Total vulnerabilities in the database
Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.
Software | From | Fixed in |
---|---|---|
cloudfoundry / cf-deployment | - | 7.9.0 |
cloudfoundry / uaa_release | - | 64.0 |
cloudfoundry / credhub | 1.9 | 1.9.10 |
cloudfoundry / credhub | 2.1 | 2.1.3 |