
Cloud Vulnerability DB
A community-led vulnerabilities database
An insecure default parsing depth limit vulnerability was discovered in Datalust Seq before version 2024.3.13545. The vulnerability allows stack consumption when parsing user-supplied queries containing deeply nested expressions (Seq Issue, NVD). The issue was assigned CVE-2024-58102 and was disclosed in March 2025.
The vulnerability stems from an insufficient depth limit in the query parsing mechanism, which can lead to excessive stack consumption when processing deeply nested expressions in user queries. The issue has been assigned a CVSS v3.1 base score of 5.7 MEDIUM (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H) (NVD).
When exploited, this vulnerability can cause stack overflow and process termination, resulting in a denial-of-service condition. The impact is limited to service availability, with no direct impact on confidentiality or integrity (Seq Issue).
The vulnerability has been fixed in Seq version 2024.3.13545. Users are advised to update to this version or later as soon as possible. The fix is available through the official website download or via Docker image datalust/seq:2024.3.13545 (Seq Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."