VYPR

apk package

wolfi/vitess-21.0

pkg:apk/wolfi/vitess-21.0

Vulnerabilities (14)

  • CVE-2025-4673MedJun 11, 2025
    affected < 21.0.4-r4fixed 21.0.4-r4

    Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information.

  • CVE-2025-22874HigJun 11, 2025
    affected < 21.0.4-r4fixed 21.0.4-r4

    Calling Verify with a VerifyOptions.KeyUsages that contains ExtKeyUsageAny unintentionally disabledpolicy validation. This only affected certificate chains which contain policy graphs, which are rather uncommon.

  • CVE-2025-46565May 1, 2025
    affected < 21.0.4-r3fixed 21.0.4-r3

    Vite is a frontend tooling framework for javascript. Prior to versions 6.3.4, 6.2.7, 6.1.6, 5.4.19, and 4.5.14, the contents of files in the project root that are denied by a file matching pattern can be returned to the browser. Only apps explicitly exposing the Vite dev server t

  • CVE-2025-22872MedApr 16, 2025
    affected < 21.0.4-r2fixed 21.0.4-r2

    The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can resul

  • CVE-2025-32395MedApr 10, 2025
    affected < 21.0.4-r1fixed 21.0.4-r1

    Vite is a frontend tooling framework for javascript. Prior to 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13, the contents of arbitrary files can be returned to the browser if the dev server is running on Node or Bun. HTTP 1.1 spec (RFC 9112) does not allow # in request-target. Althoug

  • CVE-2025-31125KEVMar 31, 2025
    affected < 21.0.3-r5fixed 21.0.3-r5

    Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fix

  • CVE-2025-30208Mar 24, 2025
    affected < 21.0.3-r4fixed 21.0.3-r4

    Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns

  • CVE-2025-27789MedMar 11, 2025
    affected < 21.0.3-r3fixed 21.0.3-r3

    Babel is a compiler for writing next generation JavaScript. When using versions of Babel prior to 7.26.10 and 8.0.0-alpha.17 to compile regular expression named capturing groups, Babel will generate a polyfill for the `.replace` method that has quadratic complexity on some specif

  • CVE-2025-22868Feb 26, 2025
    affected < 21.0.3-r3fixed 21.0.3-r3

    An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

  • CVE-2025-22866MedFeb 6, 2025
    affected < 21.0.2-r1fixed 21.0.2-r1

    Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recover

  • CVE-2024-45339HigJan 28, 2025
    affected < 21.0.2-r0fixed 21.0.2-r0

    When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and

  • CVE-2025-24010Jan 20, 2025
    affected < 21.0.2-r0fixed 21.0.2-r0

    Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6

  • CVE-2024-45338MedDec 18, 2024
    affected < 21.0.1-r1fixed 21.0.1-r1

    An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

  • CVE-2024-45337CriDec 12, 2024
    affected < 21.0.1-r1fixed 21.0.1-r1

    Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that