Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0.0.0 through 2.13.0.0
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.yugabyte.com/ |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: Yugabyte
Published:
Updated: 2024-08-02T05:17:49.846Z
Reserved: 2023-01-30T08:15:55.659Z
Link: CVE-2023-0574

No data.

Status : Modified
Published: 2023-02-09T15:15:11.213
Modified: 2024-11-21T07:37:25.603
Link: CVE-2023-0574

No data.