Page 7 of 33 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected. En Cloud Foundry Runtime versiones v208 y anteriores, UAA Standalone versiones 2.2.5 o anteriores y Pivotal Cloud Foundry Runtime, versiones 1.4.5 o anteriores, los enlaces a contraseñas antiguas reseteadas no expiran después de que un usuario cambie su dirección de correo electrónico actual a una nueva. Esta vulnerabilidad aplica solo cuando se almacena el UAA del usuario interno para la autenticación. • https://pivotal.io/security/cve-2015-3189 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

The Cloud Controller in Cloud Foundry cf-release versions prior to v255 allows authenticated developer users to exceed memory and disk quotas for tasks. El Cloud Controller en Cloud Foundry cf-release en versiones anteriores a v255 permiten a los usuarios de desarrolladores autenticados superar las cuotas de memoria y disco para las tareas. • https://www.cloudfoundry.org/cve-2017-4969 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v250 and CAPI-release versions prior to v1.12.0. Cloud Foundry logs the credentials returned from service brokers in Cloud Controller system component logs. These logs are written to disk and often sent to a log aggregator via syslog. Se descubrió un problema Cloud Foundry Foundation cf-release en versiones anteriores a v250 y CAPI-release en versiones anteriores a v1.12.0. Cloud Foundry registra las credenciales devueltas por los intermediarios de servicio en los registros de componentes del sistema Cloud Controller. • http://www.securityfocus.com/bid/95441 https://www.cloudfoundry.org/cve-2016-9882 • CWE-532: Insertion of Sensitive Information into Log File •