id
stringlengths
13
16
published
stringlengths
19
19
modified
timestamp[ns]
details
stringlengths
30
3.87k
severity
listlengths
1
1
repo_url
stringlengths
23
68
cwes
sequencelengths
0
1
commits
sequencelengths
1
4
CVE-2023-47124
2023-12-04T21:15:33
2025-02-19T03:34:45.233193
Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a `slowloris attack`. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the `HTTPChallenge` with the `TLSChallenge` or the `DNSChallenge`.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2023-47106
2023-12-04T21:15:33
2025-02-19T03:34:43.231811
Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path and the query. When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions. This vulnerability has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2023-47633
2023-12-04T21:15:34
2025-02-19T03:35:40.212099
Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 100% CPU when it serves as its own backend, which is an automatically generated route resulting from the Docker integration in the default configuration. This issue has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2021-32813
2021-08-03T23:15:07
2025-02-19T03:20:01.619133
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse. If one has a chain of Traefik middlewares, and one of them sets a request header, then sending a request with a certain Connection header will cause it to be removed before the request is sent. In this case, the backend does not see the request header. A patch is available in version 2.4.13. There are no known workarounds aside from upgrading.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2021-27375
2021-02-18T03:15:12
2025-01-14T09:02:11.138186
Traefik before 2.4.5 allows the loading of IFRAME elements from other domains.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2022-23632
2022-02-17T15:15:09
2025-01-14T10:48:52.575123
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that might not correspond to the configured one. If the CNAME flattening is enabled, the selected TLS configuration is the SNI one and the routing uses the CNAME value, so this can skip the expected TLS configuration. Version 2.6.1 contains a patch for this issue. As a workaround, one may add the FDQN to the host rule. However, there is no workaround if the CNAME flattening is enabled.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2022-39271
2022-10-11T14:15:09
2025-01-14T11:07:58.057392
Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that assists in deploying microservices. There is a potential vulnerability in Traefik managing HTTP/2 connections. A closing HTTP/2 server connection could hang forever because of a subsequent fatal error. This failure mode could be exploited to cause a denial of service. There has been a patch released in versions 2.8.8 and 2.9.0-rc5. There are currently no known workarounds.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2022-46153
2022-12-08T22:15:10
2025-01-15T04:00:17.338328
Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2022-23469
2022-12-08T22:15:10
2025-01-14T10:44:34.877488
Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2019-12452
2019-05-29T19:29:00
2025-02-19T02:42:20.761155
types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or Digest HTTP Authentication section, or discover a key by reading the ClientTLS section. These can be found in the JSON response to a /api request.
[ { "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "8a1c3510eaf521fda45f3a215017b2242b7a2e97" ]
CVE-2018-15598
2018-08-21T01:29:00
2025-01-14T07:23:59.336190
Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2020-9321
2020-03-16T19:15:11
2025-01-14T08:50:47.045576
configurationwatcher.go in Traefik 2.x before 2.1.4 and TraefikEE 2.0.0 mishandles the purging of certificate contents from providers before logging.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1" ]
CVE-2020-15129
2020-07-30T16:15:11
2025-01-15T01:42:51.003819
In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1", "bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f" ]
CVE-2019-20894
2020-07-02T16:15:11
2025-01-14T07:55:01.879124
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/traefik/traefik
[]
[ "3d784a14f9a5b6f7631af87498a7c1f35664a5b1" ]
CVE-2018-1000133
2018-03-16T14:29:44
2025-01-15T01:29:28.642505
Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork components that can result in A standard unprivileged user could gain system administrator permissions within the web portal.. This attack appear to be exploitable via The user must be able to login, and could edit their profile and set the "System Administrator" permission to "yes" on themselves.. This vulnerability appears to have been fixed in 1.4.6 RC2.
[ { "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/tridentli/pitchfork
[]
[ "a03e0fe1465773634ed523d8d8e5d8316a65848e" ]
CVE-2024-43379
2024-08-19T15:15:08
2024-10-08T04:21:37.282410
TruffleHog is a secrets scanning tool. Prior to v3.81.9, this vulnerability allows a malicious actor to craft data in a way that, when scanned by specific detectors, could trigger the detector to make an unauthorized request to an endpoint chosen by the attacker. For an exploit to be effective, the target endpoint must be an unauthenticated GET endpoint that produces side effects. The victim must scan the maliciously crafted data and have such an endpoint targeted for the exploit to succeed. The vulnerability has been resolved in TruffleHog v3.81.9 and later versions.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/trufflesecurity/trufflehog
[]
[ "f2c7bb93be9373d5d2a524a11c7ba739dc1de7f2" ]
CVE-2021-29453
2021-04-19T19:15:17
2025-01-14T09:03:31.688042
matrix-media-repo is an open-source multi-domain media repository for Matrix. Versions 1.2.6 and earlier of matrix-media-repo do not properly handle malicious images which are crafted to be small in file size, but large in complexity. A malicious user could upload a relatively small image in terms of file size, using particular image formats, which expands to have extremely large dimensions during the process of thumbnailing. The server can be exhausted of memory in the process of trying to load the whole image into memory for thumbnailing, leading to denial of service. Version 1.2.7 has a fix for the vulnerability.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/turt2live/matrix-media-repo
[]
[ "fc66a42b80a20e3ca598dfbfee84624d2a43ac14" ]
CVE-2018-16398
2018-09-03T19:29:00
2025-01-14T07:24:20.440783
In Twistlock AuthZ Broker 0.1, regular expressions are mishandled, as demonstrated by containers/aa/pause?aaa=\/start to bypass a policy in which "docker start" is allowed but "docker pause" is not allowed.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/twistlock/authz
[]
[ "484afd59f163c2db11e3de80e8a2a6a520bb4c3d" ]
CVE-2023-33965
2023-06-01T15:15:09
2025-01-15T04:53:41.259778
Brook is a cross-platform programmable network tool. The `tproxy` server is vulnerable to a drive-by command injection. An attacker may fool a victim into visiting a malicious web page which will trigger requests to the local `tproxy` service leading to remote code execution. A patch is available in version 20230606.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/txthinking/brook
[]
[ "860db32165f8f66f67a4e854da9c048fcbbd762c" ]
CVE-2023-42283
2023-11-07T08:15:12
2025-01-14T11:58:24.487211
Blind SQL injection in api_id parameter in Tyk Gateway version 5.0.3 allows attacker to access and dump the database via a crafted SQL query.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/tyktechnologies/tyk
[]
[ "54e1072a6a9918e29606edf6b60def437b273d0a" ]
CVE-2023-42284
2023-11-07T08:15:12
2025-01-14T11:58:17.173070
Blind SQL injection in api_version parameter in Tyk Gateway version 5.0.3 allows attacker to access and dump the database via a crafted SQL query.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/tyktechnologies/tyk
[]
[ "54e1072a6a9918e29606edf6b60def437b273d0a" ]
CVE-2021-23365
2021-04-26T10:15:12
2025-01-15T01:48:02.313940
The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/tyktechnologies/tyk-identity-broker
[]
[ "476edc9b795af75952d5d2979b0859aa26eeb099" ]
CVE-2022-47747
2023-01-20T17:15:10
2025-01-14T11:16:57.639853
kraken <= 0.1.4 has an arbitrary file read vulnerability via the component testfs.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/uber/kraken
[]
[ "78baa5ef5d624f88e8ceb152a2e14239899dc4a9" ]
CVE-2024-9312
2024-10-10T14:15:05
2024-10-15T15:46:29.238282
Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges.
null
https://github.com/ubuntu/authd
[]
[ "17530d217c2cdbae0c266ba848c5aa3eb0c63d0f" ]
CVE-2024-9313
2024-10-03T11:15:13
2024-10-09T20:59:24.686126
Authd PAM module before version 0.3.5 can allow broker-managed users to impersonate any other user managed by the same broker and perform any PAM operation with it, including authenticating as them.
null
https://github.com/ubuntu/authd
[]
[ "17530d217c2cdbae0c266ba848c5aa3eb0c63d0f" ]
CVE-2021-36979
2021-07-20T07:15:08
2025-01-15T01:55:59.724094
Unicorn Engine 1.0.2 has an out-of-bounds write in tb_flush_armeb (called from cpu_arm_exec_armeb and tcg_cpu_exec_armeb).
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/unicorn-engine/unicorn
[]
[ "886acbf59910499e44194dadda9c069ef7d3b291" ]
CVE-2020-36431
2021-07-20T07:15:07
2025-01-14T08:48:21.063446
Unicorn Engine 1.0.2 has an out-of-bounds write in helper_wfe_arm.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/unicorn-engine/unicorn
[]
[ "886acbf59910499e44194dadda9c069ef7d3b291" ]
CVE-2021-44078
2021-12-26T05:15:07
2025-01-15T02:08:45.241362
An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager. The issue results from the faulty comparison of GVA and GPA while calling uc_mem_map_ptr to free part of a claimed memory block. An attacker can leverage this vulnerability to escape the sandbox and execute arbitrary code on the host machine.
[ { "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/unicorn-engine/unicorn
[]
[ "886acbf59910499e44194dadda9c069ef7d3b291" ]
CVE-2022-29694
2022-06-02T14:15:50
2025-01-15T02:19:53.833480
Unicorn Engine v2.0.0-rc7 and below was discovered to contain a NULL pointer dereference via qemu_ram_free.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/unicorn-engine/unicorn
[]
[ "886acbf59910499e44194dadda9c069ef7d3b291" ]
CVE-2022-29695
2022-06-02T14:15:50
2025-01-15T02:19:53.331227
Unicorn Engine v2.0.0-rc7 contains memory leaks caused by an incomplete unicorn engine initialization.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/unicorn-engine/unicorn
[]
[ "886acbf59910499e44194dadda9c069ef7d3b291" ]
CVE-2022-29693
2022-06-02T14:15:50
2025-01-15T02:19:53.533952
Unicorn Engine v2.0.0-rc7 and below was discovered to contain a memory leak via the function uc_close at /my/unicorn/uc.c.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/unicorn-engine/unicorn
[]
[ "886acbf59910499e44194dadda9c069ef7d3b291" ]
CVE-2022-29692
2022-06-02T14:15:50
2025-01-14T10:56:47.904315
Unicorn Engine v1.0.3 was discovered to contain a use-after-free vulnerability via the hook function.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/unicorn-engine/unicorn
[]
[ "886acbf59910499e44194dadda9c069ef7d3b291" ]
CVE-2025-24355
2025-01-24T17:15:16
2025-01-28T15:41:50.960971
Updatecli is a tool used to apply file update strategies. Prior to version 0.93.0, private maven repository credentials may be leaked in application logs in case of unsuccessful retrieval operation. During the execution of an updatecli pipeline which contains a `maven` source configured with basic auth credentials, the credentials are being leaked in the application execution logs in case of failure. Credentials are properly sanitized when the operation is successful but not when for whatever reason there is a failure in the maven repository, e.g. wrong coordinates provided, not existing artifact or version. Version 0.93.0 contains a patch for the issue.
null
https://github.com/updatecli/updatecli
[]
[ "68cdd96b910d136968a43a263d22d5485e8b2a14" ]
CVE-2024-29030
2024-04-19T15:15:50
2025-01-15T05:11:24.165193
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file.
null
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2024-29029
2024-04-19T16:15:09
2025-01-15T05:11:22.736456
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2024-29028
2024-04-19T15:15:50
2025-01-15T05:11:22.682983
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/httpmeta that allows unauthenticated users to enumerate the internal network and receive limited html values in json form. This vulnerability is fixed in 0.16.1.
null
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-0109
2024-11-15T11:15:08
2024-11-19T17:42:39.606884
A stored cross-site scripting (XSS) vulnerability was discovered in usememos/memos version 0.9.1. This vulnerability allows an attacker to upload a JavaScript file containing a malicious script and reference it in an HTML file. When the HTML file is accessed, the malicious script is executed. This can lead to the theft of sensitive information, such as login credentials, from users visiting the affected website. The issue has been fixed in version 0.10.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2024-41659
2024-08-20T20:15:08
2024-10-08T04:20:16.791331
memos is a privacy-first, lightweight note-taking service. A CORS misconfiguration exists in memos 0.20.1 and earlier where an arbitrary origin is reflected with Access-Control-Allow-Credentials set to true. This may allow an attacking website to make a cross-origin request, allowing the attacker to read private information or make privileged changes to the system as the vulnerable user account. This vulnerability is fixed in 0.21.0.
null
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-0106
2023-01-07T04:15:08
2025-01-15T04:36:49.505367
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-0111
2023-01-07T04:15:08
2025-01-15T04:37:20.694743
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-0107
2023-01-07T04:15:08
2025-01-15T04:36:54.166929
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-0110
2023-01-07T04:15:08
2025-01-15T04:37:11.158449
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-0112
2023-01-07T04:15:08
2025-01-15T04:37:15.866850
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-0108
2023-01-07T04:15:08
2025-01-15T04:37:16.620971
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-4698
2023-09-01T01:15:09
2025-01-15T05:00:21.420964
Improper Input Validation in GitHub repository usememos/memos prior to 0.13.2.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-4696
2023-09-01T01:15:08
2025-01-15T05:00:18.554147
Improper Access Control in GitHub repository usememos/memos prior to 0.13.2.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-5036
2023-09-18T06:15:08
2025-01-15T05:02:23.881951
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.15.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2023-4697
2023-09-01T01:15:09
2025-01-15T05:00:19.754757
Improper Privilege Management in GitHub repository usememos/memos prior to 0.13.2.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-25978
2023-02-15T05:15:11
2025-01-15T02:18:20.463842
All versions of the package github.com/usememos/memos/server are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4813
2022-12-28T14:15:11
2025-01-15T04:26:56.187136
Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4811
2022-12-28T14:15:11
2025-01-15T04:27:49.879967
Authorization Bypass Through User-Controlled Key vulnerability in usememos usememos/memos.This issue affects usememos/memos before 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4848
2022-12-29T18:15:10
2025-01-15T04:29:31.192700
Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4846
2022-12-29T18:15:10
2025-01-15T04:30:58.096985
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4844
2022-12-29T18:15:10
2025-01-15T04:29:26.184819
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4841
2022-12-29T17:15:21
2025-01-15T04:26:12.071725
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4840
2022-12-29T17:15:21
2025-01-15T02:18:33.170970
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4806
2022-12-28T14:15:11
2025-01-15T04:25:51.605960
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4797
2022-12-28T14:15:10
2025-01-15T04:25:27.538426
Improper Restriction of Excessive Authentication Attempts in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4798
2022-12-28T14:15:10
2025-01-15T04:25:32.283375
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4866
2022-12-31T09:15:11
2025-01-15T04:31:37.670102
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4807
2022-12-28T14:15:11
2025-01-15T04:27:06.429417
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4801
2022-12-28T14:15:10
2025-01-15T04:26:45.721372
Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4847
2022-12-29T18:15:10
2025-01-15T04:31:02.824758
Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4799
2022-12-28T14:15:10
2025-01-15T04:25:42.020864
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4684
2022-12-23T12:15:10
2025-01-15T04:10:39.279463
Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4689
2022-12-23T12:15:12
2025-01-15T04:10:58.810010
Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4851
2022-12-29T18:15:10
2025-01-15T04:29:36.159078
Improper Handling of Values in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4849
2022-12-29T18:15:10
2025-01-15T04:30:24.608355
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4802
2022-12-28T14:15:10
2025-01-15T04:26:47.518994
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4809
2022-12-28T14:15:11
2025-01-15T04:27:03.845123
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4691
2022-12-27T15:15:11
2025-01-15T04:11:04.210527
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4850
2022-12-29T18:15:10
2025-01-15T04:30:20.086152
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4683
2022-12-23T12:15:08
2025-01-15T04:10:16.762579
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4609
2022-12-19T12:15:11
2025-01-15T03:56:48.215302
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4808
2022-12-28T14:15:11
2025-01-15T04:25:37.077977
Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4863
2022-12-30T16:15:09
2025-01-15T04:31:07.561484
Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4734
2022-12-27T15:15:12
2025-01-15T04:19:08.440239
Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4800
2022-12-28T14:15:10
2025-01-15T04:27:14.646060
Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4804
2022-12-28T14:15:10
2025-01-15T04:27:01.174033
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4687
2022-12-23T12:15:11
2025-01-15T04:11:18.362160
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4695
2022-12-27T15:15:11
2025-01-15T04:10:53.605525
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4805
2022-12-28T14:15:10
2025-01-15T04:26:50.883308
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4812
2022-12-28T14:15:11
2025-01-15T04:25:46.974411
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4803
2022-12-28T14:15:10
2025-01-15T04:26:52.237954
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4865
2022-12-31T09:15:08
2025-01-15T04:31:11.306272
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4814
2022-12-28T14:15:11
2025-01-15T04:26:56.778443
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4686
2022-12-23T12:15:11
2025-01-15T04:10:11.609032
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4845
2022-12-29T18:15:10
2025-01-15T04:30:29.113411
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4796
2022-12-28T14:15:09
2025-01-15T04:20:22.655591
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4690
2022-12-23T12:15:12
2025-01-15T04:11:57.063981
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4839
2022-12-29T17:15:21
2025-01-15T04:28:47.653655
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4694
2022-12-27T15:15:11
2025-01-15T04:12:20.592696
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4692
2022-12-23T20:15:20
2025-01-15T04:12:11.852364
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4688
2022-12-23T12:15:11
2025-01-15T04:12:01.494840
Improper Authorization in GitHub repository usememos/memos prior to 0.9.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4767
2022-12-27T15:15:12
2025-01-15T04:20:01.737401
Denial of Service in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-4810
2022-12-28T14:15:11
2025-01-15T04:27:42.444906
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/usememos/memos
[]
[ "7ec22482c16bbcacfbfe369c216c022623601723" ]
CVE-2022-21221
2022-03-17T12:15:08
2025-01-15T02:14:18.499972
The package github.com/valyala/fasthttp before 1.34.0 are vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/valyala/fasthttp
[]
[ "61aa8b17a240b66ead927f945a3e8a96c3f0ec40" ]
CVE-2023-35163
2023-06-23T21:15:09
2025-01-15T04:54:55.689367
Vega is a decentralized trading platform that allows pseudo-anonymous trading of derivatives on a blockchain. Prior to version 0.71.6, a vulnerability exists that allows a malicious validator to trick the Vega network into re-processing past Ethereum events from Vega’s Ethereum bridge. For example, a deposit to the collateral bridge for 100USDT that credits a party’s general account on Vega, can be re-processed 50 times resulting in 5000USDT in that party’s general account. This is without depositing any more than the original 100USDT on the bridge. Despite this exploit requiring access to a validator's Vega key, a validator key can be obtained at the small cost of 3000VEGA, the amount needed to announce a new node onto the network. A patch is available in version 0.71.6. No known workarounds are available, however there are mitigations in place should this vulnerability be exploited. There are monitoring alerts for `mainnet1` in place to identify any issues of this nature including this vulnerability being exploited. The validators have the ability to stop the bridge thus stopping any withdrawals should this vulnerability be exploited.
[ { "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", "type": "CVSS_V3" } ]
https://github.com/vegaprotocol/vega
[]
[ "491d8b92dbc35f759044fd32896b0e05e12c08ca" ]
CVE-2023-0290
2023-01-18T22:15:10
2025-01-14T11:17:44.028373
Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of "../clients/server" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client. Normally, to schedule an artifact on the server, the COLLECT_SERVER permission is required. This permission is normally only granted to "administrator" role. Due to this issue, it is sufficient to have the COLLECT_CLIENT privilege, which is normally granted to the "investigator" role. To exploit this vulnerability, the attacker must already have a Velociraptor user account at least "investigator" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI. This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/velocidex/velociraptor
[]
[ "00a58d673852aad141a354fe18bd58f721ceaccd" ]
CVE-2023-0242
2023-01-18T21:15:11
2025-01-14T11:17:44.455745
Rapid7 Velociraptor allows users to be created with different privileges on the server. Administrators are generally allowed to run any command on the server including writing arbitrary files. However, lower privilege users are generally forbidden from writing or modifying files on the server. The VQL copy() function applies permission checks for reading files but does not check for permission to write files. This allows a low privilege user (usually, users with the Velociraptor "investigator" role) to overwrite files on the server, including Velociraptor configuration files. To exploit this vulnerability, the attacker must already have a Velociraptor user account at a low privilege level (at least "analyst") and be able to log into the GUI and create a notebook where they can run the VQL query invoking the copy() VQL function. Typically, most users deploy Velociraptor with limited access to a trusted group (most users will be administrators within the GUI). This vulnerability is associated with program files https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go and program routines copy(). This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/velocidex/velociraptor
[]
[ "00a58d673852aad141a354fe18bd58f721ceaccd" ]