Datalust

Seq

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 11.03.2025 00:00:00
  • Zuletzt bearbeitet 10.10.2025 20:29:09

An issue was discovered in Datalust Seq before 2024.3.13545. An insecure default parsing depth limit allows stack consumption when parsing user-supplied queries containing deeply nested expressions.

  • EPSS 0.15%
  • Veröffentlicht 11.03.2025 00:00:00
  • Zuletzt bearbeitet 10.10.2025 20:25:22

An issue was discovered in Datalust Seq before 2024.3.13545. Expansion of identifiers in message templates can be used to bypass the system "Event body limit bytes" setting, leading to increased resource consumption. With sufficiently large events, t...

  • EPSS 0.06%
  • Veröffentlicht 11.03.2025 00:00:00
  • Zuletzt bearbeitet 10.10.2025 20:19:26

An issue was discovered in Datalust Seq before 2024.3.13545. Missing Content-Type validation can lead to CSRF when (1) Entra ID or OpenID Connect authentication is in use and a user visits a compromised/malicious site, or (2) when username/password o...

  • EPSS 0.12%
  • Veröffentlicht 21.03.2024 14:15:07
  • Zuletzt bearbeitet 17.06.2025 13:49:42

Datalust Seq before 2023.4.11151 and 2024 before 2024.1.11146 has Incorrect Access Control because a Project Owner or Organization Owner can escalate to System privileges.

  • EPSS 0.15%
  • Veröffentlicht 22.07.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:13:03

Datalust Seq before 2023.2.9489 allows insertion of sensitive information into an externally accessible file or directory. This is exploitable only when external (SQL Server or PostgreSQL) metadata storage is used. Exploitation can only occur from a ...

Exploit
  • EPSS 0.41%
  • Veröffentlicht 27.09.2021 06:15:08
  • Zuletzt bearbeitet 21.11.2024 06:26:03

Datalust Seq before 2021.2.6259 allows users (with view filters applied to their accounts) to see query results not constrained by their view filter. This information exposure, caused by an internal cache key collision, occurs when the user's view fi...

Exploit
  • EPSS 7.42%
  • Veröffentlicht 14.03.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 04:13:15

Datalust Seq before 4.2.605 is vulnerable to Authentication Bypass (with the attacker obtaining admin access) via '"Name":"isauthenticationenabled","Value":false' in an api/settings/setting-isauthenticationenabled PUT request.