [
"b4fa724ebe0e1eea8178686d03ab1f013dd9f94c"
] |
CVE-2019-3784 | 2019-03-07T18:29:00 | 2025-01-14T07:59:50.055828 | Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote authenticated malicious user can switch sessions to another user with the same session id. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry-incubator/stratos | [] | [
"b4fa724ebe0e1eea8178686d03ab1f013dd9f94c"
] |
CVE-2018-1231 | 2018-03-27T16:29:00 | 2025-01-14T07:22:15.395312 | Cloud Foundry BOSH CLI, versions prior to v3.0.1, contains an improper access control vulnerability. A user with access to an instance using the BOSH CLI can access the BOSH CLI configuration file and use its contents to perform authenticated requests to BOSH. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/bosh-cli | [] | [
"e94aeebdeed26c840d96c33a02126f523d7b226a"
] |
CVE-2020-5422 | 2020-10-02T17:15:12 | 2025-01-14T08:47:34.909098 | BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/bosh-system-metrics-server-release | [] | [
"18f6dc0a995c90af3daad2070902280adf925894"
] |
CVE-2023-34061 | 2024-01-12T07:15:11 | 2025-02-19T03:33:43.964602 | Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/cf-deployment | [] | [
"11822083b7d80dea7c1ff40e89812787c6d4fbe3",
"1bf516e1fffd86002d92d1d8c016d541c9d7a95b",
"1ef1fcda375fca5d7dc0cbbb9ba3d5de31efa83d",
"36c1ff1a3fc4175c910aed00d423ea2edf457603"
] |
CVE-2024-22279 | 2024-06-10T20:15:12 | 2025-02-19T03:37:00.610180 | Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade
the service availability of the Cloud Foundry deployment if performed at scale. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/cf-deployment | [] | [
"e4caeeffdbc19d9db0e4eb10a5e109acf1017fe5"
] |
CVE-2023-34041 | 2023-09-08T08:15:07 | 2025-02-19T03:33:43.527965 | Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/cloudfoundry/cf-deployment | [] | [
"11822083b7d80dea7c1ff40e89812787c6d4fbe3",
"1bf516e1fffd86002d92d1d8c016d541c9d7a95b",
"1ef1fcda375fca5d7dc0cbbb9ba3d5de31efa83d",
"36c1ff1a3fc4175c910aed00d423ea2edf457603"
] |
Subsets and Splits