id
stringlengths
13
16
published
stringlengths
19
19
modified
timestamp[ns]
details
stringlengths
30
3.87k
severity
listlengths
1
1
repo_url
stringlengths
23
68
cwes
sequencelengths
0
1
commits
sequencelengths
1
4
CVE-2023-45810
2023-10-17T23:15:12
2025-01-14T12:02:02.483325
OpenFGA is a flexible authorization/permission engine built for developers and inspired by Google Zanzibar. Affected versions of OpenFGA are vulnerable to a denial of service attack. When a number of `ListObjects` calls are executed, in some scenarios, those calls are not releasing resources even after a response has been sent, and given a sufficient call volume the service as a whole becomes unresponsive. This issue has been addressed in version 1.3.4 and the upgrade is considered backwards compatible. There are no known workarounds for this vulnerability.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2022-39352
2022-11-08T08:15:09
2025-01-14T11:08:33.471013
OpenFGA is a high-performance authorization/permission engine inspired by Google Zanzibar. Versions prior to 0.2.5 are vulnerable to authorization bypass under certain conditions. You are affected by this vulnerability if you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a ‘from’ statement). This issue has been patched in version v0.2.5. This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2022-39341
2022-10-25T17:15:56
2025-01-15T02:35:52.192529
OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users who have wildcard (`*`) defined on tupleset relations in their authorization model are vulnerable. Version 0.2.4 contains a patch for this issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2022-39340
2022-10-25T17:15:56
2025-01-15T02:35:26.953843
OpenFGA is an authorization/permission engine. Prior to version 0.2.4, the `streamed-list-objects` endpoint was not validating the authorization header, resulting in disclosure of objects in the store. Users `openfga/openfga` versions 0.2.3 and prior who are exposing the OpenFGA service to the internet are vulnerable. Version 0.2.4 contains a patch for this issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2022-39342
2022-10-25T17:15:56
2025-01-15T02:35:47.008276
OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users whose model has a relation defined as a tupleset (the right hand side of a ‘from’ statement) that involves anything other than a direct relationship (e.g. ‘as self’) are vulnerable. Version 0.2.4 contains a patch for this issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2022-23542
2022-12-20T21:15:10
2025-01-14T10:44:51.364272
OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. During an internal security assessment, it was discovered that OpenFGA version 0.3.0 is vulnerable to authorization bypass under certain conditions. This issue has been patched in version 0.3.1 and is backward compatible.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2025-25196
2025-02-19T21:15:15
2025-02-20T08:55:10.288518
OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA < v1.8.4 (Helm chart < openfga-0.2.22, docker < v.1.8.4) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users on OpenFGA v1.8.4 or previous, specifically under the following conditions are affected by this authorization bypass vulnerability: 1. Calling Check API or ListObjects with a model that has a relation directly assignable to both public access AND userset with the same type. 2. A type bound public access tuple is assigned to an object. 3. userset tuple is not assigned to the same object. and 4. Check request's user field is a userset that has the same type as the type bound public access tuple's user type. Users are advised to upgrade to v1.8.5 which is backwards compatible. There are no known workarounds for this vulnerability.
null
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2023-30617
2024-01-03T16:15:08
2025-01-14T11:41:32.948153
Kruise provides automated management of large-scale applications on Kubernetes. Starting in version 0.8.0 and prior to versions 1.3.1, 1.4.1, and 1.5.2, an attacker who has gained root privilege of the node that kruise-daemon run can leverage the kruise-daemon pod to list all secrets in the entire cluster. After that, the attacker can leverage the "captured" secrets (e.g. the kruise-manager service account token) to gain extra privileges such as pod modification. Versions 1.3.1, 1.4.1, and 1.5.2 fix this issue. A workaround is available. For users that do not require imagepulljob functions, they can modify kruise-daemon-role to drop the cluster level secret get/list privilege.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/openkruise/kruise
[]
[ "a477df8066a49734bc71b9f3a1716897685a3d6f" ]
CVE-2021-3684
2023-03-24T20:15:08
2025-01-15T01:56:00.461912
A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/assisted-installer
[]
[ "8c2351a016d7e66f712ed77642c7cf9770c726d2" ]
CVE-2018-10937
2018-09-11T16:29:00
2025-01-15T01:31:06.793920
A cross site scripting flaw exists in the tetonic-console component of Openshift Container Platform 3.11. An attacker with the ability to create pods can use this flaw to perform actions on the K8s API as the victim.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/console
[]
[ "eb401782f934b8eb824eae95bc827dcaa1c02662" ]
CVE-2018-1000866
2018-12-10T14:29:01
2025-02-19T02:28:00.174924
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openshift/console
[]
[ "eb401782f934b8eb824eae95bc827dcaa1c02662" ]
CVE-2023-6476
2024-01-09T22:15:43
2025-01-14T11:59:25.415571
A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/openshift/kubernetes
[]
[ "61cab315f39b698afaed5a7da13790924b1e5c76" ]
CVE-2022-43922
2023-02-01T18:15:10
2025-01-14T11:18:36.552997
IBM App Connect Enterprise Certified Container 4.1, 4.2, 5.0, 5.1, 5.2, 6.0, 6.1, and 6.2 could disclose sensitive information to an attacker due to a weak hash of an API Key in the configuration. IBM X-Force ID: 241583.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2022-42439
2023-02-06T21:15:09
2025-01-14T11:16:29.970123
IBM App Connect Enterprise 11.0.0.17 through 11.0.0.19 and 12.0.4.0 and 12.0.5.0 contains an unspecified vulnerability in the Discovery Connector nodes which may cause a 3rd party system’s credentials to be exposed to a privileged attacker. IBM X-Force ID: 238211.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2019-19350
2021-03-24T16:15:14
2025-02-19T02:58:53.987401
An insecure modification vulnerability in the /etc/passwd file was found in the openshift/ansible-service-broker as shipped in Red Hat Openshift 4 and 3.11. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2020-14336
2021-06-02T12:15:08
2025-02-19T03:11:38.923103
A flaw was found in the Restricted Security Context Constraints (SCC), where it allows pods to craft custom network packets. This flaw allows an attacker to cause a denial of service attack on an OpenShift Container Platform cluster if they can deploy pods. The highest threat from this vulnerability is to system availability.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2021-29906
2021-10-08T18:15:07
2025-01-14T09:16:36.185352
IBM App Connect Enterprise Certified Container 1.0, 1.1, 1.2, 1.3, 1.4 and 1.5 could disclose sensitive information to a local user when it is configured to use an IBM Cloud API key to connect to cloud-based connectors. IBM X-Force ID: 207630.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2019-3884
2019-08-01T14:15:13
2025-02-19T03:04:28.290897
A vulnerability exists in the garbage collection mechanism of atomic-openshift. An attacker able spoof the UUID of a valid object from another namespace is able to delete children of those objects. Versions 3.6, 3.7, 3.8, 3.9, 3.10, 3.11 and 4.1 are affected.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2018-1069
2018-03-09T14:29:00
2025-01-14T07:24:52.309913
Red Hat OpenShift Enterprise version 3.7 is vulnerable to access control override for container network filesystems. An attacker could override the UserId and GroupId for GlusterFS and NFS to read and write any data on the network filesystem.
[ { "score": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2017-7534
2018-04-11T19:29:00
2025-01-14T07:19:34.697592
OpenShift Enterprise version 3.x is vulnerable to a stored XSS via the log viewer for pods. The flaw is due to lack of sanitation of user input, specifically terminal escape characters, and the creation of clickable links automatically when viewing the log files for a pod.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2018-1102
2018-04-30T19:29:00
2025-01-14T07:25:58.715572
A flaw was found in source-to-image function as shipped with Openshift Enterprise 3.x. An improper path validation of tar files in ExtractTarStreamFromTarReader in tar/tar.go leads to privilege escalation.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2017-15137
2018-07-16T20:29:00
2025-01-14T07:10:30.458949
The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2019-19351
2020-03-18T17:15:11
2025-02-19T02:59:31.102210
An insecure modification vulnerability in the /etc/passwd file was found in the container openshift/jenkins. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. This CVE is specific to the openshift/jenkins-slave-base-rhel7-containera as shipped in Openshift 4 and 3.11.
[ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2020-10752
2020-06-12T23:15:10
2025-02-19T03:05:31.640651
A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2020-10715
2020-09-16T18:15:12
2025-02-19T03:05:44.203762
A content spoofing vulnerability was found in the openshift/console 3.11 and 4.x. This flaw allows an attacker to craft a URL and inject arbitrary text onto the error page that appears to be from the OpenShift instance. This attack could potentially convince a user that the inserted text is legitimate.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/origin
[]
[ "cf7e336cb497b52d5034449f98e91382e4f36eb5" ]
CVE-2022-0552
2022-04-11T20:15:16
2025-01-15T02:10:46.050812
A flaw was found in the original fix for the netty-codec-http CVE-2021-21409, where the OpenShift Logging openshift-logging/elasticsearch6-rhel8 container was incomplete. The vulnerable netty-codec-http maven package was not removed from the image content. This flaw affects origin-aggregated-logging versions 3.11.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/origin-aggregated-logging
[]
[ "11a17d44877e178ac8dc6aefd6dda6c8dba5888e" ]
CVE-2021-4294
2022-12-28T17:15:09
2025-01-15T02:06:57.853764
A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/osin
[]
[ "0f3357bb07e801ea62327872d19913969001dd7a" ]
CVE-2018-1103
2018-06-12T15:29:00
2025-02-19T02:28:17.841024
Openshift Enterprise source-to-image before version 1.1.10 is vulnerable to an improper validation of user input. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/source-to-image
[]
[ "40ad911db82b8720f9956e8aa76371a8f185a6de" ]
CVE-2024-7079
2024-07-24T16:15:07
2025-02-19T03:38:53.165716
A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/openshift/telemeter
[]
[ "465bdd9c8b8e4449a63b20dea82cbd4728b2fb2c" ]
CVE-2021-2322
2021-06-23T23:15:07
2025-01-14T08:51:49.529706
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
null
https://github.com/oracle/opengrok
[]
[ "e4c9c2b53cb0c7fc3c9e5b30c3892012e5937c3b" ]
CVE-2020-15223
2020-09-24T17:15:13
2025-01-15T01:43:02.852740
In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.34.0, the `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store. This is fixed in version 0.34.0
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/ory/fosite
[]
[ "35a1558d8d845ac15bc6ec99fb4be062716b231a" ]
CVE-2020-15222
2020-09-24T17:15:13
2025-01-15T01:43:01.794555
In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.31.0, when using "private_key_jwt" authentication the uniqueness of the `jti` value is not checked. When using client authentication method "private_key_jwt", OpenId specification says the following about assertion `jti`: "A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties". Hydra does not seem to check the uniqueness of this `jti` value. This problem is fixed in version 0.31.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/ory/fosite
[]
[ "35a1558d8d845ac15bc6ec99fb4be062716b231a" ]
CVE-2020-15234
2020-10-02T21:15:12
2025-01-15T01:43:06.899621
ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite before version 0.34.1, the OAuth 2.0 Client's registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using strings.ToLower while they should have been compared with a simple string match. This allows an attacker to register a client with allowed redirect URL https://example.com/callback. Then perform an OAuth2 flow and requesting redirect URL https://example.com/CALLBACK. Instead of an error (invalid redirect URL), the browser is redirected to https://example.com/CALLBACK with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example). This vulnerability has been patched in ORY Fosite v0.34.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/ory/fosite
[]
[ "35a1558d8d845ac15bc6ec99fb4be062716b231a" ]
CVE-2020-15233
2020-10-02T21:15:12
2025-01-15T01:43:06.297282
ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/ory/fosite
[]
[ "35a1558d8d845ac15bc6ec99fb4be062716b231a" ]
CVE-2019-8400
2019-02-17T06:29:00
2025-01-15T01:41:27.703930
ORY Hydra before v1.0.0-rc.3+oryOS.9 has Reflected XSS via the oauth2/fallbacks/error error_hint parameter.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/ory/hydra
[]
[ "1295663ada908dd431d7ffc9927feb6e2606b724" ]
CVE-2020-5300
2020-04-06T17:15:13
2025-01-15T01:46:26.734558
In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification says the following about assertion `jti`: "A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties". Hydra does not check the uniqueness of this `jti` value. Exploiting this vulnerability is somewhat difficult because: - TLS protects against MITM which makes it difficult to intercept valid tokens for replay attacks - The expiry time of the JWT gives only a short window of opportunity where it could be replayed This has been patched in version v1.4.0+oryOS.17
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/ory/hydra
[]
[ "1295663ada908dd431d7ffc9927feb6e2606b724" ]
CVE-2021-32701
2021-06-22T20:15:08
2025-01-15T01:55:18.621040
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/ory/oathkeeper
[]
[ "413393f8750796ae2b8dd02fb3735d991807ddaa" ]
CVE-2024-29882
2024-03-28T14:15:14
2025-01-15T05:11:59.052229
SRS is a simple, high-efficiency, real-time video server. SRS's `/api/v1/vhosts/vid-<id>?callback=<payload>` endpoint didn't filter the callback function name which led to injecting malicious javascript payloads and executing XSS ( Cross-Site Scripting). This vulnerability is fixed in 5.0.210 and 6.0.121.
null
https://github.com/ossrs/srs
[]
[ "665c30af90fb5f26c419541093d63778262577f7" ]
CVE-2023-34105
2023-06-12T17:15:09
2025-01-15T04:54:01.098658
SRS is a real-time video server supporting RTMP, WebRTC, HLS, HTTP-FLV, SRT, MPEG-DASH, and GB28181. Prior to versions 5.0.157, 5.0-b1, and 6.0.48, SRS's `api-server` server is vulnerable to a drive-by command injection. An attacker may send a request to the `/api/v1/snapshots` endpoint containing any commands to be executed as part of the body of the POST request. This issue may lead to Remote Code Execution (RCE). Versions 5.0.157, 5.0-b1, and 6.0.48 contain a fix.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/ossrs/srs
[]
[ "665c30af90fb5f26c419541093d63778262577f7" ]
CVE-2022-40365
2022-09-14T21:15:10
2025-01-14T11:09:34.927898
Cross site scripting (XSS) vulnerability in ouqiang gocron through 1.5.3, allows attackers to execute arbitrary code via scope.row.hostname in web/vue/src/pages/taskLog/list.vue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/ouqiang/gocron
[]
[ "93c544f0d4457ee3a57f3ba4bba0a1259d6fddfc" ]
CVE-2021-3499
2021-06-02T16:15:10
2025-01-14T09:20:17.237886
A vulnerability was found in OVN Kubernetes in versions up to and including 0.3.0 where the Egress Firewall does not reliably apply firewall rules when there is multiple DNS rules. It could lead to potentially lose of confidentiality, integrity or availability of a service.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/ovn-org/ovn-kubernetes
[]
[ "5136ef324438d1c5bfb5a7e716fa9a760366c550" ]
CVE-2024-29026
2024-03-20T22:15:08
2025-01-15T05:14:01.254462
Owncast is an open source, self-hosted, decentralized, single user live video streaming and chat server. In versions 0.1.2 and prior, a lenient CORS policy allows attackers to make a cross origin request, reading privileged information. This can be used to leak the admin password. Commit 9215d9ba0f29d62201d3feea9e77dcd274581624 fixes this issue.
null
https://github.com/owncast/owncast
[]
[ "f5a045dedc7d60e58e1c22b8f6472007738f0d6e" ]
CVE-2024-31450
2024-04-19T19:15:06
2025-01-15T05:15:33.640787
Owncast is an open source, self-hosted, decentralized, single user live video streaming and chat server. The Owncast application exposes an administrator API at the URL /api/admin. The emoji/delete endpoint of said API allows administrators to delete custom emojis, which are saved on disk. The parameter name is taken from the JSON request and directly appended to the filepath that points to the emoji to delete. By using path traversal sequences (../), attackers with administrative privileges can exploit this endpoint to delete arbitrary files on the system, outside of the emoji directory. This vulnerability is fixed in 0.1.3.
null
https://github.com/owncast/owncast
[]
[ "f5a045dedc7d60e58e1c22b8f6472007738f0d6e" ]
CVE-2023-46480
2023-11-27T23:15:07
2025-01-14T12:05:56.041441
An issue in OwnCast v.0.1.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via the authHost parameter of the indieauth function.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/owncast/owncast
[]
[ "f5a045dedc7d60e58e1c22b8f6472007738f0d6e" ]
CVE-2023-3188
2023-06-10T02:15:09
2025-01-15T04:54:43.587835
Server-Side Request Forgery (SSRF) in GitHub repository owncast/owncast prior to 0.1.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/owncast/owncast
[]
[ "f5a045dedc7d60e58e1c22b8f6472007738f0d6e" ]
CVE-2021-39183
2021-12-14T20:15:07
2025-01-14T09:33:59.060653
Owncast is an open source, self-hosted live video streaming and chat server. In affected versions inline scripts are executed when Javascript is parsed via a paste action. This issue is patched in 0.0.9 by blocking unsafe-inline Content Security Policy and specifying the script-src. The worker-src is required to be set to blob for the video player.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/owncast/owncast
[]
[ "f5a045dedc7d60e58e1c22b8f6472007738f0d6e" ]
CVE-2022-3751
2022-11-29T21:15:11
2025-01-15T02:30:05.191319
SQL Injection in GitHub repository owncast/owncast prior to 0.0.13.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/owncast/owncast
[]
[ "f5a045dedc7d60e58e1c22b8f6472007738f0d6e" ]
CVE-2023-52305
2024-01-03T09:15:09
2025-01-14T12:08:44.832858
FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52313
2024-01-03T09:15:11
2025-01-14T12:09:17.006686
FPE in paddle.argmin and paddle.argmax in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52314
2024-01-03T09:15:11
2025-01-14T12:08:46.276205
PaddlePaddle before 2.6.0 has a command injection in convert_shape_compare. This resulted in the ability to execute arbitrary commands on the operating system.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38675
2024-01-03T09:15:08
2025-01-14T11:52:01.362829
FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52311
2024-01-03T09:15:10
2025-01-14T12:08:51.210546
PaddlePaddle before 2.6.0 has a command injection in _wget_download. This resulted in the ability to execute arbitrary commands on the operating system.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38677
2024-01-03T09:15:08
2025-01-14T11:52:00.880372
FPE in paddle.linalg.eig in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38678
2024-01-03T09:15:08
2025-01-14T11:52:01.043084
OOB access in paddle.mode in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52307
2024-01-03T09:15:09
2025-01-14T12:08:43.600824
Stack overflow in paddle.linalg.lu_unpack in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38674
2024-01-03T09:15:08
2025-01-14T11:51:56.402259
FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52303
2024-01-03T09:15:09
2025-01-14T12:08:40.688839
Nullptr in paddle.put_along_axis in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52306
2024-01-03T09:15:09
2025-01-14T12:08:40.976781
FPE in paddle.lerp in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52304
2024-01-03T09:15:09
2025-01-14T12:08:40.639685
Stack overflow in paddle.searchsorted in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52309
2024-01-03T09:15:10
2025-01-14T12:08:45.614385
Heap buffer overflow in paddle.repeat_interleave in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52308
2024-01-03T09:15:10
2025-01-14T12:08:44.208514
FPE in paddle.amin in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52312
2024-01-03T09:15:10
2025-01-14T12:08:44.758027
Nullptr dereference in paddle.crop in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38676
2024-01-03T09:15:08
2025-01-14T11:52:01.107060
Nullptr in paddle.dot in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52310
2024-01-03T09:15:10
2025-01-14T12:08:45.333134
PaddlePaddle before 2.6.0 has a command injection in get_online_pass_interval. This resulted in the ability to execute arbitrary commands on the operating system.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-52302
2024-01-03T09:15:09
2025-01-14T10:54:27.182711
Nullptr in paddle.nextafter in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2024-0817
2024-03-07T02:15:51
2025-01-20T00:59:00.771690
Command injection in IrGraph.draw in paddlepaddle/paddle 2.6.0
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2024-1603
2024-03-23T19:15:07
2025-01-25T01:59:26.495001
paddlepaddle/paddle 2.6.0 allows arbitrary file read via paddle.vision.ops.read_file.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2024-0917
2024-03-07T09:15:38
2025-01-20T00:58:59.763141
remote code execution in paddlepaddle/paddle 2.6.0
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2024-0815
2024-03-07T04:15:07
2025-01-20T00:59:00.192234
Command injection in paddle.utils.download._wget_download (bypass filter) in paddlepaddle/paddle 2.6.0
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2024-0818
2024-03-07T13:15:07
2025-01-24T08:49:18.101436
Arbitrary File Overwrite Via Path Traversal in paddlepaddle/paddle before 2.6
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38672
2023-07-26T12:15:09
2025-01-14T11:52:00.299482
FPE in paddle.trace in PaddlePaddle before 2.5.0. This flaw can cause a runtime crash and a denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38671
2023-07-26T11:15:09
2025-01-14T11:51:55.421610
Heap buffer overflow in paddle.trace in PaddlePaddle before 2.5.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38669
2023-07-26T10:15:11
2025-01-14T11:51:58.691686
Use after free in paddle.diagonal in PaddlePaddle before 2.5.0. This resulted in a potentially exploitable condition.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38670
2023-07-26T11:15:09
2025-01-14T11:52:00.366099
Null pointer dereference in paddle.flip in PaddlePaddle before 2.5.0. This resulted in a runtime crash and denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2023-38673
2023-07-26T12:15:09
2025-01-14T11:51:59.914901
PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in the ability to execute arbitrary commands on the operating system.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2022-45908
2022-11-26T02:15:10
2025-01-15T03:56:11.487045
In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2022-46741
2022-12-07T08:15:10
2025-01-14T11:17:15.536983
Out-of-bounds read in gather_tree in PaddlePaddle before 2.4. 
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2022-46742
2022-12-07T09:15:09
2025-01-14T11:17:23.311330
Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arbitrary code execution.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/paddlepaddle/paddle
[]
[ "64d48f4d6af515e7d3da00f37ee9938f7dd6eb96" ]
CVE-2022-39213
2022-09-15T22:15:11
2025-01-15T02:28:26.041754
go-cvss is a Go module to manipulate Common Vulnerability Scoring System (CVSS). In affected versions when a full CVSS v2.0 vector string is parsed using `ParseVector`, an Out-of-Bounds Read is possible due to a lack of tests. The Go module will then panic. The problem is patched in tag `v0.4.0`, by the commit `d9d478ff0c13b8b09ace030db9262f3c2fe031f4`. Users are advised to upgrade. Users unable to upgrade may avoid this issue by parsing only CVSS v2.0 vector strings that do not have all attributes defined (e.g. `AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:M/IR:M/AR:M`). As stated in [SECURITY.md](https://github.com/pandatix/go-cvss/blob/master/SECURITY.md), the CPE v2.3 to refer to this Go module is `cpe:2.3:a:pandatix:go_cvss:*:*:*:*:*:*:*:*`. The entry has already been requested to the NVD CPE dictionary.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/pandatix/go-cvss
[]
[ "2897b6dcdd15dca3d0cd54b0a1592890492cac30" ]
CVE-2020-7920
2020-02-06T17:15:14
2025-01-14T08:47:10.267594
pmm-server in Percona Monitoring and Management (PMM) 2.2.x before 2.2.1 allows unauthenticated denial of service.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/percona/pmm-managed
[]
[ "45ef07e0e0b49f28195f07b58f0f921763fb2f4b" ]
CVE-2020-19278
2023-04-04T15:15:07
2025-02-14T21:50:36.540644
Cross Site Request Forgery vulnerability found in Phachon mm-wiki v.0.1.2 allows a remote attacker to execute arbitrary code via the system/user/save parameter.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/phachon/mm-wiki
[]
[ "5e7e6dbadf5808ce241b079e5a057cbc17a6d045" ]
CVE-2020-19277
2023-04-04T15:15:07
2025-02-13T19:51:47.142106
Cross Site Scripting vulnerability found in Phachon mm-wiki v.0.1.2 allows a remote attacker to execute arbitrary code via javascript code in the markdown editor.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/phachon/mm-wiki
[]
[ "5e7e6dbadf5808ce241b079e5a057cbc17a6d045" ]
CVE-2021-40289
2022-11-10T18:15:10
2025-01-14T09:48:01.366263
mm-wki v0.2.1 is vulnerable to Cross Site Scripting (XSS).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/phachon/mm-wiki
[]
[ "5e7e6dbadf5808ce241b079e5a057cbc17a6d045" ]
CVE-2021-39394
2022-08-26T13:15:08
2025-01-14T09:31:34.077837
mm-wiki v0.2.1 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add user accounts and modify user information.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/phachon/mm-wiki
[]
[ "5e7e6dbadf5808ce241b079e5a057cbc17a6d045" ]
CVE-2021-39393
2022-08-26T13:15:08
2025-01-14T09:31:33.812641
mm-wiki v0.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the markdown editor.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/phachon/mm-wiki
[]
[ "5e7e6dbadf5808ce241b079e5a057cbc17a6d045" ]
CVE-2022-3023
2022-11-04T12:15:14
2025-01-15T02:22:13.494603
Use of Externally-Controlled Format String in GitHub repository pingcap/tidb prior to 6.4.0, 6.1.3.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/pingcap/tidb
[]
[ "72acdb43ffe5fe78afa599e9cc71886a703829da" ]
CVE-2022-34969
2022-08-03T02:15:07
2025-01-14T11:02:24.920512
PingCAP TiDB v6.1.0 was discovered to contain a NULL pointer dereference.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/pingcap/tidb
[]
[ "72acdb43ffe5fe78afa599e9cc71886a703829da" ]
CVE-2022-31011
2022-05-31T20:15:08
2025-01-14T10:59:17.737279
TiDB is an open-source NewSQL database that supports Hybrid Transactional and Analytical Processing (HTAP) workloads. Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access. Only users using TiDB 5.3.0 are affected by this vulnerability. TiDB version 5.3.1 contains a patch for this issue. Other mitigation strategies include turning off Security Enhanced Mode (SEM), disabling local login for non-root accounts, and ensuring that the same IP cannot be logged in as root and normal user at the same time.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/pingcap/tidb
[]
[ "72acdb43ffe5fe78afa599e9cc71886a703829da" ]
CVE-2019-20786
2020-04-19T20:15:11
2025-01-15T01:40:30.948424
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/pion/dtls
[]
[ "91d652d3f91d6c08c193e4d297067f8f653775f9" ]
CVE-2021-28681
2021-03-18T04:15:14
2025-02-19T03:17:51.932479
Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.)
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/pion/webrtc
[]
[ "d29548ca03718e9044c9cfe3e4c14bd8e5c87a89" ]
CVE-2018-15759
2018-11-19T14:29:00
2025-02-19T02:31:06.850334
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perform broker operations.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/pivotal-cf/brokerapi
[]
[ "036a459c44d734d73447be166f90d407e5602094" ]
CVE-2023-28109
2023-03-16T17:15:09
2025-01-15T04:49:27.187914
Play With Docker is a browser-based Docker playground. Versions 0.0.2 and prior are vulnerable to domain hijacking. Because CORS configuration was not correct, an attacker could use `play-with-docker.com` as an example and set the origin header in an http request as `evil-play-with-docker.com`. The domain would echo in response header, which successfully bypassed the CORS policy and retrieved basic user information. This issue has been fixed in commit ed82247c9ab7990ad76ec2bf1498c2b2830b6f1a. There are no known workarounds.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/play-with-docker/play-with-docker
[]
[ "92aa3aa3f8838cccbcd3a4521bc9658c38d3a915" ]
CVE-2023-34844
2023-06-29T15:15:09
2025-01-14T11:46:02.588942
Play With Docker < 0.0.2 has an insecure CAP_SYS_ADMIN privileged mode causing the docker container to escape.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/play-with-docker/play-with-docker
[]
[ "92aa3aa3f8838cccbcd3a4521bc9658c38d3a915" ]
CVE-2024-49381
2024-10-25T14:15:12
2024-11-15T07:47:40.846630
Plenti, a static site generator, has an arbitrary file deletion vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write deletion when a plenti user serves their website. This issue may lead to information loss. Version 0.7.2 fixes the vulnerability.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/plentico/plenti
[]
[ "113f9c4f9e4dc9bee094e217ede484921f2bc849" ]
CVE-2024-39315
2024-07-02T20:15:06
2025-01-15T05:15:46.714323
Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, that script could access these tokens by making a request to the `/.pomerium` endpoint. Upstream applications that authenticate only the ID token may be vulnerable to user impersonation using a token obtained in this manner. Note that an OAuth2 access token or ID token by itself is not sufficient to hijack a user's Pomerium session. Upstream applications should not be vulnerable to user impersonation via these tokens provided the application verifies the Pomerium JWT for each request, the connection between Pomerium and the application is secured by mTLS, or the connection between Pomerium and the application is otherwise secured at the network layer. The issue is patched in Pomerium v0.26.1. No known workarounds are available.
null
https://github.com/pomerium/pomerium
[]
[ "7692b2ac4966f2606e1cea376dd33a14c984d9c9" ]
CVE-2024-47616
2024-10-02T22:15:03
2024-10-09T20:59:12.076863
Pomerium is an identity and context-aware access proxy. The Pomerium databroker service is responsible for managing all persistent Pomerium application state. Requests to the databroker service API are authorized by the presence of a JSON Web Token (JWT) signed by a key known by all Pomerium services in the same deployment. However, incomplete validation of this JWT meant that some service account access tokens would incorrectly be treated as valid for the purpose of databroker API authorization. Improper access to the databroker API could allow exfiltration of user info, spoofing of user sessions, or tampering with Pomerium routes, policies, and other settings. A Pomerium deployment is susceptible to this issue if all of the following conditions are met, you have issued a service account access token using Pomerium Zero or Pomerium Enterprise, the access token has an explicit expiration date in the future, and the core Pomerium databroker gRPC API is not otherwise secured by network access controls. This vulnerability is fixed in 0.27.1.
null
https://github.com/pomerium/pomerium
[]
[ "7692b2ac4966f2606e1cea376dd33a14c984d9c9" ]
CVE-2023-33189
2023-05-30T06:16:37
2025-01-15T04:54:25.470820
Pomerium is an identity and context-aware access proxy. With specially crafted requests, incorrect authorization decisions may be made by Pomerium. This issue has been patched in versions 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 and 0.22.2.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/pomerium/pomerium
[]
[ "7692b2ac4966f2606e1cea376dd33a14c984d9c9" ]
CVE-2021-29652
2021-04-02T14:15:13
2025-02-19T03:18:55.058052
Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/pomerium/pomerium
[]
[ "a879e5fd722ff9dacdc65acc8703b530ecd52422" ]
CVE-2021-29651
2021-04-02T14:15:13
2025-02-19T03:19:01.089803
Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/pomerium/pomerium
[]
[ "a879e5fd722ff9dacdc65acc8703b530ecd52422" ]
CVE-2021-41230
2021-11-05T23:15:08
2025-02-19T03:23:40.398577
Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/pomerium/pomerium
[]
[ "7692b2ac4966f2606e1cea376dd33a14c984d9c9" ]