Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Couchbase_server
(Couchbase)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 54 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-07-15 | CVE-2022-34826 | In Couchbase Server 7.1.x before 7.1.1, an encrypted Private Key passphrase may be leaked in the logs. | Couchbase_server | 5.9 | ||
2022-07-21 | CVE-2022-32556 | An issue was discovered in Couchbase Server before 7.0.4. A private key is leaked to the log files with certain crashes. | Couchbase_server | 7.5 | ||
2023-02-06 | CVE-2022-42950 | An issue was discovered in Couchbase Server 7.x before 7.0.5 and 7.1.x before 7.1.2. A crafted HTTP REST request from an administrator account to the Couchbase Server Backup Service can exhaust memory resources, causing the process to be killed, which can be used for denial of service. | Couchbase_server | 4.9 | ||
2023-02-06 | CVE-2022-42951 | An issue was discovered in Couchbase Server 6.5.x and 6.6.x before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2. During the start-up of a Couchbase Server node, there is a small window of time (before the cluster management authentication has started) where an attacker can connect to the cluster manager using default credentials. | Couchbase_server | 8.1 | ||
2023-02-06 | CVE-2023-25016 | Couchbase Server before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2 exposes Sensitive Information to an Unauthorized Actor. | Couchbase_server | 7.5 | ||
2023-11-08 | CVE-2023-45875 | An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.log while adding a pre-7.0 node to a 7.2 cluster. | Couchbase_server | 7.5 | ||
2023-11-08 | CVE-2023-36667 | Couchbase Server 7.1.4 before 7.1.5 and 7.2.0 before 7.2.1 allows Directory Traversal. | Couchbase_server | 7.5 | ||
2024-02-05 | CVE-2023-50782 | A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data. | Couchbase_server, Cryptography, Ansible_automation_platform, Enterprise_linux, Update_infrastructure | 7.5 | ||
2019-09-10 | CVE-2019-11495 | In Couchbase Server 5.1.1, the cookie used for intra-node communication was not generated securely. Couchbase Server uses erlang:now() to seed the PRNG which results in a small search space for potential random seeds that could then be used to brute force the cookie and execute code against a remote system. This has been fixed in version 6.0.0. | Couchbase_server | 9.8 | ||
2019-09-10 | CVE-2019-11465 | An issue was discovered in Couchbase Server 5.5.x through 5.5.3 and 6.0.0. The Memcached "connections" stat block command emits a non-redacted username. The system information submitted to Couchbase as part of a bug report included the usernames for all users currently logged into the system even if the log was redacted for privacy. This has been fixed (in 5.5.4 and 6.0.1) so that usernames are tagged properly in the logs and are hashed out when the logs are redacted. | Couchbase_server | 5.3 |