CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “yugabyte”

9 vulnerabilities found for “yugabyte”

CVE-2024-41435
HIGH7.5

YugabyteDB v2.21.1.0 was discovered to contain a buffer overflow via the "insert into" parameter.

yugabyte / yugabytedb
Network
Published Sep 3, 2024
CVE-2023-6001
MEDIUM5.3

Prometheus metrics are available without authentication. These expose detailed and sensitive information about the YugabyteDB Anywhere environment.

yugabyte / yugabytedb
Network
Published Nov 8, 2023
CVE-2023-6002
MEDIUM6.5

YugabyteDB is vulnerable to cross site scripting (XSS) via log injection. Writing invalidated user input to log files can allow an unprivileged attacker to forge log entries or inject malicious content into the logs.

yugabyte / yugabytedb+2
Network
Published Nov 8, 2023
CVE-2023-4640
MEDIUM6.5

The controller responsible for setting the logging level does not include any authorization checks to ensure the user is authenticated. This can be seen by noting that it extends Controller rather than AuthenticatedController and includes no further checks. This issue affects YugabyteDB Anywhere: from 2.0.0 through 2.17.3

yugabyte / yugabytedb
Network
Published Aug 30, 2023
CVE-2023-0575
HIGH7.2

External Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py. This issue affects Yugabyte DB: Lesser then 2.2.0.0

yugabyte / yugabytedb
Network
Published Feb 9, 2023
CVE-2023-0745
MEDIUM6.7

The High Availability functionality of Yugabyte Anywhere can be abused to write arbitrary files through the backup upload endpoint by using path traversal characters. This vulnerability is associated with program files PlatformReplicationManager.Java. This issue affects YugabyteDB Anywhere: from 2.0.0.0 through 2.13.0.0

yugabyte / yugabytedb_managed
Local
Published Feb 9, 2023
CVE-2023-0574
MEDIUM6.8

Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0.0.0 through 2.13.0.0

yugabyte / yugabytedb_managed
Network
Published Feb 9, 2023
CVE-2022-37397
HIGH8.3

An issue was discovered in the YugabyteDB 2.6.1 when using LDAP-based authentication in YCQL with Microsoft’s Active Directory. When anonymous or unauthenticated LDAP binding is enabled, it allows bypass of authentication with an empty password.

yugabyte / yugabytedb
Adjacent
Published Aug 12, 2022
CVE-2019-3800
MEDIUM6.3

CF CLI version prior to v6.45.0 (bosh release version 1.16.0) writes the client id and secret to its config file when the user authenticates with --client-credentials flag. A local authenticated malicious user with access to the CF CLI config file can act as that client, who is the owner of the leaked credentials.

pivotal / cloud_foundry_command_line_interface+59
Local
Published Aug 5, 2019