
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue in the rel_deps component of MonetDB Server v11.45.17 and v11.46.0 was discovered that allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. The vulnerability was assigned CVE-2023-36364 and was initially reported on June 21, 2023 (CVE MITRE).
The vulnerability exists in the rel_deps component of MonetDB Server and can be triggered through specially crafted SQL statements. The issue has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH) with the vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating that it is network-accessible, requires low attack complexity, and needs no privileges or user interaction to exploit (NVD). The vulnerability has been classified under CWE-89 (SQL Injection) by CISA-ADP.
When successfully exploited, this vulnerability can result in a complete Denial of Service (DoS) of the affected MonetDB Server instances. The impact is particularly severe as it affects the server's availability while requiring no special privileges to execute (NVD).
The vulnerability affects MonetDB Server versions 11.45.17 and 11.46.0. Users should monitor the official MonetDB GitHub repository for patches and updates (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."