id stringlengths 13 16 | published stringlengths 19 19 | modified timestamp[ns] | details stringlengths 30 3.87k | severity listlengths 1 1 ⌀ | repo_url stringlengths 23 68 | cwes sequencelengths 0 1 | commits sequencelengths 1 4 |
|---|---|---|---|---|---|---|---|
CVE-2024-23827 | 2024-01-29T16:15:09 | 2025-01-14T12:11:56.492000 | Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It's possible to leverage the vulnerability into a remot... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/0xjacky/nginx-ui | [] | [
"02fb07f6b4885c599e84077078e095a1007dae61"
] |
CVE-2024-22197 | 2024-01-11T18:15:45 | 2025-01-15T05:07:00.916000 | Nginx-ui is online statistics for Server Indicators Monitor CPU usage, memory usage, load average, and disk usage in real-time. The `Home > Preference` page exposes a small list of nginx settings such as `Nginx Access Log Path` and `Nginx Error Log Path`. However, the API also exposes `test_config_cmd`, `reload_cmd` ... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/0xjacky/nginx-ui | [] | [
"02fb07f6b4885c599e84077078e095a1007dae61"
] |
CVE-2024-22198 | 2024-01-11T20:15:45 | 2025-01-15T05:07:06.192000 | Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/0xjacky/nginx-ui | [] | [
"02fb07f6b4885c599e84077078e095a1007dae61"
] |
CVE-2024-22196 | 2024-01-11T20:15:44 | 2025-01-15T05:06:59.257000 | Nginx-UI is an online statistics for Server Indicators Monitor CPU usage, memory usage, load average, and disk usage in real-time. This issue may lead to information disclosure. By using `DefaultQuery`, the `"desc"` and `"id"` values are used as default values if the query parameters are not set. Thus, the `order` an... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/0xjacky/nginx-ui | [] | [
"02fb07f6b4885c599e84077078e095a1007dae61"
] |
CVE-2024-49367 | 2024-10-21T17:15:03 | 2024-11-07T23:57:17.678000 | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, the log path of nginxui is controllable. This issue can be combined with the directory traversal at `/api/configs` to read directories and file contents on the server. Version 2.0.0-beta.36 fixes the issue. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/0xjacky/nginx-ui | [] | [
"02fb07f6b4885c599e84077078e095a1007dae61"
] |
CVE-2024-49368 | 2024-10-21T17:15:03 | 2024-11-07T06:57:09.884000 | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, when Nginx UI configures logrotate, it does not verify the input and directly passes it to exec.Command, causing arbitrary command execution. Version 2.0.0-beta.36 fixes this issue. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/0xjacky/nginx-ui | [] | [
"02fb07f6b4885c599e84077078e095a1007dae61"
] |
CVE-2024-49366 | 2024-10-21T17:15:03 | 2024-11-07T23:57:17.762000 | Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fi... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/0xjacky/nginx-ui | [] | [
"02fb07f6b4885c599e84077078e095a1007dae61"
] |
CVE-2023-22478 | 2023-01-14T01:15:14 | 2025-01-15T04:41:08.774000 | KubePi is a modern Kubernetes panel. The API interfaces with unauthorized entities and may leak sensitive information. This issue has been patched in version 1.6.4. There are currently no known workarounds. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/1panel-dev/kubepi | [] | [
"da784f5532ea2495b92708cacb32703bff3a45a3"
] |
CVE-2023-22463 | 2023-01-04T16:15:09 | 2025-01-15T04:41:05.928000 | KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the adm... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/1panel-dev/kubepi | [] | [
"da784f5532ea2495b92708cacb32703bff3a45a3"
] |
CVE-2024-36814 | 2024-10-08T19:15:13 | 2025-02-19T03:37:40.162000 | An arbitrary file read vulnerability in Adguard Home before v0.107.52 allows authenticated attackers to access arbitrary files as root on the underlying Operating System via placing a crafted file into a readable directory. | null | https://github.com/adguardteam/adguardhome | [] | [
"f68f6c9b37cea1f33cb6fa791e6678b9df3a237b"
] |
CVE-2021-27935 | 2021-03-03T20:15:12 | 2025-02-19T03:17:56.091000 | An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/adguardteam/adguardhome | [] | [
"f68f6c9b37cea1f33cb6fa791e6678b9df3a237b"
] |
CVE-2019-16060 | 2019-09-06T19:15:11 | 2025-01-14T07:47:12.597000 | The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected). | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/airbrake/airbrake-ruby | [] | [
"2b63f98566e514f440dba8b107ddc3adc22cba66"
] |
CVE-2024-29192 | 2024-04-04T18:15:14 | 2025-01-15T05:11:31.570000 | gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to Cross-Site Request Forgery. The `/api/config` endpoint allows one to modify the existing configuration with user-supplied values. While the API is only allowing localhost to interact without authentication, an attacker may be able to ... | null | https://github.com/alexxit/go2rtc | [] | [
"ccec41a10f2636676befea50aa4cee2aa9d1d75a"
] |
CVE-2024-29191 | 2024-04-04T15:15:39 | 2025-01-15T05:11:29.073000 | gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The links page (`links.html`) appends the `src` GET parameter (`[0]`) in all of its links for 1-click previews. The context in which `src` is being appended is `innerHTML` (`[1]`), which will insert the... | null | https://github.com/alexxit/go2rtc | [] | [
"ccec41a10f2636676befea50aa4cee2aa9d1d75a"
] |
CVE-2024-47067 | 2024-09-30T16:15:09 | 2025-02-19T03:38:38.186000 | AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/alistgo/alist | [] | [
"a64dd4885ece1709e5287e07dbb4d6832fd1d3b1"
] |
CVE-2020-21485 | 2023-06-20T15:15:11 | 2025-01-14T08:37:58.264000 | Cross Site Scripting vulnerability in Alluxio v.1.8.1 allows a remote attacker to executea arbitrary code via the path parameter in the browse board component. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/alluxio/alluxio | [] | [
"79c6fb4e11e84c08f7866aef97d4e1798f937782"
] |
CVE-2023-38889 | 2023-08-15T17:15:11 | 2025-01-14T11:53:18.572000 | An issue in Alluxio v.2.9.3 and before allows an attacker to execute arbitrary code via a crafted script to the username parameter of lluxio.util.CommonUtils.getUnixGroups(java.lang.String). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/alluxio/alluxio | [] | [
"79c6fb4e11e84c08f7866aef97d4e1798f937782"
] |
CVE-2022-23848 | 2022-02-20T19:15:09 | 2025-01-14T10:49:34.680000 | In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/alluxio/alluxio | [] | [
"79c6fb4e11e84c08f7866aef97d4e1798f937782"
] |
CVE-2024-47182 | 2024-09-27T14:15:04 | 2024-10-09T20:59:08.152000 | Dozzle is a realtime log viewer for docker containers. Before version 8.5.3, the app uses sha-256 as the hash for passwords, which leaves users susceptible to rainbow table attacks. The app switches to bcrypt, a more appropriate hash for passwords, in version 8.5.3. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/amir20/dozzle | [] | [
"3c15ac225c5d85701ecbfdae71aad419cf23101d"
] |
CVE-2023-24827 | 2023-02-07T01:15:09 | 2025-01-15T04:44:26.181000 | syft is a a CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. A password disclosure flaw was found in Syft versions v0.69.0 and v0.69.1. This flaw leaks the password stored in the SYFT_ATTEST_PASSWORD environment variable. The `SYFT_ATTEST_PASSWORD` enviro... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/anchore/syft | [] | [
"1530ef354ffaf59cef6a02c949f2cdb82353954f"
] |
CVE-2021-32721 | 2021-06-29T19:15:09 | 2025-01-14T09:14:44.520000 | PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link.... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/andrewburian/powermux | [] | [
"d905ec837601bedbff48f47b476c6e16f232721d"
] |
CVE-2023-39059 | 2023-08-28T22:15:08 | 2025-02-19T03:33:59.662000 | An issue in ansible semaphore v.2.8.90 allows a remote attacker to execute arbitrary code via a crafted payload to the extra variables parameter. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/ansible-semaphore/semaphore | [] | [
"b94cb98ca69e3cf13ac8a830c6fb59e433cd9261"
] |
CVE-2020-25635 | 2020-10-05T14:15:13 | 2025-02-19T03:09:29.286000 | A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ansible/ansible | [] | [
"0e68601002de5e4e0b06dde6a8f737ebd3312349"
] |
CVE-2020-25636 | 2020-10-05T13:15:13 | 2025-02-19T03:09:29.066000 | A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/ansible/ansible | [] | [
"0e68601002de5e4e0b06dde6a8f737ebd3312349"
] |
CVE-2023-1238 | 2023-03-07T08:15:09 | 2025-01-15T04:39:03.838000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1538 | 2023-03-21T05:15:09 | 2025-01-15T04:40:03.446000 | Observable Timing Discrepancy in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1541 | 2023-03-21T05:15:10 | 2025-01-15T04:39:58.827000 | Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1240 | 2023-03-07T08:15:09 | 2025-01-15T04:39:05.361000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1535 | 2023-03-21T05:15:08 | 2025-01-15T04:39:50.097000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1245 | 2023-03-07T08:15:10 | 2025-01-15T04:39:10.254000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1542 | 2023-03-21T05:15:10 | 2025-01-15T04:39:58.979000 | Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1543 | 2023-03-21T05:15:10 | 2025-01-15T04:40:01.589000 | Insufficient Session Expiration in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1540 | 2023-03-21T05:15:09 | 2025-01-15T04:39:59.455000 | Observable Response Discrepancy in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1536 | 2023-03-21T05:15:09 | 2025-01-15T04:39:51.668000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1244 | 2023-03-07T08:15:09 | 2025-01-15T04:39:01.406000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1537 | 2023-03-21T05:15:09 | 2025-01-15T04:39:54.444000 | Authentication Bypass by Capture-replay in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1243 | 2023-03-07T08:15:09 | 2025-01-15T04:39:04.879000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1239 | 2023-03-07T08:15:09 | 2025-01-15T04:39:12.191000 | Cross-site Scripting (XSS) - Reflected in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1241 | 2023-03-07T08:15:09 | 2025-01-15T04:39:10.757000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1242 | 2023-03-07T08:15:09 | 2025-01-15T04:39:01.260000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1237 | 2023-03-07T08:15:08 | 2025-01-15T04:39:03.349000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1539 | 2023-03-21T05:15:09 | 2025-01-15T04:39:53.428000 | Improper Restriction of Excessive Authentication Attempts in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1975 | 2023-04-11T10:15:18 | 2025-01-15T04:40:45.424000 | Insertion of Sensitive Information Into Sent Data in GitHub repository answerdev/answer prior to 1.0.8. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1976 | 2023-04-11T11:15:08 | 2025-01-15T04:40:57.059000 | Password Aging with Long Expiration in GitHub repository answerdev/answer prior to 1.0.6. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-1974 | 2023-04-11T10:15:17 | 2025-01-15T04:40:44.950000 | Exposure of Sensitive Information Through Metadata in GitHub repository answerdev/answer prior to 1.0.8. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-4127 | 2023-08-03T04:15:11 | 2025-01-15T04:57:48.860000 | Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-4125 | 2023-08-03T04:15:11 | 2025-01-15T04:57:51.490000 | Weak Password Requirements in GitHub repository answerdev/answer prior to v1.1.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-4124 | 2023-08-03T04:15:11 | 2025-01-15T04:57:45.774000 | Missing Authorization in GitHub repository answerdev/answer prior to v1.1.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-4126 | 2023-08-03T04:15:11 | 2025-01-15T04:57:50.702000 | Insufficient Session Expiration in GitHub repository answerdev/answer prior to v1.1.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-4815 | 2023-09-07T07:15:08 | 2025-01-15T05:01:24.289000 | Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-0739 | 2023-02-08T05:15:11 | 2025-01-15T04:34:49.667000 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in GitHub repository answerdev/answer prior to 1.0.4. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-0740 | 2023-02-08T08:15:08 | 2025-01-15T04:34:29.435000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-0743 | 2023-02-08T08:15:08 | 2025-01-15T04:34:34.948000 | Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-0934 | 2023-02-21T15:15:12 | 2025-01-15T04:38:30.328000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-0742 | 2023-02-08T08:15:08 | 2025-01-15T04:34:39.337000 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-0744 | 2023-02-08T08:15:08 | 2025-01-15T04:34:59.140000 | Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-0741 | 2023-02-08T08:15:08 | 2025-01-15T04:34:52.227000 | Cross-site Scripting (XSS) - DOM in GitHub repository answerdev/answer prior to 1.0.4. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2023-2590 | 2023-05-09T06:15:08 | 2025-01-15T04:46:15.979000 | Missing Authorization in GitHub repository answerdev/answer prior to 1.0.9. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/answerdev/answer | [] | [
"f2046190d6a399a115a214b1d62c4c291ac7d03c"
] |
CVE-2021-33190 | 2021-06-08T15:15:08 | 2025-01-14T09:16:03.067000 | In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, th... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apache/apisix-dashboard | [] | [
"c574813eea82edcd6d95a2ea0f8857b736049717"
] |
CVE-2021-45232 | 2021-12-27T15:15:07 | 2025-02-19T03:22:27.483000 | In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authenticatio... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/apache/apisix-dashboard | [] | [
"c574813eea82edcd6d95a2ea0f8857b736049717"
] |
CVE-2023-26512 | 2023-07-17T08:15:09 | 2025-02-08T01:53:55.225000 | CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message and
remote code execute via rabbitmq messages. Users can use the code under the master branch in project r... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/apache/eventmesh | [] | [
"63ac4ec808933a64b048a3988f6c91671d2bc41a"
] |
CVE-2023-49619 | 2024-01-10T09:15:44 | 2025-01-14T12:06:17.335000 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.2.0.
Under normal circumstances, a user can only bookmark a question once, and will only increase the number of questions bookmarked once. However, re... | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apache/incubator-answer | [] | [
"8a3b19fd32fabae4eed98a1f240a01f27bebdf5f"
] |
CVE-2024-41888 | 2024-08-12T13:38:31 | 2025-01-14T12:17:10.491000 | Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
The password reset link remains valid within its expiration period even after it has been used. This could potentially lead to the link being misused or hijacked.
Users are recommended... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apache/incubator-answer | [] | [
"8a3b19fd32fabae4eed98a1f240a01f27bebdf5f"
] |
CVE-2024-41890 | 2024-08-12T13:38:31 | 2025-01-14T12:18:15.627000 | Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked.
Users are... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apache/incubator-answer | [] | [
"8a3b19fd32fabae4eed98a1f240a01f27bebdf5f"
] |
CVE-2024-26578 | 2024-02-22T10:15:08 | 2025-02-13T19:47:28.902000 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.
Repeated submission during registration resulted in the registration of the same user. When users register, if they rapidly submit multiple registr... | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apache/incubator-answer | [] | [
"8a3b19fd32fabae4eed98a1f240a01f27bebdf5f"
] |
CVE-2024-23349 | 2024-02-22T10:15:08 | 2025-01-15T05:07:49.383000 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.
XSS attack when user enters summary. A logged-in user, when modifying their own submitted question, can input malicious code in the summary to create such... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apache/incubator-answer | [] | [
"8a3b19fd32fabae4eed98a1f240a01f27bebdf5f"
] |
CVE-2021-24117 | 2021-07-14T14:15:08 | 2025-01-15T01:47:51.455000 | In Apache Teaclave Rust SGX SDK 1.1.3, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially I... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apache/incubator-teaclave-sgx-sdk | [] | [
"bc2d7e245679423312be2deb51701587b4070681"
] |
CVE-2020-5499 | 2020-01-04T07:15:11 | 2025-01-14T08:47:42.557000 | Baidu Rust SGX SDK through 1.0.8 has an enclave ID race. There are non-deterministic results in which, sometimes, two global IDs are the same. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/apache/incubator-teaclave-sgx-sdk | [] | [
"bc2d7e245679423312be2deb51701587b4070681"
] |
CVE-2021-43350 | 2021-11-11T13:15:07 | 2025-01-14T10:00:35.339000 | An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/apache/incubator-trafficcontrol | [] | [
"a52ae6cda73ef477aec691b0d27701326d20e025"
] |
CVE-2022-23206 | 2022-02-06T16:15:07 | 2025-01-14T10:47:39.253000 | In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apache/incubator-trafficcontrol | [] | [
"a52ae6cda73ef477aec691b0d27701326d20e025"
] |
CVE-2023-46302 | 2023-11-20T09:15:07 | 2025-01-14T12:02:36.924000 | Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 .
Apache Submarine uses JAXRS to define REST endpoints. In order to
handle YAML requests (using application/yaml content-type), it defines
a YamlEntityPro... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/apache/submarine | [] | [
"e7c6a546b8db2d168c3dfa4a6c99b07601887ec3"
] |
CVE-2023-37924 | 2023-11-22T10:15:07 | 2025-01-14T11:49:55.641000 | Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a user logs in. This issue can result in unauthorized login.
Now we have fixed this issue and now user must have the correct login to access workbench.
This issue affects Apache Submarine: from 0.7.0 before 0.8.0. We recommend that all ... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/apache/submarine | [] | [
"e7c6a546b8db2d168c3dfa4a6c99b07601887ec3"
] |
CVE-2023-30549 | 2023-04-25T21:15:10 | 2025-01-15T05:09:55.730000 | Apptainer is an open source container platform for Linux. There is an ext4 use-after-free flaw that is exploitable through versions of Apptainer < 1.1.0 and installations that include apptainer-suid < 1.1.8 on older operating systems where that CVE has not been patched. That includes Red Hat Enterprise Linux 7, Debian ... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/apptainer/apptainer | [] | [
"744c94b5837d34d12d15cb87298b989b3c77f050"
] |
CVE-2023-38496 | 2023-07-25T22:15:10 | 2025-01-14T11:50:25.093000 | Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to del... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apptainer/apptainer | [] | [
"744c94b5837d34d12d15cb87298b989b3c77f050"
] |
CVE-2020-15229 | 2020-10-14T19:15:13 | 2025-01-15T01:43:17.478000 | Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesy... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/apptainer/singularity | [] | [
"98ad49a3de9043ea287d65f4d544632ff074e506"
] |
CVE-2023-42374 | 2024-02-13T01:15:07 | 2025-01-15T05:04:44.918000 | An issue in mystenlabs Sui Blockchain before v.1.6.3 allow a remote attacker to execute arbitrary code and cause a denial of service via a crafted compressed script to the Sui node component. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/aptos-labs/aptos-core | [] | [
"6b610f4fc36098662dd0742ecc16687b8b535bb3"
] |
CVE-2023-36184 | 2023-09-08T02:15:08 | 2025-01-15T04:56:09.741000 | CMysten Labs Sui blockchain v1.2.0 was discovered to contain a stack overflow via the component /spec/openrpc.json. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/aptos-labs/aptos-core | [] | [
"6b610f4fc36098662dd0742ecc16687b8b535bb3"
] |
CVE-2024-35192 | 2024-05-20T21:15:09 | 2025-01-15T05:14:40.531000 | Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is able to trigger Trivy to scan container images from a crafted malicious registry, it could result in the leakage of credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure... | null | https://github.com/aquasecurity/trivy | [] | [
"8016b821a260840ccb81ef520f2804b9482f3820"
] |
CVE-2023-43802 | 2023-10-18T21:15:09 | 2025-01-14T12:00:01.681000 | Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/upload` which handles request with the `filename` parameter. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate their pri... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/arduino/arduino-create-agent | [] | [
"d170a5e8d36292dfb95387d0d345d2b279b6c224"
] |
CVE-2023-43801 | 2023-10-18T22:15:09 | 2025-01-14T12:00:01.498000 | Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/arduino/arduino-create-agent | [] | [
"d170a5e8d36292dfb95387d0d345d2b279b6c224"
] |
CVE-2023-43800 | 2023-10-18T22:15:09 | 2025-01-14T11:59:58.705000 | Arduino Create Agent is a package to help manage Arduino development. The vulnerability affects the endpoint `/v2/pkgs/tools/installed`. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate his privileges to those of the user running t... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/arduino/arduino-create-agent | [] | [
"d170a5e8d36292dfb95387d0d345d2b279b6c224"
] |
CVE-2023-43803 | 2023-10-18T21:15:09 | 2025-01-14T12:00:00.918000 | Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration... | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/arduino/arduino-create-agent | [] | [
"d170a5e8d36292dfb95387d0d345d2b279b6c224"
] |
CVE-2023-49296 | 2023-12-13T20:15:49 | 2025-01-15T05:01:57.947000 | The Arduino Create Agent allows users to use the Arduino Create applications to upload code to any USB connected Arduino board directly from the browser. A vulnerability in versions prior to 1.3.6 affects the endpoint `/certificate.crt` and the way the web interface of the ArduinoCreateAgent handles custom error messag... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/arduino/arduino-create-agent | [] | [
"d170a5e8d36292dfb95387d0d345d2b279b6c224"
] |
CVE-2022-25856 | 2022-06-17T20:15:10 | 2025-01-15T02:19:10.176000 | The package github.com/argoproj/argo-events/sensors/artifacts before 1.7.1 are vulnerable to Directory Traversal in the (g *GitArtifactReader).Read() API in git.go. This could allow arbitrary file reads if the GitArtifactReader is provided a pathname containing a symbolic link or an implicit directory name such as ... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/argoproj/argo-events | [] | [
"6b10ce4d463c312085fb33f6be12cfd137ea19bc"
] |
CVE-2022-31054 | 2022-06-13T20:15:07 | 2025-01-15T02:21:33.287000 | Argo Events is an event-driven workflow automation framework for Kubernetes. Prior to version 1.7.1, several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to ... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/argoproj/argo-events | [] | [
"6b10ce4d463c312085fb33f6be12cfd137ea19bc"
] |
CVE-2024-47827 | 2024-10-28T16:15:03 | 2024-11-05T18:46:49.986000 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with access to execute a workflow. This vulnerability is fixed in 3.6.0-rc... | [
{
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/argoproj/argo-workflows | [] | [
"3fff791e4ef5b7e1de82ccb36cae327e8eb726f6"
] |
CVE-2021-37914 | 2021-08-03T00:15:08 | 2025-01-14T09:29:07.952000 | In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"type": "CVSS_V3"
}
] | https://github.com/argoproj/argo-workflows | [] | [
"3fff791e4ef5b7e1de82ccb36cae327e8eb726f6"
] |
CVE-2022-29164 | 2022-05-06T00:15:07 | 2025-01-15T02:20:25.712000 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. In affected versions an attacker can create a workflow which produces a HTML artifact containing an HTML file that contains a script which uses XHR calls to interact with the Argo Server API. The attacker em... | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/argoproj/argo-workflows | [] | [
"3fff791e4ef5b7e1de82ccb36cae327e8eb726f6"
] |
CVE-2023-45821 | 2023-10-19T21:15:08 | 2025-02-19T03:33:07.655000 | Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which the `registryIsDockerHub` function was only checking that the registry domain had th... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
] | https://github.com/artifacthub/hub | [] | [
"053763fcbf1b9ceca27e1b8e42bd07e2b44fc32b"
] |
CVE-2023-45823 | 2023-10-19T21:15:09 | 2025-02-19T03:33:12.274000 | Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which by using symbolic links in certain kinds of repositories loaded into Artifact Hub, i... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/artifacthub/hub | [] | [
"053763fcbf1b9ceca27e1b8e42bd07e2b44fc32b"
] |
CVE-2023-45822 | 2023-10-19T21:15:08 | 2025-02-19T03:33:05.618000 | Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which a default unsafe rego built-in was allowed to be used when defining authorization po... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/artifacthub/hub | [] | [
"053763fcbf1b9ceca27e1b8e42bd07e2b44fc32b"
] |
CVE-2022-36006 | 2022-08-15T11:21:40 | 2025-01-14T11:03:16.103000 | Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions ... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/arvados/arvados | [] | [
"9393327642b82d15c195a32a7b007a30c9e6d07b"
] |
CVE-2022-39238 | 2022-09-23T08:15:09 | 2025-01-14T11:06:39.945000 | Arvados is an open source platform for managing and analyzing biomedical big data. In versions prior to 2.4.3, when using Portable Authentication Modules (PAM) for user authentication, if a user presented valid credentials but the account is disabled or otherwise not allowed to access the host (such as an expired passw... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/arvados/arvados | [] | [
"9393327642b82d15c195a32a7b007a30c9e6d07b"
] |
CVE-2019-16355 | 2019-09-16T15:15:10 | 2025-02-19T02:52:19.248000 | The File Session Manager in Beego 1.10.0 allows local users to read session files because of weak permissions for individual files. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/astaxie/beego | [] | [
"a09bafbf2ab483742b17bb352f95dbc0a597e720"
] |
CVE-2019-16354 | 2019-09-16T15:15:10 | 2025-02-19T02:52:15.645000 | The File Session Manager in Beego 1.10.0 allows local users to read session files because there is a race condition involving file creation within a directory with weak permissions. | [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/astaxie/beego | [] | [
"a09bafbf2ab483742b17bb352f95dbc0a597e720"
] |
CVE-2021-29456 | 2021-04-21T19:15:35 | 2025-02-19T03:18:21.882000 | Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any domain, including p... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/authelia/authelia | [] | [
"6ea62657d90ce480780befdc4284bf0d79be1e07"
] |
CVE-2021-32637 | 2021-05-28T17:15:07 | 2025-01-15T01:54:17.696000 | Authelia is a a single sign-on multi-factor portal for web apps. This affects uses who are using nginx ngx_http_auth_request_module with Authelia, it allows a malicious individual who crafts a malformed HTTP request to bypass the authentication mechanism. It additionally could theoretically affect other proxy servers, ... | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/authelia/authelia | [] | [
"6ea62657d90ce480780befdc4284bf0d79be1e07"
] |
CVE-2025-24806 | 2025-02-19T18:15:24 | 2025-02-20T08:55:15.346000 | Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats these as separate login events. This leads to the regulation limitat... | null | https://github.com/authelia/authelia | [] | [
"6ea62657d90ce480780befdc4284bf0d79be1e07"
] |
CVE-2024-27101 | 2024-03-01T21:15:08 | 2025-01-15T05:10:03.647000 | SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Integer overflow in chunking helper causes dispatching to miss elements or panic. Any SpiceDB cluster with any schema where a resource being checked has more than 65535 relationships for th... | null | https://github.com/authzed/spicedb | [] | [
"10616c73e4dfcebb282372ec8d4d878cf220ec94"
] |
CVE-2024-32001 | 2024-04-10T23:15:07 | 2025-01-15T05:12:26.817000 | SpiceDB is a graph database purpose-built for storing and evaluating access control data. Use of a relation of the form: `relation folder: folder | folder#parent` with an arrow such as `folder->view` can cause LookupSubjects to only return the subjects found under subjects for either `folder` or `folder#parent`. This b... | null | https://github.com/authzed/spicedb | [] | [
"10616c73e4dfcebb282372ec8d4d878cf220ec94"
] |
End of preview. Expand in Data Studio
Raw vulnerability data collected using eyeballvul.
- Downloads last month
- 3