Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2025-0982

Disclosure Date: February 06, 2025 (last updated February 07, 2025)
Sandbox escape in the JavaScript Task feature of Google Cloud Application Integration allows an actor to execute arbitrary unsandboxed code via crafted JavaScript code executed by the Rhino engine. Effective January 24, 2025, Application Integration will no longer support Rhino as the JavaScript execution engine. No further fix actions are needed.
0
Attacker Value
Unknown

CVE-2024-12236

Disclosure Date: December 10, 2024 (last updated December 21, 2024)
A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC. No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.
0
Attacker Value
Unknown

CVE-2024-9858

Disclosure Date: October 16, 2024 (last updated October 16, 2024)
There exists an insecure default user permission in Google Cloud Migrate to containers from version 1.1.0 to 1.2.2 Windows installs. A local "m2cuser" was greated with administrator privileges. This posed a security risk if the "analyze" or "generate" commands were interrupted or skipping the action to delete the local user “m2cuser”. We recommend upgrading to 1.2.3 or beyond
0
Attacker Value
Unknown

CVE-2024-5166

Disclosure Date: May 22, 2024 (last updated May 23, 2024)
An Insecure Direct Object Reference in Google Cloud's Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model.
0
Attacker Value
Unknown

CVE-2020-28436

Disclosure Date: July 25, 2022 (last updated October 07, 2023)
This affects all versions of package google-cloudstorage-commands.