Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2611 | Faktory is a language-agnostic persistent background job server. Prior to version 1.8.0, the Faktory web dashboard can suffer from denial of service by a crafted malicious url query param `days`. The vulnerability is related to how the backend reads the `days` URL query parameter in the Faktory web dashboard. The value is used directly without any checks to create a string slice. If a very large value is provided, the backend server ends up using a significant amount of memory and causing it to crash. Version 1.8.0 fixes this issue. |
Github GHSA |
GHSA-x4hh-vjm7-g2jv | Faktory Web Dashboard can lead to denial of service(DOS) via malicious user input |
Tue, 24 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:contribsys:faktory:*:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-24T18:55:05.037Z
Reserved: 2023-06-29T19:35:26.441Z
Link: CVE-2023-37279
Updated: 2024-08-02T17:09:33.935Z
Status : Modified
Published: 2023-09-20T22:15:13.093
Modified: 2024-11-21T08:11:23.010
Link: CVE-2023-37279
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA