Vulnerabilities > Cloudfoundry > Capi Release > 1.97.0

DATE CVE VULNERABILITY TITLE RISK
2022-03-25 CVE-2021-22100 Resource Exhaustion vulnerability in Cloudfoundry Capi-Release
In cloud foundry CAPI versions prior to 1.122, a denial-of-service attack in which a developer can push a service broker that (accidentally or maliciously) causes CC instances to timeout and fail is possible.
network
low complexity
cloudfoundry CWE-400
5.3
2021-10-27 CVE-2021-22101 Resource Exhaustion vulnerability in Cloudfoundry Capi-Release
Cloud Controller versions prior to 1.118.0 are vulnerable to unauthenticated denial of Service(DoS) vulnerability allowing unauthenticated attackers to cause denial of service by using REST HTTP requests with label_selectors on multiple V3 endpoints by generating an enormous SQL query.
network
low complexity
cloudfoundry CWE-400
7.5
2021-04-08 CVE-2021-22115 Insufficiently Protected Credentials vulnerability in Cloudfoundry Capi-Release
Cloud Controller API versions prior to 1.106.0 logs service broker credentials if the default value of db logging config field is changed.
network
low complexity
cloudfoundry CWE-522
6.5
2020-12-02 CVE-2020-5423 Resource Exhaustion vulnerability in Cloudfoundry Cf-Deployment
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
network
low complexity
cloudfoundry CWE-400
7.5
2020-09-03 CVE-2020-5418 Incorrect Authorization vulnerability in Cloudfoundry Capi-Release
Cloud Foundry CAPI (Cloud Controller) versions prior to 1.98.0 allow authenticated users having only the "cloud_controller.read" scope, but no roles in any spaces, to list all droplets in all spaces (whereas they should see none).
network
low complexity
cloudfoundry CWE-863
4.3