Datasets:

Modalities:
Text
Formats:
json
Libraries:
Datasets
pandas
License:
Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
13
16
published
stringlengths
19
19
modified
timestamp[ns]
details
stringlengths
30
3.87k
severity
listlengths
1
1
repo_url
stringlengths
23
68
cwes
sequencelengths
0
1
commits
sequencelengths
1
4
CVE-2024-23827
2024-01-29T16:15:09
2025-01-14T12:11:56.492000
Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It's possible to leverage the vulnerability into a remot...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/0xjacky/nginx-ui
[]
[ "02fb07f6b4885c599e84077078e095a1007dae61" ]
CVE-2024-22197
2024-01-11T18:15:45
2025-01-15T05:07:00.916000
Nginx-ui is online statistics for Server Indicators​​ Monitor CPU usage, memory usage, load average, and disk usage in real-time. The `Home > Preference` page exposes a small list of nginx settings such as `Nginx Access Log Path` and `Nginx Error Log Path`. However, the API also exposes `test_config_cmd`, `reload_cmd` ...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/0xjacky/nginx-ui
[]
[ "02fb07f6b4885c599e84077078e095a1007dae61" ]
CVE-2024-22198
2024-01-11T20:15:45
2025-01-15T05:07:06.192000
Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/0xjacky/nginx-ui
[]
[ "02fb07f6b4885c599e84077078e095a1007dae61" ]
CVE-2024-22196
2024-01-11T20:15:44
2025-01-15T05:06:59.257000
Nginx-UI is an online statistics for Server Indicators​​ Monitor CPU usage, memory usage, load average, and disk usage in real-time. This issue may lead to information disclosure. By using `DefaultQuery`, the `"desc"` and `"id"` values are used as default values if the query parameters are not set. Thus, the `order` an...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/0xjacky/nginx-ui
[]
[ "02fb07f6b4885c599e84077078e095a1007dae61" ]
CVE-2024-49367
2024-10-21T17:15:03
2024-11-07T23:57:17.678000
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, the log path of nginxui is controllable. This issue can be combined with the directory traversal at `/api/configs` to read directories and file contents on the server. Version 2.0.0-beta.36 fixes the issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/0xjacky/nginx-ui
[]
[ "02fb07f6b4885c599e84077078e095a1007dae61" ]
CVE-2024-49368
2024-10-21T17:15:03
2024-11-07T06:57:09.884000
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, when Nginx UI configures logrotate, it does not verify the input and directly passes it to exec.Command, causing arbitrary command execution. Version 2.0.0-beta.36 fixes this issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/0xjacky/nginx-ui
[]
[ "02fb07f6b4885c599e84077078e095a1007dae61" ]
CVE-2024-49366
2024-10-21T17:15:03
2024-11-07T23:57:17.762000
Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fi...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/0xjacky/nginx-ui
[]
[ "02fb07f6b4885c599e84077078e095a1007dae61" ]
CVE-2023-22478
2023-01-14T01:15:14
2025-01-15T04:41:08.774000
KubePi is a modern Kubernetes panel. The API interfaces with unauthorized entities and may leak sensitive information. This issue has been patched in version 1.6.4. There are currently no known workarounds.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/1panel-dev/kubepi
[]
[ "da784f5532ea2495b92708cacb32703bff3a45a3" ]
CVE-2023-22463
2023-01-04T16:15:09
2025-01-15T04:41:05.928000
KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the adm...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/1panel-dev/kubepi
[]
[ "da784f5532ea2495b92708cacb32703bff3a45a3" ]
CVE-2024-36814
2024-10-08T19:15:13
2025-02-19T03:37:40.162000
An arbitrary file read vulnerability in Adguard Home before v0.107.52 allows authenticated attackers to access arbitrary files as root on the underlying Operating System via placing a crafted file into a readable directory.
null
https://github.com/adguardteam/adguardhome
[]
[ "f68f6c9b37cea1f33cb6fa791e6678b9df3a237b" ]
CVE-2021-27935
2021-03-03T20:15:12
2025-02-19T03:17:56.091000
An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/adguardteam/adguardhome
[]
[ "f68f6c9b37cea1f33cb6fa791e6678b9df3a237b" ]
CVE-2019-16060
2019-09-06T19:15:11
2025-01-14T07:47:12.597000
The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected).
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/airbrake/airbrake-ruby
[]
[ "2b63f98566e514f440dba8b107ddc3adc22cba66" ]
CVE-2024-29192
2024-04-04T18:15:14
2025-01-15T05:11:31.570000
gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to Cross-Site Request Forgery. The `/api/config` endpoint allows one to modify the existing configuration with user-supplied values. While the API is only allowing localhost to interact without authentication, an attacker may be able to ...
null
https://github.com/alexxit/go2rtc
[]
[ "ccec41a10f2636676befea50aa4cee2aa9d1d75a" ]
CVE-2024-29191
2024-04-04T15:15:39
2025-01-15T05:11:29.073000
gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The links page (`links.html`) appends the `src` GET parameter (`[0]`) in all of its links for 1-click previews. The context in which `src` is being appended is `innerHTML` (`[1]`), which will insert the...
null
https://github.com/alexxit/go2rtc
[]
[ "ccec41a10f2636676befea50aa4cee2aa9d1d75a" ]
CVE-2024-47067
2024-09-30T16:15:09
2025-02-19T03:38:38.186000
AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/alistgo/alist
[]
[ "a64dd4885ece1709e5287e07dbb4d6832fd1d3b1" ]
CVE-2020-21485
2023-06-20T15:15:11
2025-01-14T08:37:58.264000
Cross Site Scripting vulnerability in Alluxio v.1.8.1 allows a remote attacker to executea arbitrary code via the path parameter in the browse board component.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/alluxio/alluxio
[]
[ "79c6fb4e11e84c08f7866aef97d4e1798f937782" ]
CVE-2023-38889
2023-08-15T17:15:11
2025-01-14T11:53:18.572000
An issue in Alluxio v.2.9.3 and before allows an attacker to execute arbitrary code via a crafted script to the username parameter of lluxio.util.CommonUtils.getUnixGroups(java.lang.String).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/alluxio/alluxio
[]
[ "79c6fb4e11e84c08f7866aef97d4e1798f937782" ]
CVE-2022-23848
2022-02-20T19:15:09
2025-01-14T10:49:34.680000
In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/alluxio/alluxio
[]
[ "79c6fb4e11e84c08f7866aef97d4e1798f937782" ]
CVE-2024-47182
2024-09-27T14:15:04
2024-10-09T20:59:08.152000
Dozzle is a realtime log viewer for docker containers. Before version 8.5.3, the app uses sha-256 as the hash for passwords, which leaves users susceptible to rainbow table attacks. The app switches to bcrypt, a more appropriate hash for passwords, in version 8.5.3.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/amir20/dozzle
[]
[ "3c15ac225c5d85701ecbfdae71aad419cf23101d" ]
CVE-2023-24827
2023-02-07T01:15:09
2025-01-15T04:44:26.181000
syft is a a CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. A password disclosure flaw was found in Syft versions v0.69.0 and v0.69.1. This flaw leaks the password stored in the SYFT_ATTEST_PASSWORD environment variable. The `SYFT_ATTEST_PASSWORD` enviro...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/anchore/syft
[]
[ "1530ef354ffaf59cef6a02c949f2cdb82353954f" ]
CVE-2021-32721
2021-06-29T19:15:09
2025-01-14T09:14:44.520000
PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link....
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/andrewburian/powermux
[]
[ "d905ec837601bedbff48f47b476c6e16f232721d" ]
CVE-2023-39059
2023-08-28T22:15:08
2025-02-19T03:33:59.662000
An issue in ansible semaphore v.2.8.90 allows a remote attacker to execute arbitrary code via a crafted payload to the extra variables parameter.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/ansible-semaphore/semaphore
[]
[ "b94cb98ca69e3cf13ac8a830c6fb59e433cd9261" ]
CVE-2020-25635
2020-10-05T14:15:13
2025-02-19T03:09:29.286000
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/ansible/ansible
[]
[ "0e68601002de5e4e0b06dde6a8f737ebd3312349" ]
CVE-2020-25636
2020-10-05T13:15:13
2025-02-19T03:09:29.066000
A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/ansible/ansible
[]
[ "0e68601002de5e4e0b06dde6a8f737ebd3312349" ]
CVE-2023-1238
2023-03-07T08:15:09
2025-01-15T04:39:03.838000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1538
2023-03-21T05:15:09
2025-01-15T04:40:03.446000
Observable Timing Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1541
2023-03-21T05:15:10
2025-01-15T04:39:58.827000
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1240
2023-03-07T08:15:09
2025-01-15T04:39:05.361000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1535
2023-03-21T05:15:08
2025-01-15T04:39:50.097000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1245
2023-03-07T08:15:10
2025-01-15T04:39:10.254000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1542
2023-03-21T05:15:10
2025-01-15T04:39:58.979000
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1543
2023-03-21T05:15:10
2025-01-15T04:40:01.589000
Insufficient Session Expiration in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1540
2023-03-21T05:15:09
2025-01-15T04:39:59.455000
Observable Response Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1536
2023-03-21T05:15:09
2025-01-15T04:39:51.668000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1244
2023-03-07T08:15:09
2025-01-15T04:39:01.406000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1537
2023-03-21T05:15:09
2025-01-15T04:39:54.444000
Authentication Bypass by Capture-replay in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1243
2023-03-07T08:15:09
2025-01-15T04:39:04.879000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1239
2023-03-07T08:15:09
2025-01-15T04:39:12.191000
Cross-site Scripting (XSS) - Reflected in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1241
2023-03-07T08:15:09
2025-01-15T04:39:10.757000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1242
2023-03-07T08:15:09
2025-01-15T04:39:01.260000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1237
2023-03-07T08:15:08
2025-01-15T04:39:03.349000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1539
2023-03-21T05:15:09
2025-01-15T04:39:53.428000
Improper Restriction of Excessive Authentication Attempts in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1975
2023-04-11T10:15:18
2025-01-15T04:40:45.424000
Insertion of Sensitive Information Into Sent Data in GitHub repository answerdev/answer prior to 1.0.8.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1976
2023-04-11T11:15:08
2025-01-15T04:40:57.059000
Password Aging with Long Expiration in GitHub repository answerdev/answer prior to 1.0.6.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-1974
2023-04-11T10:15:17
2025-01-15T04:40:44.950000
Exposure of Sensitive Information Through Metadata in GitHub repository answerdev/answer prior to 1.0.8.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-4127
2023-08-03T04:15:11
2025-01-15T04:57:48.860000
Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-4125
2023-08-03T04:15:11
2025-01-15T04:57:51.490000
Weak Password Requirements in GitHub repository answerdev/answer prior to v1.1.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-4124
2023-08-03T04:15:11
2025-01-15T04:57:45.774000
Missing Authorization in GitHub repository answerdev/answer prior to v1.1.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-4126
2023-08-03T04:15:11
2025-01-15T04:57:50.702000
Insufficient Session Expiration in GitHub repository answerdev/answer prior to v1.1.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-4815
2023-09-07T07:15:08
2025-01-15T05:01:24.289000
Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-0739
2023-02-08T05:15:11
2025-01-15T04:34:49.667000
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in GitHub repository answerdev/answer prior to 1.0.4.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-0740
2023-02-08T08:15:08
2025-01-15T04:34:29.435000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-0743
2023-02-08T08:15:08
2025-01-15T04:34:34.948000
Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-0934
2023-02-21T15:15:12
2025-01-15T04:38:30.328000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-0742
2023-02-08T08:15:08
2025-01-15T04:34:39.337000
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-0744
2023-02-08T08:15:08
2025-01-15T04:34:59.140000
Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-0741
2023-02-08T08:15:08
2025-01-15T04:34:52.227000
Cross-site Scripting (XSS) - DOM in GitHub repository answerdev/answer prior to 1.0.4.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2023-2590
2023-05-09T06:15:08
2025-01-15T04:46:15.979000
Missing Authorization in GitHub repository answerdev/answer prior to 1.0.9.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/answerdev/answer
[]
[ "f2046190d6a399a115a214b1d62c4c291ac7d03c" ]
CVE-2021-33190
2021-06-08T15:15:08
2025-01-14T09:16:03.067000
In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, th...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/apache/apisix-dashboard
[]
[ "c574813eea82edcd6d95a2ea0f8857b736049717" ]
CVE-2021-45232
2021-12-27T15:15:07
2025-02-19T03:22:27.483000
In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authenticatio...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/apache/apisix-dashboard
[]
[ "c574813eea82edcd6d95a2ea0f8857b736049717" ]
CVE-2023-26512
2023-07-17T08:15:09
2025-02-08T01:53:55.225000
CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via rabbitmq messages. Users can use the code under the master branch in project r...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/apache/eventmesh
[]
[ "63ac4ec808933a64b048a3988f6c91671d2bc41a" ]
CVE-2023-49619
2024-01-10T09:15:44
2025-01-14T12:06:17.335000
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer. This issue affects Apache Answer: through 1.2.0. Under normal circumstances, a user can only bookmark a question once, and will only increase the number of questions bookmarked once. However, re...
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/apache/incubator-answer
[]
[ "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" ]
CVE-2024-41888
2024-08-12T13:38:31
2025-01-14T12:17:10.491000
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. The password reset link remains valid within its expiration period even after it has been used. This could potentially lead to the link being misused or hijacked. Users are recommended...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/apache/incubator-answer
[]
[ "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" ]
CVE-2024-41890
2024-08-12T13:38:31
2025-01-14T12:18:15.627000
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/apache/incubator-answer
[]
[ "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" ]
CVE-2024-26578
2024-02-22T10:15:08
2025-02-13T19:47:28.902000
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. Repeated submission during registration resulted in the registration of the same user. When users register, if they rapidly submit multiple registr...
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/apache/incubator-answer
[]
[ "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" ]
CVE-2024-23349
2024-02-22T10:15:08
2025-01-15T05:07:49.383000
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. XSS attack when user enters summary. A logged-in user, when modifying their own submitted question, can input malicious code in the summary to create such...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/apache/incubator-answer
[]
[ "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" ]
CVE-2021-24117
2021-07-14T14:15:08
2025-01-15T01:47:51.455000
In Apache Teaclave Rust SGX SDK 1.1.3, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially I...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/apache/incubator-teaclave-sgx-sdk
[]
[ "bc2d7e245679423312be2deb51701587b4070681" ]
CVE-2020-5499
2020-01-04T07:15:11
2025-01-14T08:47:42.557000
Baidu Rust SGX SDK through 1.0.8 has an enclave ID race. There are non-deterministic results in which, sometimes, two global IDs are the same.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/apache/incubator-teaclave-sgx-sdk
[]
[ "bc2d7e245679423312be2deb51701587b4070681" ]
CVE-2021-43350
2021-11-11T13:15:07
2025-01-14T10:00:35.339000
An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/apache/incubator-trafficcontrol
[]
[ "a52ae6cda73ef477aec691b0d27701326d20e025" ]
CVE-2022-23206
2022-02-06T16:15:07
2025-01-14T10:47:39.253000
In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/apache/incubator-trafficcontrol
[]
[ "a52ae6cda73ef477aec691b0d27701326d20e025" ]
CVE-2023-46302
2023-11-20T09:15:07
2025-01-14T12:02:36.924000
Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 . Apache Submarine uses JAXRS to define REST endpoints. In order to handle YAML requests (using application/yaml content-type), it defines a YamlEntityPro...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/apache/submarine
[]
[ "e7c6a546b8db2d168c3dfa4a6c99b07601887ec3" ]
CVE-2023-37924
2023-11-22T10:15:07
2025-01-14T11:49:55.641000
Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a user logs in. This issue can result in unauthorized login. Now we have fixed this issue and now user must have the correct login to access workbench. This issue affects Apache Submarine: from 0.7.0 before 0.8.0. We recommend that all ...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/apache/submarine
[]
[ "e7c6a546b8db2d168c3dfa4a6c99b07601887ec3" ]
CVE-2023-30549
2023-04-25T21:15:10
2025-01-15T05:09:55.730000
Apptainer is an open source container platform for Linux. There is an ext4 use-after-free flaw that is exploitable through versions of Apptainer < 1.1.0 and installations that include apptainer-suid < 1.1.8 on older operating systems where that CVE has not been patched. That includes Red Hat Enterprise Linux 7, Debian ...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/apptainer/apptainer
[]
[ "744c94b5837d34d12d15cb87298b989b3c77f050" ]
CVE-2023-38496
2023-07-25T22:15:10
2025-01-14T11:50:25.093000
Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to del...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/apptainer/apptainer
[]
[ "744c94b5837d34d12d15cb87298b989b3c77f050" ]
CVE-2020-15229
2020-10-14T19:15:13
2025-01-15T01:43:17.478000
Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesy...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/apptainer/singularity
[]
[ "98ad49a3de9043ea287d65f4d544632ff074e506" ]
CVE-2023-42374
2024-02-13T01:15:07
2025-01-15T05:04:44.918000
An issue in mystenlabs Sui Blockchain before v.1.6.3 allow a remote attacker to execute arbitrary code and cause a denial of service via a crafted compressed script to the Sui node component.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/aptos-labs/aptos-core
[]
[ "6b610f4fc36098662dd0742ecc16687b8b535bb3" ]
CVE-2023-36184
2023-09-08T02:15:08
2025-01-15T04:56:09.741000
CMysten Labs Sui blockchain v1.2.0 was discovered to contain a stack overflow via the component /spec/openrpc.json.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/aptos-labs/aptos-core
[]
[ "6b610f4fc36098662dd0742ecc16687b8b535bb3" ]
CVE-2024-35192
2024-05-20T21:15:09
2025-01-15T05:14:40.531000
Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is able to trigger Trivy to scan container images from a crafted malicious registry, it could result in the leakage of credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure...
null
https://github.com/aquasecurity/trivy
[]
[ "8016b821a260840ccb81ef520f2804b9482f3820" ]
CVE-2023-43802
2023-10-18T21:15:09
2025-01-14T12:00:01.681000
Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/upload` which handles request with the `filename` parameter. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate their pri...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/arduino/arduino-create-agent
[]
[ "d170a5e8d36292dfb95387d0d345d2b279b6c224" ]
CVE-2023-43801
2023-10-18T22:15:09
2025-01-14T12:00:01.498000
Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/arduino/arduino-create-agent
[]
[ "d170a5e8d36292dfb95387d0d345d2b279b6c224" ]
CVE-2023-43800
2023-10-18T22:15:09
2025-01-14T11:59:58.705000
Arduino Create Agent is a package to help manage Arduino development. The vulnerability affects the endpoint `/v2/pkgs/tools/installed`. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate his privileges to those of the user running t...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/arduino/arduino-create-agent
[]
[ "d170a5e8d36292dfb95387d0d345d2b279b6c224" ]
CVE-2023-43803
2023-10-18T21:15:09
2025-01-14T12:00:00.918000
Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration...
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/arduino/arduino-create-agent
[]
[ "d170a5e8d36292dfb95387d0d345d2b279b6c224" ]
CVE-2023-49296
2023-12-13T20:15:49
2025-01-15T05:01:57.947000
The Arduino Create Agent allows users to use the Arduino Create applications to upload code to any USB connected Arduino board directly from the browser. A vulnerability in versions prior to 1.3.6 affects the endpoint `/certificate.crt` and the way the web interface of the ArduinoCreateAgent handles custom error messag...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/arduino/arduino-create-agent
[]
[ "d170a5e8d36292dfb95387d0d345d2b279b6c224" ]
CVE-2022-25856
2022-06-17T20:15:10
2025-01-15T02:19:10.176000
The package github.com/argoproj/argo-events/sensors/artifacts before 1.7.1 are vulnerable to Directory Traversal in the (g *GitArtifactReader).Read() API in git.go. This could allow arbitrary file reads if the GitArtifactReader is provided a pathname containing a symbolic link or an implicit directory name such as ...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/argoproj/argo-events
[]
[ "6b10ce4d463c312085fb33f6be12cfd137ea19bc" ]
CVE-2022-31054
2022-06-13T20:15:07
2025-01-15T02:21:33.287000
Argo Events is an event-driven workflow automation framework for Kubernetes. Prior to version 1.7.1, several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to ...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/argoproj/argo-events
[]
[ "6b10ce4d463c312085fb33f6be12cfd137ea19bc" ]
CVE-2024-47827
2024-10-28T16:15:03
2024-11-05T18:46:49.986000
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with access to execute a workflow. This vulnerability is fixed in 3.6.0-rc...
[ { "score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/argoproj/argo-workflows
[]
[ "3fff791e4ef5b7e1de82ccb36cae327e8eb726f6" ]
CVE-2021-37914
2021-08-03T00:15:08
2025-01-14T09:29:07.952000
In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/argoproj/argo-workflows
[]
[ "3fff791e4ef5b7e1de82ccb36cae327e8eb726f6" ]
CVE-2022-29164
2022-05-06T00:15:07
2025-01-15T02:20:25.712000
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. In affected versions an attacker can create a workflow which produces a HTML artifact containing an HTML file that contains a script which uses XHR calls to interact with the Argo Server API. The attacker em...
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/argoproj/argo-workflows
[]
[ "3fff791e4ef5b7e1de82ccb36cae327e8eb726f6" ]
CVE-2023-45821
2023-10-19T21:15:08
2025-02-19T03:33:07.655000
Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which the `registryIsDockerHub` function was only checking that the registry domain had th...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/artifacthub/hub
[]
[ "053763fcbf1b9ceca27e1b8e42bd07e2b44fc32b" ]
CVE-2023-45823
2023-10-19T21:15:09
2025-02-19T03:33:12.274000
Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which by using symbolic links in certain kinds of repositories loaded into Artifact Hub, i...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/artifacthub/hub
[]
[ "053763fcbf1b9ceca27e1b8e42bd07e2b44fc32b" ]
CVE-2023-45822
2023-10-19T21:15:08
2025-02-19T03:33:05.618000
Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which a default unsafe rego built-in was allowed to be used when defining authorization po...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/artifacthub/hub
[]
[ "053763fcbf1b9ceca27e1b8e42bd07e2b44fc32b" ]
CVE-2022-36006
2022-08-15T11:21:40
2025-01-14T11:03:16.103000
Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions ...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/arvados/arvados
[]
[ "9393327642b82d15c195a32a7b007a30c9e6d07b" ]
CVE-2022-39238
2022-09-23T08:15:09
2025-01-14T11:06:39.945000
Arvados is an open source platform for managing and analyzing biomedical big data. In versions prior to 2.4.3, when using Portable Authentication Modules (PAM) for user authentication, if a user presented valid credentials but the account is disabled or otherwise not allowed to access the host (such as an expired passw...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/arvados/arvados
[]
[ "9393327642b82d15c195a32a7b007a30c9e6d07b" ]
CVE-2019-16355
2019-09-16T15:15:10
2025-02-19T02:52:19.248000
The File Session Manager in Beego 1.10.0 allows local users to read session files because of weak permissions for individual files.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/astaxie/beego
[]
[ "a09bafbf2ab483742b17bb352f95dbc0a597e720" ]
CVE-2019-16354
2019-09-16T15:15:10
2025-02-19T02:52:15.645000
The File Session Manager in Beego 1.10.0 allows local users to read session files because there is a race condition involving file creation within a directory with weak permissions.
[ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/astaxie/beego
[]
[ "a09bafbf2ab483742b17bb352f95dbc0a597e720" ]
CVE-2021-29456
2021-04-21T19:15:35
2025-02-19T03:18:21.882000
Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any domain, including p...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/authelia/authelia
[]
[ "6ea62657d90ce480780befdc4284bf0d79be1e07" ]
CVE-2021-32637
2021-05-28T17:15:07
2025-01-15T01:54:17.696000
Authelia is a a single sign-on multi-factor portal for web apps. This affects uses who are using nginx ngx_http_auth_request_module with Authelia, it allows a malicious individual who crafts a malformed HTTP request to bypass the authentication mechanism. It additionally could theoretically affect other proxy servers, ...
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/authelia/authelia
[]
[ "6ea62657d90ce480780befdc4284bf0d79be1e07" ]
CVE-2025-24806
2025-02-19T18:15:24
2025-02-20T08:55:15.346000
Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats these as separate login events. This leads to the regulation limitat...
null
https://github.com/authelia/authelia
[]
[ "6ea62657d90ce480780befdc4284bf0d79be1e07" ]
CVE-2024-27101
2024-03-01T21:15:08
2025-01-15T05:10:03.647000
SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Integer overflow in chunking helper causes dispatching to miss elements or panic. Any SpiceDB cluster with any schema where a resource being checked has more than 65535 relationships for th...
null
https://github.com/authzed/spicedb
[]
[ "10616c73e4dfcebb282372ec8d4d878cf220ec94" ]
CVE-2024-32001
2024-04-10T23:15:07
2025-01-15T05:12:26.817000
SpiceDB is a graph database purpose-built for storing and evaluating access control data. Use of a relation of the form: `relation folder: folder | folder#parent` with an arrow such as `folder->view` can cause LookupSubjects to only return the subjects found under subjects for either `folder` or `folder#parent`. This b...
null
https://github.com/authzed/spicedb
[]
[ "10616c73e4dfcebb282372ec8d4d878cf220ec94" ]
End of preview. Expand in Data Studio

Raw vulnerability data collected using eyeballvul.

Downloads last month
3