Total vulnerabilities in the database
The Cloud Controller in Cloud Foundry before 239 logs user-provided service objects at creation, which allows attackers to obtain sensitive user credential information via unspecified vectors.
Software | From | Fixed in |
---|---|---|
pivotal_software / cloud_foundry_elastic_runtime | 1.7.6 | 1.7.6.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.1 | 1.7.1.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.10 | 1.7.10.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.4 | 1.7.4.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.7 | 1.7.7.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.0 | 1.7.0.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.8 | 1.7.8.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.5 | 1.7.5.x |
pivotal_software / cloud_foundry | - | 238.0.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.9 | 1.7.9.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.3 | 1.7.3.x |
pivotal_software / cloud_foundry_elastic_runtime | 1.7.2 | 1.7.2.x |
pivotal_software / cloud_foundry_elastic_runtime | - | 1.6.32.x |