{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T00:13:33.309","vulnerabilities":[{"cve":{"id":"CVE-2018-1269","sourceIdentifier":"security_alert@emc.com","published":"2018-06-06T20:29:00.550","lastModified":"2024-11-21T03:59:30.360","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cloud Foundry Loggregator, versions 89.x prior to 89.5 or 96.x prior to 96.1 or 99.x prior to 99.1 or 101.x prior to 101.9 or 102.x prior to 102.2, does not handle errors thrown while constructing certain http requests. A remote authenticated user may construct malicious requests to cause the traffic controller to leave dangling TCP connections, which could cause denial of service."},{"lang":"es","value":"Cloud Foundry Loggregator, en versiones 89.x anteriores a la 89.5, versiones 96.x anteriores a la 96.1, versiones 99.x anteriores a la 99.1, versiones 101.x anteriores a la 101.9 o versiones 102.x anteriores a la 102.2, no gestiona los errores que se lanzan cuando se construyen ciertas peticiones http. Un usuario autenticado remoto podría construir peticiones maliciosas para provocar que el controlador de tráfico deje pendientes las conexiones TCP, lo que podría provocar una denegación de servicio (DoS)."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-755"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*","versionStartIncluding":"89","versionEndExcluding":"89.5","matchCriteriaId":"3A0DC6EA-38C5-4401-9696-035B821D538C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*","versionStartIncluding":"96","versionEndExcluding":"96.1","matchCriteriaId":"DD35ED5D-74D8-45ED-B0A3-21E2A1A7ABDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*","versionStartIncluding":"99","versionEndExcluding":"99.1","matchCriteriaId":"1E20F6DA-281F-42F9-B50E-4ACD4EBAF4A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*","versionStartIncluding":"101","versionEndExcluding":"101.9","matchCriteriaId":"F9DECBA2-12CD-4705-914A-2A59B823B096"},{"vulnerable":true,"criteria":"cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*","versionStartIncluding":"102","versionEndExcluding":"102.2","matchCriteriaId":"17830EE4-E342-453F-9ABC-D0E60BDBEB76"}]}]}],"references":[{"url":"https://www.cloudfoundry.org/blog/cve-2018-1269","source":"security_alert@emc.com","tags":["Third Party Advisory"]},{"url":"https://www.cloudfoundry.org/blog/cve-2018-1269","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}