Cloud Foundry cf-release 281

CPE Details

Cloud Foundry cf-release 281
281
2019-06-05
13h04 +00:00
2019-06-05
13h04 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:cloudfoundry:cf-release:281:*:*:*:*:*:*:*

Informations

Vendor

cloudfoundry

Product

cf-release

Version

281

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2018-1195 2018-03-19 18h00 +00:00 In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication.
8.8
High
CVE-2017-4974 2017-06-13 04h00 +00:00 An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v258; UAA release 2.x versions prior to v2.7.4.15, 3.6.x versions prior to v3.6.9, 3.9.x versions prior to v3.9.11, and other versions prior to v3.16.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.13, 24.x versions prior to v24.8, and other versions prior to v30.1. An authorized user can use a blind SQL injection attack to query the contents of the UAA database, aka "Blind SQL Injection with privileged UAA endpoints."
6.5
Medium