id
stringlengths 13
16
| published
stringlengths 19
19
| modified
timestamp[ns] | details
stringlengths 30
3.87k
| severity
listlengths 1
1
⌀ | repo_url
stringlengths 23
68
| cwes
sequencelengths 0
1
| commits
sequencelengths 1
4
|
---|---|---|---|---|---|---|---|
CVE-2023-45810 | 2023-10-17T23:15:12 | 2025-01-14T12:02:02.483325 | OpenFGA is a flexible authorization/permission engine built for developers and inspired by Google Zanzibar. Affected versions of OpenFGA are vulnerable to a denial of service attack. When a number of `ListObjects` calls are executed, in some scenarios, those calls are not releasing resources even after a response has been sent, and given a sufficient call volume the service as a whole becomes unresponsive. This issue has been addressed in version 1.3.4 and the upgrade is considered backwards compatible. There are no known workarounds for this vulnerability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openfga/openfga | [] | [
"07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4"
] |
CVE-2022-39352 | 2022-11-08T08:15:09 | 2025-01-14T11:08:33.471013 | OpenFGA is a high-performance authorization/permission engine inspired by Google Zanzibar. Versions prior to 0.2.5 are vulnerable to authorization bypass under certain conditions. You are affected by this vulnerability if you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a ‘from’ statement). This issue has been patched in version v0.2.5. This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openfga/openfga | [] | [
"07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4"
] |
CVE-2022-39341 | 2022-10-25T17:15:56 | 2025-01-15T02:35:52.192529 | OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users who have wildcard (`*`) defined on tupleset relations in their authorization model are vulnerable. Version 0.2.4 contains a patch for this issue. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openfga/openfga | [] | [
"07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4"
] |
CVE-2022-39340 | 2022-10-25T17:15:56 | 2025-01-15T02:35:26.953843 | OpenFGA is an authorization/permission engine. Prior to version 0.2.4, the `streamed-list-objects` endpoint was not validating the authorization header, resulting in disclosure of objects in the store. Users `openfga/openfga` versions 0.2.3 and prior who are exposing the OpenFGA service to the internet are vulnerable. Version 0.2.4 contains a patch for this issue. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openfga/openfga | [] | [
"07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4"
] |
CVE-2022-39342 | 2022-10-25T17:15:56 | 2025-01-15T02:35:47.008276 | OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users whose model has a relation defined as a tupleset (the right hand side of a ‘from’ statement) that involves anything other than a direct relationship (e.g. ‘as self’) are vulnerable. Version 0.2.4 contains a patch for this issue. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openfga/openfga | [] | [
"07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4"
] |
CVE-2022-23542 | 2022-12-20T21:15:10 | 2025-01-14T10:44:51.364272 | OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. During an internal security assessment, it was discovered that OpenFGA version 0.3.0 is vulnerable to authorization bypass under certain conditions. This issue has been patched in version 0.3.1 and is backward compatible.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openfga/openfga | [] | [
"07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4"
] |
CVE-2025-25196 | 2025-02-19T21:15:15 | 2025-02-20T08:55:10.288518 | OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA < v1.8.4 (Helm chart < openfga-0.2.22, docker < v.1.8.4) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users on OpenFGA v1.8.4 or previous, specifically under the following conditions are affected by this authorization bypass vulnerability: 1. Calling Check API or ListObjects with a model that has a relation directly assignable to both public access AND userset with the same type. 2. A type bound public access tuple is assigned to an object. 3. userset tuple is not assigned to the same object. and 4. Check request's user field is a userset that has the same type as the type bound public access tuple's user type. Users are advised to upgrade to v1.8.5 which is backwards compatible. There are no known workarounds for this vulnerability. | null | https://github.com/openfga/openfga | [] | [
"07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4"
] |
CVE-2023-30617 | 2024-01-03T16:15:08 | 2025-01-14T11:41:32.948153 | Kruise provides automated management of large-scale applications on Kubernetes. Starting in version 0.8.0 and prior to versions 1.3.1, 1.4.1, and 1.5.2, an attacker who has gained root privilege of the node that kruise-daemon run can leverage the kruise-daemon pod to list all secrets in the entire cluster. After that, the attacker can leverage the "captured" secrets (e.g. the kruise-manager service account token) to gain extra privileges such as pod modification. Versions 1.3.1, 1.4.1, and 1.5.2 fix this issue. A workaround is available. For users that do not require imagepulljob functions, they can modify kruise-daemon-role to drop the cluster level secret get/list privilege. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openkruise/kruise | [] | [
"a477df8066a49734bc71b9f3a1716897685a3d6f"
] |
CVE-2021-3684 | 2023-03-24T20:15:08 | 2025-01-15T01:56:00.461912 | A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/assisted-installer | [] | [
"8c2351a016d7e66f712ed77642c7cf9770c726d2"
] |
CVE-2018-10937 | 2018-09-11T16:29:00 | 2025-01-15T01:31:06.793920 | A cross site scripting flaw exists in the tetonic-console component of Openshift Container Platform 3.11. An attacker with the ability to create pods can use this flaw to perform actions on the K8s API as the victim. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/console | [] | [
"eb401782f934b8eb824eae95bc827dcaa1c02662"
] |
CVE-2018-1000866 | 2018-12-10T14:29:01 | 2025-02-19T02:28:00.174924 | A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openshift/console | [] | [
"eb401782f934b8eb824eae95bc827dcaa1c02662"
] |
CVE-2023-6476 | 2024-01-09T22:15:43 | 2025-01-14T11:59:25.415571 | A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openshift/kubernetes | [] | [
"61cab315f39b698afaed5a7da13790924b1e5c76"
] |
CVE-2022-43922 | 2023-02-01T18:15:10 | 2025-01-14T11:18:36.552997 | IBM App Connect Enterprise Certified Container 4.1, 4.2, 5.0, 5.1, 5.2, 6.0, 6.1, and 6.2 could disclose sensitive information to an attacker due to a weak hash of an API Key in the configuration. IBM X-Force ID: 241583. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2022-42439 | 2023-02-06T21:15:09 | 2025-01-14T11:16:29.970123 |
IBM App Connect Enterprise 11.0.0.17 through 11.0.0.19 and 12.0.4.0 and 12.0.5.0 contains an unspecified vulnerability in the Discovery Connector nodes which may cause a 3rd party system’s credentials to be exposed to a privileged attacker. IBM X-Force ID: 238211.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2019-19350 | 2021-03-24T16:15:14 | 2025-02-19T02:58:53.987401 | An insecure modification vulnerability in the /etc/passwd file was found in the openshift/ansible-service-broker as shipped in Red Hat Openshift 4 and 3.11. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2020-14336 | 2021-06-02T12:15:08 | 2025-02-19T03:11:38.923103 | A flaw was found in the Restricted Security Context Constraints (SCC), where it allows pods to craft custom network packets. This flaw allows an attacker to cause a denial of service attack on an OpenShift Container Platform cluster if they can deploy pods. The highest threat from this vulnerability is to system availability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2021-29906 | 2021-10-08T18:15:07 | 2025-01-14T09:16:36.185352 | IBM App Connect Enterprise Certified Container 1.0, 1.1, 1.2, 1.3, 1.4 and 1.5 could disclose sensitive information to a local user when it is configured to use an IBM Cloud API key to connect to cloud-based connectors. IBM X-Force ID: 207630. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2019-3884 | 2019-08-01T14:15:13 | 2025-02-19T03:04:28.290897 | A vulnerability exists in the garbage collection mechanism of atomic-openshift. An attacker able spoof the UUID of a valid object from another namespace is able to delete children of those objects. Versions 3.6, 3.7, 3.8, 3.9, 3.10, 3.11 and 4.1 are affected. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2018-1069 | 2018-03-09T14:29:00 | 2025-01-14T07:24:52.309913 | Red Hat OpenShift Enterprise version 3.7 is vulnerable to access control override for container network filesystems. An attacker could override the UserId and GroupId for GlusterFS and NFS to read and write any data on the network filesystem. | [
{
"score": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2017-7534 | 2018-04-11T19:29:00 | 2025-01-14T07:19:34.697592 | OpenShift Enterprise version 3.x is vulnerable to a stored XSS via the log viewer for pods. The flaw is due to lack of sanitation of user input, specifically terminal escape characters, and the creation of clickable links automatically when viewing the log files for a pod. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2018-1102 | 2018-04-30T19:29:00 | 2025-01-14T07:25:58.715572 | A flaw was found in source-to-image function as shipped with Openshift Enterprise 3.x. An improper path validation of tar files in ExtractTarStreamFromTarReader in tar/tar.go leads to privilege escalation. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2017-15137 | 2018-07-16T20:29:00 | 2025-01-14T07:10:30.458949 | The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2019-19351 | 2020-03-18T17:15:11 | 2025-02-19T02:59:31.102210 | An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/jenkins. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. This CVE is specific to the openshift/jenkins-slave-base-rhel7-containera as shipped in Openshift 4 and 3.11. | [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2020-10752 | 2020-06-12T23:15:10 | 2025-02-19T03:05:31.640651 | A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2020-10715 | 2020-09-16T18:15:12 | 2025-02-19T03:05:44.203762 | A content spoofing vulnerability was found in the openshift/console 3.11 and 4.x. This flaw allows an attacker to craft a URL and inject arbitrary text onto the error page that appears to be from the OpenShift instance. This attack could potentially convince a user that the inserted text is legitimate. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin | [] | [
"cf7e336cb497b52d5034449f98e91382e4f36eb5"
] |
CVE-2022-0552 | 2022-04-11T20:15:16 | 2025-01-15T02:10:46.050812 | A flaw was found in the original fix for the netty-codec-http CVE-2021-21409, where the OpenShift Logging openshift-logging/elasticsearch6-rhel8 container was incomplete. The vulnerable netty-codec-http maven package was not removed from the image content. This flaw affects origin-aggregated-logging versions 3.11. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/origin-aggregated-logging | [] | [
"11a17d44877e178ac8dc6aefd6dda6c8dba5888e"
] |
CVE-2021-4294 | 2022-12-28T17:15:09 | 2025-01-15T02:06:57.853764 | A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/osin | [] | [
"0f3357bb07e801ea62327872d19913969001dd7a"
] |
CVE-2018-1103 | 2018-06-12T15:29:00 | 2025-02-19T02:28:17.841024 | Openshift Enterprise source-to-image before version 1.1.10 is vulnerable to an improper validation of user input. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/source-to-image | [] | [
"40ad911db82b8720f9956e8aa76371a8f185a6de"
] |
CVE-2024-7079 | 2024-07-24T16:15:07 | 2025-02-19T03:38:53.165716 | A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/openshift/telemeter | [] | [
"465bdd9c8b8e4449a63b20dea82cbd4728b2fb2c"
] |
CVE-2021-2322 | 2021-06-23T23:15:07 | 2025-01-14T08:51:49.529706 | Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | null | https://github.com/oracle/opengrok | [] | [
"e4c9c2b53cb0c7fc3c9e5b30c3892012e5937c3b"
] |
CVE-2020-15223 | 2020-09-24T17:15:13 | 2025-01-15T01:43:02.852740 | In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.34.0, the `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store. This is fixed in version 0.34.0 | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ory/fosite | [] | [
"35a1558d8d845ac15bc6ec99fb4be062716b231a"
] |
CVE-2020-15222 | 2020-09-24T17:15:13 | 2025-01-15T01:43:01.794555 | In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.31.0, when using "private_key_jwt" authentication the uniqueness of the `jti` value is not checked. When using client authentication method "private_key_jwt", OpenId specification says the following about assertion `jti`: "A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties". Hydra does not seem to check the uniqueness of this `jti` value. This problem is fixed in version 0.31.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ory/fosite | [] | [
"35a1558d8d845ac15bc6ec99fb4be062716b231a"
] |
CVE-2020-15234 | 2020-10-02T21:15:12 | 2025-01-15T01:43:06.899621 | ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite before version 0.34.1, the OAuth 2.0 Client's registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using strings.ToLower while they should have been compared with a simple string match. This allows an attacker to register a client with allowed redirect URL https://example.com/callback. Then perform an OAuth2 flow and requesting redirect URL https://example.com/CALLBACK. Instead of an error (invalid redirect URL), the browser is redirected to https://example.com/CALLBACK with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example). This vulnerability has been patched in ORY Fosite v0.34.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ory/fosite | [] | [
"35a1558d8d845ac15bc6ec99fb4be062716b231a"
] |
CVE-2020-15233 | 2020-10-02T21:15:12 | 2025-01-15T01:43:06.297282 | ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ory/fosite | [] | [
"35a1558d8d845ac15bc6ec99fb4be062716b231a"
] |
CVE-2019-8400 | 2019-02-17T06:29:00 | 2025-01-15T01:41:27.703930 | ORY Hydra before v1.0.0-rc.3+oryOS.9 has Reflected XSS via the oauth2/fallbacks/error error_hint parameter. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ory/hydra | [] | [
"1295663ada908dd431d7ffc9927feb6e2606b724"
] |
CVE-2020-5300 | 2020-04-06T17:15:13 | 2025-01-15T01:46:26.734558 | In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification says the following about assertion `jti`: "A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties". Hydra does not check the uniqueness of this `jti` value. Exploiting this vulnerability is somewhat difficult because: - TLS protects against MITM which makes it difficult to intercept valid tokens for replay attacks - The expiry time of the JWT gives only a short window of opportunity where it could be replayed This has been patched in version v1.4.0+oryOS.17 | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ory/hydra | [] | [
"1295663ada908dd431d7ffc9927feb6e2606b724"
] |
CVE-2021-32701 | 2021-06-22T20:15:08 | 2025-01-15T01:55:18.621040 | ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ory/oathkeeper | [] | [
"413393f8750796ae2b8dd02fb3735d991807ddaa"
] |
CVE-2024-29882 | 2024-03-28T14:15:14 | 2025-01-15T05:11:59.052229 | SRS is a simple, high-efficiency, real-time video server. SRS's `/api/v1/vhosts/vid-<id>?callback=<payload>` endpoint didn't filter the callback function name which led to injecting malicious javascript payloads and executing XSS ( Cross-Site Scripting). This vulnerability is fixed in 5.0.210 and 6.0.121. | null | https://github.com/ossrs/srs | [] | [
"665c30af90fb5f26c419541093d63778262577f7"
] |
CVE-2023-34105 | 2023-06-12T17:15:09 | 2025-01-15T04:54:01.098658 | SRS is a real-time video server supporting RTMP, WebRTC, HLS, HTTP-FLV, SRT, MPEG-DASH, and GB28181. Prior to versions 5.0.157, 5.0-b1, and 6.0.48, SRS's `api-server` server is vulnerable to a drive-by command injection. An attacker may send a request to the `/api/v1/snapshots` endpoint containing any commands to be executed as part of the body of the POST request. This issue may lead to Remote Code Execution (RCE). Versions 5.0.157, 5.0-b1, and 6.0.48 contain a fix. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/ossrs/srs | [] | [
"665c30af90fb5f26c419541093d63778262577f7"
] |
CVE-2022-40365 | 2022-09-14T21:15:10 | 2025-01-14T11:09:34.927898 | Cross site scripting (XSS) vulnerability in ouqiang gocron through 1.5.3, allows attackers to execute arbitrary code via scope.row.hostname in web/vue/src/pages/taskLog/list.vue. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/ouqiang/gocron | [] | [
"93c544f0d4457ee3a57f3ba4bba0a1259d6fddfc"
] |
CVE-2021-3499 | 2021-06-02T16:15:10 | 2025-01-14T09:20:17.237886 | A vulnerability was found in OVN Kubernetes in versions up to and including 0.3.0 where the Egress Firewall does not reliably apply firewall rules when there is multiple DNS rules. It could lead to potentially lose of confidentiality, integrity or availability of a service. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
] | https://github.com/ovn-org/ovn-kubernetes | [] | [
"5136ef324438d1c5bfb5a7e716fa9a760366c550"
] |
CVE-2024-29026 | 2024-03-20T22:15:08 | 2025-01-15T05:14:01.254462 | Owncast is an open source, self-hosted, decentralized, single user live video streaming and chat server. In versions 0.1.2 and prior, a lenient CORS policy allows attackers to make a cross origin request, reading privileged information. This can be used to leak the admin password. Commit 9215d9ba0f29d62201d3feea9e77dcd274581624 fixes this issue. | null | https://github.com/owncast/owncast | [] | [
"f5a045dedc7d60e58e1c22b8f6472007738f0d6e"
] |
CVE-2024-31450 | 2024-04-19T19:15:06 | 2025-01-15T05:15:33.640787 | Owncast is an open source, self-hosted, decentralized, single user live video streaming and chat server. The Owncast application exposes an administrator API at the URL /api/admin. The emoji/delete endpoint of said API allows administrators to delete custom emojis, which are saved on disk. The parameter name is taken from the JSON request and directly appended to the filepath that points to the emoji to delete. By using path traversal sequences (../), attackers with administrative privileges can exploit this endpoint to delete arbitrary files on the system, outside of the emoji directory. This vulnerability is fixed in 0.1.3. | null | https://github.com/owncast/owncast | [] | [
"f5a045dedc7d60e58e1c22b8f6472007738f0d6e"
] |
CVE-2023-46480 | 2023-11-27T23:15:07 | 2025-01-14T12:05:56.041441 | An issue in OwnCast v.0.1.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via the authHost parameter of the indieauth function. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/owncast/owncast | [] | [
"f5a045dedc7d60e58e1c22b8f6472007738f0d6e"
] |
CVE-2023-3188 | 2023-06-10T02:15:09 | 2025-01-15T04:54:43.587835 | Server-Side Request Forgery (SSRF) in GitHub repository owncast/owncast prior to 0.1.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/owncast/owncast | [] | [
"f5a045dedc7d60e58e1c22b8f6472007738f0d6e"
] |
CVE-2021-39183 | 2021-12-14T20:15:07 | 2025-01-14T09:33:59.060653 | Owncast is an open source, self-hosted live video streaming and chat server. In affected versions inline scripts are executed when Javascript is parsed via a paste action. This issue is patched in 0.0.9 by blocking unsafe-inline Content Security Policy and specifying the script-src. The worker-src is required to be set to blob for the video player. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/owncast/owncast | [] | [
"f5a045dedc7d60e58e1c22b8f6472007738f0d6e"
] |
CVE-2022-3751 | 2022-11-29T21:15:11 | 2025-01-15T02:30:05.191319 | SQL Injection in GitHub repository owncast/owncast prior to 0.0.13. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/owncast/owncast | [] | [
"f5a045dedc7d60e58e1c22b8f6472007738f0d6e"
] |
CVE-2023-52305 | 2024-01-03T09:15:09 | 2025-01-14T12:08:44.832858 | FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52313 | 2024-01-03T09:15:11 | 2025-01-14T12:09:17.006686 | FPE in paddle.argmin and paddle.argmax in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52314 | 2024-01-03T09:15:11 | 2025-01-14T12:08:46.276205 | PaddlePaddle before 2.6.0 has a command injection in convert_shape_compare. This resulted in the ability to execute arbitrary commands on the operating system.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38675 | 2024-01-03T09:15:08 | 2025-01-14T11:52:01.362829 | FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52311 | 2024-01-03T09:15:10 | 2025-01-14T12:08:51.210546 | PaddlePaddle before 2.6.0 has a command injection in _wget_download. This resulted in the ability to execute arbitrary commands on the operating system.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38677 | 2024-01-03T09:15:08 | 2025-01-14T11:52:00.880372 | FPE in paddle.linalg.eig in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38678 | 2024-01-03T09:15:08 | 2025-01-14T11:52:01.043084 | OOB access in paddle.mode in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52307 | 2024-01-03T09:15:09 | 2025-01-14T12:08:43.600824 | Stack overflow in paddle.linalg.lu_unpack in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38674 | 2024-01-03T09:15:08 | 2025-01-14T11:51:56.402259 | FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52303 | 2024-01-03T09:15:09 | 2025-01-14T12:08:40.688839 | Nullptr in paddle.put_along_axis in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52306 | 2024-01-03T09:15:09 | 2025-01-14T12:08:40.976781 | FPE in paddle.lerp in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52304 | 2024-01-03T09:15:09 | 2025-01-14T12:08:40.639685 | Stack overflow in paddle.searchsorted in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52309 | 2024-01-03T09:15:10 | 2025-01-14T12:08:45.614385 | Heap buffer overflow in paddle.repeat_interleave in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52308 | 2024-01-03T09:15:10 | 2025-01-14T12:08:44.208514 | FPE in paddle.amin in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52312 | 2024-01-03T09:15:10 | 2025-01-14T12:08:44.758027 | Nullptr dereference in paddle.crop in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38676 | 2024-01-03T09:15:08 | 2025-01-14T11:52:01.107060 | Nullptr in paddle.dot in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52310 | 2024-01-03T09:15:10 | 2025-01-14T12:08:45.333134 | PaddlePaddle before 2.6.0 has a command injection in get_online_pass_interval. This resulted in the ability to execute arbitrary commands on the operating system.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-52302 | 2024-01-03T09:15:09 | 2025-01-14T10:54:27.182711 | Nullptr in paddle.nextafter in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2024-0817 | 2024-03-07T02:15:51 | 2025-01-20T00:59:00.771690 | Command injection in IrGraph.draw in paddlepaddle/paddle 2.6.0 | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2024-1603 | 2024-03-23T19:15:07 | 2025-01-25T01:59:26.495001 | paddlepaddle/paddle 2.6.0 allows arbitrary file read via paddle.vision.ops.read_file. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2024-0917 | 2024-03-07T09:15:38 | 2025-01-20T00:58:59.763141 | remote code execution in paddlepaddle/paddle 2.6.0 | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2024-0815 | 2024-03-07T04:15:07 | 2025-01-20T00:59:00.192234 | Command injection in paddle.utils.download._wget_download (bypass filter) in paddlepaddle/paddle 2.6.0 | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2024-0818 | 2024-03-07T13:15:07 | 2025-01-24T08:49:18.101436 | Arbitrary File Overwrite Via Path Traversal in paddlepaddle/paddle before 2.6 | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38672 | 2023-07-26T12:15:09 | 2025-01-14T11:52:00.299482 | FPE in paddle.trace in PaddlePaddle before 2.5.0. This flaw can cause a runtime crash and a denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38671 | 2023-07-26T11:15:09 | 2025-01-14T11:51:55.421610 | Heap buffer overflow in paddle.trace in PaddlePaddle before 2.5.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38669 | 2023-07-26T10:15:11 | 2025-01-14T11:51:58.691686 | Use after free in paddle.diagonal in PaddlePaddle before 2.5.0. This resulted in a potentially exploitable condition.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38670 | 2023-07-26T11:15:09 | 2025-01-14T11:52:00.366099 | Null pointer dereference in paddle.flip in PaddlePaddle before 2.5.0. This resulted in a runtime crash and denial of service.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2023-38673 | 2023-07-26T12:15:09 | 2025-01-14T11:51:59.914901 | PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in the ability to execute arbitrary commands on the operating system.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2022-45908 | 2022-11-26T02:15:10 | 2025-01-15T03:56:11.487045 | In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2022-46741 | 2022-12-07T08:15:10 | 2025-01-14T11:17:15.536983 | Out-of-bounds read in gather_tree in PaddlePaddle before 2.4. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2022-46742 | 2022-12-07T09:15:09 | 2025-01-14T11:17:23.311330 | Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arbitrary code execution.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/paddlepaddle/paddle | [] | [
"64d48f4d6af515e7d3da00f37ee9938f7dd6eb96"
] |
CVE-2022-39213 | 2022-09-15T22:15:11 | 2025-01-15T02:28:26.041754 | go-cvss is a Go module to manipulate Common Vulnerability Scoring System (CVSS). In affected versions when a full CVSS v2.0 vector string is parsed using `ParseVector`, an Out-of-Bounds Read is possible due to a lack of tests. The Go module will then panic. The problem is patched in tag `v0.4.0`, by the commit `d9d478ff0c13b8b09ace030db9262f3c2fe031f4`. Users are advised to upgrade. Users unable to upgrade may avoid this issue by parsing only CVSS v2.0 vector strings that do not have all attributes defined (e.g. `AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:M/IR:M/AR:M`). As stated in [SECURITY.md](https://github.com/pandatix/go-cvss/blob/master/SECURITY.md), the CPE v2.3 to refer to this Go module is `cpe:2.3:a:pandatix:go_cvss:*:*:*:*:*:*:*:*`. The entry has already been requested to the NVD CPE dictionary. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/pandatix/go-cvss | [] | [
"2897b6dcdd15dca3d0cd54b0a1592890492cac30"
] |
CVE-2020-7920 | 2020-02-06T17:15:14 | 2025-01-14T08:47:10.267594 | pmm-server in Percona Monitoring and Management (PMM) 2.2.x before 2.2.1 allows unauthenticated denial of service. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/percona/pmm-managed | [] | [
"45ef07e0e0b49f28195f07b58f0f921763fb2f4b"
] |
CVE-2020-19278 | 2023-04-04T15:15:07 | 2025-02-14T21:50:36.540644 | Cross Site Request Forgery vulnerability found in Phachon mm-wiki v.0.1.2 allows a remote attacker to execute arbitrary code via the system/user/save parameter. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/phachon/mm-wiki | [] | [
"5e7e6dbadf5808ce241b079e5a057cbc17a6d045"
] |
CVE-2020-19277 | 2023-04-04T15:15:07 | 2025-02-13T19:51:47.142106 | Cross Site Scripting vulnerability found in Phachon mm-wiki v.0.1.2 allows a remote attacker to execute arbitrary code via javascript code in the markdown editor. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/phachon/mm-wiki | [] | [
"5e7e6dbadf5808ce241b079e5a057cbc17a6d045"
] |
CVE-2021-40289 | 2022-11-10T18:15:10 | 2025-01-14T09:48:01.366263 | mm-wki v0.2.1 is vulnerable to Cross Site Scripting (XSS). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/phachon/mm-wiki | [] | [
"5e7e6dbadf5808ce241b079e5a057cbc17a6d045"
] |
CVE-2021-39394 | 2022-08-26T13:15:08 | 2025-01-14T09:31:34.077837 | mm-wiki v0.2.1 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add user accounts and modify user information. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/phachon/mm-wiki | [] | [
"5e7e6dbadf5808ce241b079e5a057cbc17a6d045"
] |
CVE-2021-39393 | 2022-08-26T13:15:08 | 2025-01-14T09:31:33.812641 | mm-wiki v0.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the markdown editor. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/phachon/mm-wiki | [] | [
"5e7e6dbadf5808ce241b079e5a057cbc17a6d045"
] |
CVE-2022-3023 | 2022-11-04T12:15:14 | 2025-01-15T02:22:13.494603 | Use of Externally-Controlled Format String in GitHub repository pingcap/tidb prior to 6.4.0, 6.1.3. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/pingcap/tidb | [] | [
"72acdb43ffe5fe78afa599e9cc71886a703829da"
] |
CVE-2022-34969 | 2022-08-03T02:15:07 | 2025-01-14T11:02:24.920512 | PingCAP TiDB v6.1.0 was discovered to contain a NULL pointer dereference. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/pingcap/tidb | [] | [
"72acdb43ffe5fe78afa599e9cc71886a703829da"
] |
CVE-2022-31011 | 2022-05-31T20:15:08 | 2025-01-14T10:59:17.737279 | TiDB is an open-source NewSQL database that supports Hybrid Transactional and Analytical Processing (HTAP) workloads. Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access. Only users using TiDB 5.3.0 are affected by this vulnerability. TiDB version 5.3.1 contains a patch for this issue. Other mitigation strategies include turning off Security Enhanced Mode (SEM), disabling local login for non-root accounts, and ensuring that the same IP cannot be logged in as root and normal user at the same time. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/pingcap/tidb | [] | [
"72acdb43ffe5fe78afa599e9cc71886a703829da"
] |
CVE-2019-20786 | 2020-04-19T20:15:11 | 2025-01-15T01:40:30.948424 | handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/pion/dtls | [] | [
"91d652d3f91d6c08c193e4d297067f8f653775f9"
] |
CVE-2021-28681 | 2021-03-18T04:15:14 | 2025-02-19T03:17:51.932479 | Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.) | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/pion/webrtc | [] | [
"d29548ca03718e9044c9cfe3e4c14bd8e5c87a89"
] |
CVE-2018-15759 | 2018-11-19T14:29:00 | 2025-02-19T02:31:06.850334 | Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perform broker operations. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/pivotal-cf/brokerapi | [] | [
"036a459c44d734d73447be166f90d407e5602094"
] |
CVE-2023-28109 | 2023-03-16T17:15:09 | 2025-01-15T04:49:27.187914 | Play With Docker is a browser-based Docker playground. Versions 0.0.2 and prior are vulnerable to domain hijacking.
Because CORS configuration was not correct, an attacker could use `play-with-docker.com` as an example and set the origin header in an http request as `evil-play-with-docker.com`. The domain would echo in response header, which successfully bypassed the CORS policy and retrieved basic user information. This issue has been fixed in commit ed82247c9ab7990ad76ec2bf1498c2b2830b6f1a. There are no known workarounds. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/play-with-docker/play-with-docker | [] | [
"92aa3aa3f8838cccbcd3a4521bc9658c38d3a915"
] |
CVE-2023-34844 | 2023-06-29T15:15:09 | 2025-01-14T11:46:02.588942 | Play With Docker < 0.0.2 has an insecure CAP_SYS_ADMIN privileged mode causing the docker container to escape. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/play-with-docker/play-with-docker | [] | [
"92aa3aa3f8838cccbcd3a4521bc9658c38d3a915"
] |
CVE-2024-49381 | 2024-10-25T14:15:12 | 2024-11-15T07:47:40.846630 | Plenti, a static site generator, has an arbitrary file deletion vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write deletion when a plenti user serves their website. This issue may lead to information loss. Version 0.7.2 fixes the vulnerability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/plentico/plenti | [] | [
"113f9c4f9e4dc9bee094e217ede484921f2bc849"
] |
CVE-2024-39315 | 2024-07-02T20:15:06 | 2025-01-15T05:15:46.714323 | Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, that script could access these tokens by making a request to the `/.pomerium` endpoint. Upstream applications that authenticate only the ID token may be vulnerable to user impersonation using a token obtained in this manner. Note that an OAuth2 access token or ID token by itself is not sufficient to hijack a user's Pomerium session. Upstream applications should not be vulnerable to user impersonation via these tokens provided the application verifies the Pomerium JWT for each request, the connection between Pomerium and the application is secured by mTLS, or the connection between Pomerium and the application is otherwise secured at the network layer. The issue is patched in Pomerium v0.26.1. No known workarounds are available. | null | https://github.com/pomerium/pomerium | [] | [
"7692b2ac4966f2606e1cea376dd33a14c984d9c9"
] |
CVE-2024-47616 | 2024-10-02T22:15:03 | 2024-10-09T20:59:12.076863 | Pomerium is an identity and context-aware access proxy. The Pomerium databroker service is responsible for managing all persistent Pomerium application state. Requests to the databroker service API are authorized by the presence of a JSON Web Token (JWT) signed by a key known by all Pomerium services in the same deployment. However, incomplete validation of this JWT meant that some service account access tokens would incorrectly be treated as valid for the purpose of databroker API authorization. Improper access to the databroker API could allow exfiltration of user info, spoofing of user sessions, or tampering with Pomerium routes, policies, and other settings. A Pomerium deployment is susceptible to this issue if all of the following conditions are met, you have issued a service account access token using Pomerium Zero or Pomerium Enterprise, the access token has an explicit expiration date in the future, and the core Pomerium databroker gRPC API is not otherwise secured by network access controls. This vulnerability is fixed in 0.27.1. | null | https://github.com/pomerium/pomerium | [] | [
"7692b2ac4966f2606e1cea376dd33a14c984d9c9"
] |
CVE-2023-33189 | 2023-05-30T06:16:37 | 2025-01-15T04:54:25.470820 | Pomerium is an identity and context-aware access proxy. With specially crafted requests, incorrect authorization decisions may be made by Pomerium. This issue has been patched in versions 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 and 0.22.2. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/pomerium/pomerium | [] | [
"7692b2ac4966f2606e1cea376dd33a14c984d9c9"
] |
CVE-2021-29652 | 2021-04-02T14:15:13 | 2025-02-19T03:18:55.058052 | Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/pomerium/pomerium | [] | [
"a879e5fd722ff9dacdc65acc8703b530ecd52422"
] |
CVE-2021-29651 | 2021-04-02T14:15:13 | 2025-02-19T03:19:01.089803 | Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/pomerium/pomerium | [] | [
"a879e5fd722ff9dacdc65acc8703b530ecd52422"
] |
CVE-2021-41230 | 2021-11-05T23:15:08 | 2025-02-19T03:23:40.398577 | Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/pomerium/pomerium | [] | [
"7692b2ac4966f2606e1cea376dd33a14c984d9c9"
] |
Subsets and Splits