Show filters
90 Total Results
Displaying 1-10 of 90
Sort by:
Attacker Value
Unknown

CVE-2025-22216

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
A UAA configured with multiple identity zones, does not properly validate session information across those zones. A User authenticated against a corporate IDP can re-use their jsessionid to access other zones.
0
Attacker Value
Unknown

CVE-2024-38826

Disclosure Date: November 11, 2024 (last updated November 11, 2024)
Authenticated users can upload specifically crafted files to leak server resources. This behavior can potentially be used to run a denial of service attack against Cloud Controller. The Cloud Foundry project recommends upgrading the following releases: * Upgrade capi release version to 1.194.0 or greater * Upgrade cf-deployment version to v44.1.0 or greater. This includes a patched capi release
0
Attacker Value
Unknown

CVE-2023-34061

Disclosure Date: January 12, 2024 (last updated January 19, 2024)
Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.
Attacker Value
Unknown

CVE-2023-30952

Disclosure Date: August 03, 2023 (last updated October 08, 2023)
A security defect was discovered in Foundry Issues that enabled users to create convincing phishing links by editing the request sent when creating an Issue. This defect was resolved in Frontend release 6.228.0 .
Attacker Value
Unknown

CVE-2023-30950

Disclosure Date: August 03, 2023 (last updated October 08, 2023)
The foundry campaigns service was found to be vulnerable to an unauthenticated information disclosure in a rest endpoint
Attacker Value
Unknown

CVE-2023-30963

Disclosure Date: July 10, 2023 (last updated October 08, 2023)
A security defect was discovered in Foundry Frontend which enabled users to perform Stored XSS attacks in Slate if Foundry's CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.229.0. The service was rolled out to all affected Foundry instances. No further intervention is required.
Attacker Value
Unknown

CVE-2023-30960

Disclosure Date: July 10, 2023 (last updated October 08, 2023)
A security defect was discovered in Foundry job-tracker that enabled users to query metadata related to builds on resources they did not have access to. This defect was resolved with the release of job-tracker 4.645.0. The service was rolled out to all affected Foundry instances. No further intervention is required.
Attacker Value
Unknown

CVE-2023-30956

Disclosure Date: July 10, 2023 (last updated October 08, 2023)
A security defect was identified in Foundry Comments that enabled a user to discover the contents of an attachment submitted to another comment if they knew the internal UUID of the target attachment. This defect was resolved with the release of Foundry Comments 2.267.0.
Attacker Value
Unknown

CVE-2023-22835

Disclosure Date: July 10, 2023 (last updated October 08, 2023)
A security defect was identified that enabled a user of Foundry Issues to perform a Denial of Service attack by submitting malformed data in an Issue that caused loss of frontend functionality to all issue participants. This defect was resolved with the release of Foundry Issues 2.510.0 and Foundry Frontend 6.228.0.
Attacker Value
Unknown

CVE-2023-30955

Disclosure Date: June 29, 2023 (last updated October 08, 2023)
A security defect was identified in Foundry workspace-server that enabled a user to bypass an authorization check and view settings related to 'Developer Mode'. This enabled users with insufficient privilege the ability to view and interact with Developer Mode settings in a limited capacity. A fix was deployed with workspace-server 7.7.0.