Browse all 12 CVE security advisories affecting Joyent. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Joyent provides cloud infrastructure and container technologies, powering applications through its Triton platform. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from misconfigurations and insecure default settings. The company has faced scrutiny over security incidents, including a 2019 breach affecting customer data. Security researchers have noted persistent issues with access controls and container isolation, contributing to its 12 CVE count. While offering enterprise-grade services, Joyent's security track record reveals challenges in maintaining robust protections against common web and infrastructure vulnerabilities, requiring customers to implement additional hardening measures.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2018-1171 | Joyent SmartOS 缓冲区错误漏洞 — Joyent SmartOSCWE-787 | 7.0 | - | 2018-03-19 |
| CVE-2018-1165 | Joyent SmartOS 缓冲区错误漏洞 — Joyent SmartOSCWE-122 | 7.0 | - | 2018-02-21 |
| CVE-2018-1166 | Joyent SmartOS 安全漏洞 — Joyent SmartOSCWE-416 | 7.0 | - | 2018-02-21 |
This page lists every published CVE security advisory associated with Joyent. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.