VYPR

apk package

chainguard/kibana-8

pkg:apk/chainguard/kibana-8

Vulnerabilities (18)

  • CVE-2025-7783CriJul 18, 2025
    affected < 8.18.4-r0fixed 8.18.4-r0

    Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

  • CVE-2025-5889LowJun 9, 2025
    affected < 8.18.2-r3fixed 8.18.2-r3

    A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be l

  • CVE-2025-47934HigMay 19, 2025
    affected < 8.18.2-r0fixed 8.18.2-r0

    OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature v

  • CVE-2024-12905HigMar 27, 2025
    affected < 8.17.4-r41fixed 8.17.4-r41

    An Improper Link Resolution Before File Access ("Link Following") and Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal"). This vulnerability occurs when extracting a maliciously crafted tar file, which can result in unauthorized file writes or overwrit

  • CVE-2025-27789MedMar 11, 2025
    affected < 8.17.3-r2fixed 8.17.3-r2

    Babel is a compiler for writing next generation JavaScript. When using versions of Babel prior to 7.26.10 and 8.0.0-alpha.17 to compile regular expression named capturing groups, Babel will generate a polyfill for the `.replace` method that has quadratic complexity on some specif

  • CVE-2025-22150MedJan 21, 2025
    affected < 8.17.1-r1fixed 8.17.1-r1

    Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generat

  • CVE-2024-55565MedDec 9, 2024
    affected < 8.17.0-r0fixed 8.17.0-r0

    nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 is also a fixed version.

  • CVE-2024-21538HigNov 8, 2024
    affected < 8.16.1-r2fixed 8.16.1-r2

    Versions of the package cross-spawn before 6.0.6, from 7.0.0 and before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted

  • CVE-2024-7042Oct 29, 2024
    affected < 8.16.1-r1fixed 8.16.1-r1

    A vulnerability in the GraphCypherQAChain class of langchain-ai/langchainjs versions 0.2.5 and all versions with this class allows for prompt injection, leading to SQL injection. This vulnerability permits unauthorized data manipulation, data exfiltration, denial of service (DoS)

  • CVE-2024-7774Oct 29, 2024
    affected < 8.16.1-r1fixed 8.16.1-r1

    A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is expl

  • CVE-2024-47764MedOct 4, 2024
    affected < 8.17.1-r0fixed 8.17.1-r0

    cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the coo

  • CVE-2024-45296HigSep 9, 2024
    affected < 8.15.3-r0fixed 8.15.3-r0

    path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will

  • CVE-2024-39338Aug 9, 2024
    affected < 8.17.3-r2fixed 8.17.3-r2

    axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.

  • CVE-2024-37890HigJun 17, 2024
    affected < 8.17.3-r2fixed 8.17.3-r2

    ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (e

  • CVE-2024-29415HigMay 27, 2024
    affected < 8.17.3-r1fixed 8.17.3-r1

    The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for

  • CVE-2024-4367HigMay 14, 2024
    affected < 8.16.1-r0fixed 8.16.1-r0

    A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

  • CVE-2024-4067May 13, 2024
    affected < 8.15.3-r0fixed 8.15.3-r0

    The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching w

  • CVE-2023-36665Jul 5, 2023
    affected < 8.17.3-r2fixed 8.17.3-r2

    "protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data a