2 results (0.019 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The High Availability functionality of Yugabyte Anywhere can be abused to write arbitrary files through the backup upload endpoint by using path traversal characters. This vulnerability is associated with program files PlatformReplicationManager.Java. This issue affects YugabyteDB Anywhere: from 2.0.0.0 through 2.13.0.0 • https://www.yugabyte.com • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0.0.0 through 2.13.0.0 • https://www.yugabyte.com • CWE-307: Improper Restriction of Excessive Authentication Attempts CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes CWE-918: Server-Side Request Forgery (SSRF) •