VYPR

apk package

chainguard/vitess-19

pkg:apk/chainguard/vitess-19

Vulnerabilities (13)

  • CVE-2025-54798Aug 7, 2025
    affected < 19.0.10-r15fixed 19.0.10-r15

    tmp is a temporary file and directory creator for node.js. In versions 0.2.3 and below, tmp is vulnerable to an arbitrary temporary file / directory write via symbolic link dir parameter. This is fixed in version 0.2.4.

  • CVE-2025-7783CriJul 18, 2025
    affected < 19.0.10-r13fixed 19.0.10-r13

    Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

  • CVE-2025-22868Feb 26, 2025
    affected < 19.0.10-r11fixed 19.0.10-r11

    An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

  • CVE-2025-22869Feb 26, 2025
    affected < 19.0.10-r11fixed 19.0.10-r11

    SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

  • CVE-2025-22866MedFeb 6, 2025
    affected < 19.0.10-r11fixed 19.0.10-r11

    Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recover

  • CVE-2024-45341MedJan 28, 2025
    affected < 19.0.10-r11fixed 19.0.10-r11

    A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.

  • CVE-2024-45339HigJan 28, 2025
    affected < 19.0.10-r11fixed 19.0.10-r11

    When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and

  • CVE-2024-45336MedJan 28, 2025
    affected < 19.0.10-r11fixed 19.0.10-r11

    The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain re

  • CVE-2025-24010Jan 20, 2025
    affected < 19.0.10-r11fixed 19.0.10-r11

    Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6

  • CVE-2024-45338MedDec 18, 2024
    affected < 19.0.10-r11fixed 19.0.10-r11

    An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

  • CVE-2024-45337CriDec 12, 2024
    affected < 19.0.10-r11fixed 19.0.10-r11

    Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that

  • CVE-2024-55565MedDec 9, 2024
    affected < 19.0.10-r11fixed 19.0.10-r11

    nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 is also a fixed version.

  • CVE-2024-47764MedOct 4, 2024
    affected < 19.0.10-r11fixed 19.0.10-r11

    cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the coo