Product:

Couchbase_server

(Couchbase)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 54
Date Id Summary Products Score Patch Annotated
2022-07-12 CVE-2022-33911 An issue was discovered in Couchbase Server 7.x before 7.0.4. Field names are not redacted in logged validation messages for Analytics Service. An Unauthorized Actor may be able to obtain Sensitive Information. Couchbase_server 5.3
2022-07-15 CVE-2022-34826 In Couchbase Server 7.1.x before 7.1.1, an encrypted Private Key passphrase may be leaked in the logs. Couchbase_server 5.9
2022-07-21 CVE-2022-32556 An issue was discovered in Couchbase Server before 7.0.4. A private key is leaked to the log files with certain crashes. Couchbase_server 7.5
2023-02-06 CVE-2022-42950 An issue was discovered in Couchbase Server 7.x before 7.0.5 and 7.1.x before 7.1.2. A crafted HTTP REST request from an administrator account to the Couchbase Server Backup Service can exhaust memory resources, causing the process to be killed, which can be used for denial of service. Couchbase_server 4.9
2023-02-06 CVE-2022-42951 An issue was discovered in Couchbase Server 6.5.x and 6.6.x before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2. During the start-up of a Couchbase Server node, there is a small window of time (before the cluster management authentication has started) where an attacker can connect to the cluster manager using default credentials. Couchbase_server 8.1
2023-02-06 CVE-2023-25016 Couchbase Server before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2 exposes Sensitive Information to an Unauthorized Actor. Couchbase_server 7.5
2023-11-08 CVE-2023-45875 An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.log while adding a pre-7.0 node to a 7.2 cluster. Couchbase_server 7.5
2023-11-08 CVE-2023-36667 Couchbase Server 7.1.4 before 7.1.5 and 7.2.0 before 7.2.1 allows Directory Traversal. Couchbase_server 7.5
2024-02-05 CVE-2023-50782 A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data. Couchbase_server, Cryptography, Ansible_automation_platform, Enterprise_linux, Update_infrastructure 7.5
2019-09-10 CVE-2019-11495 In Couchbase Server 5.1.1, the cookie used for intra-node communication was not generated securely. Couchbase Server uses erlang:now() to seed the PRNG which results in a small search space for potential random seeds that could then be used to brute force the cookie and execute code against a remote system. This has been fixed in version 6.0.0. Couchbase_server 9.8