id
stringlengths 13
16
| published
stringlengths 19
19
| modified
timestamp[ns] | details
stringlengths 30
3.87k
| severity
listlengths 1
1
⌀ | repo_url
stringlengths 23
68
| cwes
sequencelengths 0
1
| commits
sequencelengths 1
4
|
---|---|---|---|---|---|---|---|
CVE-2023-47124 | 2023-12-04T21:15:33 | 2025-02-19T03:34:45.233193 | Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a `slowloris attack`. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the `HTTPChallenge` with the `TLSChallenge` or the `DNSChallenge`. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2023-47106 | 2023-12-04T21:15:33 | 2025-02-19T03:34:43.231811 | Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path and the query. When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions. This vulnerability has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2023-47633 | 2023-12-04T21:15:34 | 2025-02-19T03:35:40.212099 | Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 100% CPU when it serves as its own backend, which is an automatically generated route resulting from the Docker integration in the default configuration. This issue has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2021-32813 | 2021-08-03T23:15:07 | 2025-02-19T03:20:01.619133 | Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse. If one has a chain of Traefik middlewares, and one of them sets a request header, then sending a request with a certain Connection header will cause it to be removed before the request is sent. In this case, the backend does not see the request header. A patch is available in version 2.4.13. There are no known workarounds aside from upgrading. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2021-27375 | 2021-02-18T03:15:12 | 2025-01-14T09:02:11.138186 | Traefik before 2.4.5 allows the loading of IFRAME elements from other domains. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2022-23632 | 2022-02-17T15:15:09 | 2025-01-14T10:48:52.575123 | Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that might not correspond to the configured one. If the CNAME flattening is enabled, the selected TLS configuration is the SNI one and the routing uses the CNAME value, so this can skip the expected TLS configuration. Version 2.6.1 contains a patch for this issue. As a workaround, one may add the FDQN to the host rule. However, there is no workaround if the CNAME flattening is enabled. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2022-39271 | 2022-10-11T14:15:09 | 2025-01-14T11:07:58.057392 | Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that assists in deploying microservices. There is a potential vulnerability in Traefik managing HTTP/2 connections. A closing HTTP/2 server connection could hang forever because of a subsequent fatal error. This failure mode could be exploited to cause a denial of service. There has been a patch released in versions 2.8.8 and 2.9.0-rc5. There are currently no known workarounds. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2022-46153 | 2022-12-08T22:15:10 | 2025-01-15T04:00:17.338328 | Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2022-23469 | 2022-12-08T22:15:10 | 2025-01-14T10:44:34.877488 | Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2019-12452 | 2019-05-29T19:29:00 | 2025-02-19T02:42:20.761155 | types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or Digest HTTP Authentication section, or discover a key by reading the ClientTLS section. These can be found in the JSON response to a /api request. | [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"8a1c3510eaf521fda45f3a215017b2242b7a2e97"
] |
CVE-2018-15598 | 2018-08-21T01:29:00 | 2025-01-14T07:23:59.336190 | Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2020-9321 | 2020-03-16T19:15:11 | 2025-01-14T08:50:47.045576 | configurationwatcher.go in Traefik 2.x before 2.1.4 and TraefikEE 2.0.0 mishandles the purging of certificate contents from providers before logging. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1"
] |
CVE-2020-15129 | 2020-07-30T16:15:11 | 2025-01-15T01:42:51.003819 | In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1",
"bdc0e3bfcf5f6ce9c6dade2dda47737f7c97ef8f"
] |
CVE-2019-20894 | 2020-07-02T16:15:11 | 2025-01-14T07:55:01.879124 | Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/traefik/traefik | [] | [
"3d784a14f9a5b6f7631af87498a7c1f35664a5b1"
] |
CVE-2018-1000133 | 2018-03-16T14:29:44 | 2025-01-15T01:29:28.642505 | Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork components that can result in A standard unprivileged user could gain system administrator permissions within the web portal.. This attack appear to be exploitable via The user must be able to login, and could edit their profile and set the "System Administrator" permission to "yes" on themselves.. This vulnerability appears to have been fixed in 1.4.6 RC2. | [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/tridentli/pitchfork | [] | [
"a03e0fe1465773634ed523d8d8e5d8316a65848e"
] |
CVE-2024-43379 | 2024-08-19T15:15:08 | 2024-10-08T04:21:37.282410 | TruffleHog is a secrets scanning tool. Prior to v3.81.9, this vulnerability allows a malicious actor to craft data in a way that, when scanned by specific detectors, could trigger the detector to make an unauthorized request to an endpoint chosen by the attacker. For an exploit to be effective, the target endpoint must be an unauthenticated GET endpoint that produces side effects. The victim must scan the maliciously crafted data and have such an endpoint targeted for the exploit to succeed. The vulnerability has been resolved in TruffleHog v3.81.9 and later versions. | [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/trufflesecurity/trufflehog | [] | [
"f2c7bb93be9373d5d2a524a11c7ba739dc1de7f2"
] |
CVE-2021-29453 | 2021-04-19T19:15:17 | 2025-01-14T09:03:31.688042 | matrix-media-repo is an open-source multi-domain media repository for Matrix. Versions 1.2.6 and earlier of matrix-media-repo do not properly handle malicious images which are crafted to be small in file size, but large in complexity. A malicious user could upload a relatively small image in terms of file size, using particular image formats, which expands to have extremely large dimensions during the process of thumbnailing. The server can be exhausted of memory in the process of trying to load the whole image into memory for thumbnailing, leading to denial of service. Version 1.2.7 has a fix for the vulnerability. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/turt2live/matrix-media-repo | [] | [
"fc66a42b80a20e3ca598dfbfee84624d2a43ac14"
] |
CVE-2018-16398 | 2018-09-03T19:29:00 | 2025-01-14T07:24:20.440783 | In Twistlock AuthZ Broker 0.1, regular expressions are mishandled, as demonstrated by containers/aa/pause?aaa=\/start to bypass a policy in which "docker start" is allowed but "docker pause" is not allowed. | [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/twistlock/authz | [] | [
"484afd59f163c2db11e3de80e8a2a6a520bb4c3d"
] |
CVE-2023-33965 | 2023-06-01T15:15:09 | 2025-01-15T04:53:41.259778 | Brook is a cross-platform programmable network tool. The `tproxy` server is vulnerable to a drive-by command injection. An attacker may fool a victim into visiting a malicious web page which will trigger requests to the local `tproxy` service leading to remote code execution. A patch is available in version 20230606. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/txthinking/brook | [] | [
"860db32165f8f66f67a4e854da9c048fcbbd762c"
] |
CVE-2023-42283 | 2023-11-07T08:15:12 | 2025-01-14T11:58:24.487211 | Blind SQL injection in api_id parameter in Tyk Gateway version 5.0.3 allows attacker to access and dump the database via a crafted SQL query. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/tyktechnologies/tyk | [] | [
"54e1072a6a9918e29606edf6b60def437b273d0a"
] |
CVE-2023-42284 | 2023-11-07T08:15:12 | 2025-01-14T11:58:17.173070 | Blind SQL injection in api_version parameter in Tyk Gateway version 5.0.3 allows attacker to access and dump the database via a crafted SQL query. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/tyktechnologies/tyk | [] | [
"54e1072a6a9918e29606edf6b60def437b273d0a"
] |
CVE-2021-23365 | 2021-04-26T10:15:12 | 2025-01-15T01:48:02.313940 | The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data). | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/tyktechnologies/tyk-identity-broker | [] | [
"476edc9b795af75952d5d2979b0859aa26eeb099"
] |
CVE-2022-47747 | 2023-01-20T17:15:10 | 2025-01-14T11:16:57.639853 | kraken <= 0.1.4 has an arbitrary file read vulnerability via the component testfs. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/uber/kraken | [] | [
"78baa5ef5d624f88e8ceb152a2e14239899dc4a9"
] |
CVE-2024-9312 | 2024-10-10T14:15:05 | 2024-10-15T15:46:29.238282 | Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges. | null | https://github.com/ubuntu/authd | [] | [
"17530d217c2cdbae0c266ba848c5aa3eb0c63d0f"
] |
CVE-2024-9313 | 2024-10-03T11:15:13 | 2024-10-09T20:59:24.686126 | Authd PAM module before version 0.3.5 can allow broker-managed users to impersonate any other user managed by the same broker and perform any PAM operation with it, including authenticating as them. | null | https://github.com/ubuntu/authd | [] | [
"17530d217c2cdbae0c266ba848c5aa3eb0c63d0f"
] |
CVE-2021-36979 | 2021-07-20T07:15:08 | 2025-01-15T01:55:59.724094 | Unicorn Engine 1.0.2 has an out-of-bounds write in tb_flush_armeb (called from cpu_arm_exec_armeb and tcg_cpu_exec_armeb). | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/unicorn-engine/unicorn | [] | [
"886acbf59910499e44194dadda9c069ef7d3b291"
] |
CVE-2020-36431 | 2021-07-20T07:15:07 | 2025-01-14T08:48:21.063446 | Unicorn Engine 1.0.2 has an out-of-bounds write in helper_wfe_arm. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/unicorn-engine/unicorn | [] | [
"886acbf59910499e44194dadda9c069ef7d3b291"
] |
CVE-2021-44078 | 2021-12-26T05:15:07 | 2025-01-15T02:08:45.241362 | An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager. The issue results from the faulty comparison of GVA and GPA while calling uc_mem_map_ptr to free part of a claimed memory block. An attacker can leverage this vulnerability to escape the sandbox and execute arbitrary code on the host machine. | [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/unicorn-engine/unicorn | [] | [
"886acbf59910499e44194dadda9c069ef7d3b291"
] |
CVE-2022-29694 | 2022-06-02T14:15:50 | 2025-01-15T02:19:53.833480 | Unicorn Engine v2.0.0-rc7 and below was discovered to contain a NULL pointer dereference via qemu_ram_free. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/unicorn-engine/unicorn | [] | [
"886acbf59910499e44194dadda9c069ef7d3b291"
] |
CVE-2022-29695 | 2022-06-02T14:15:50 | 2025-01-15T02:19:53.331227 | Unicorn Engine v2.0.0-rc7 contains memory leaks caused by an incomplete unicorn engine initialization. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/unicorn-engine/unicorn | [] | [
"886acbf59910499e44194dadda9c069ef7d3b291"
] |
CVE-2022-29693 | 2022-06-02T14:15:50 | 2025-01-15T02:19:53.533952 | Unicorn Engine v2.0.0-rc7 and below was discovered to contain a memory leak via the function uc_close at /my/unicorn/uc.c. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/unicorn-engine/unicorn | [] | [
"886acbf59910499e44194dadda9c069ef7d3b291"
] |
CVE-2022-29692 | 2022-06-02T14:15:50 | 2025-01-14T10:56:47.904315 | Unicorn Engine v1.0.3 was discovered to contain a use-after-free vulnerability via the hook function. | [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/unicorn-engine/unicorn | [] | [
"886acbf59910499e44194dadda9c069ef7d3b291"
] |
CVE-2025-24355 | 2025-01-24T17:15:16 | 2025-01-28T15:41:50.960971 | Updatecli is a tool used to apply file update strategies. Prior to version 0.93.0, private maven repository credentials may be leaked in application logs in case of unsuccessful retrieval operation. During the execution of an updatecli pipeline which contains a `maven` source configured with basic auth credentials, the credentials are being leaked in the application execution logs in case of failure. Credentials are properly sanitized when the operation is successful but not when for whatever reason there is a failure in the maven repository, e.g. wrong coordinates provided, not existing artifact or version. Version 0.93.0 contains a patch for the issue. | null | https://github.com/updatecli/updatecli | [] | [
"68cdd96b910d136968a43a263d22d5485e8b2a14"
] |
CVE-2024-29030 | 2024-04-19T15:15:50 | 2025-01-15T05:11:24.165193 | memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file. | null | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2024-29029 | 2024-04-19T16:15:09 | 2025-01-15T05:11:22.736456 | memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2024-29028 | 2024-04-19T15:15:50 | 2025-01-15T05:11:22.682983 | memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/httpmeta that allows unauthenticated users to enumerate the internal network and receive limited html values in json form. This vulnerability is fixed in 0.16.1. | null | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-0109 | 2024-11-15T11:15:08 | 2024-11-19T17:42:39.606884 | A stored cross-site scripting (XSS) vulnerability was discovered in usememos/memos version 0.9.1. This vulnerability allows an attacker to upload a JavaScript file containing a malicious script and reference it in an HTML file. When the HTML file is accessed, the malicious script is executed. This can lead to the theft of sensitive information, such as login credentials, from users visiting the affected website. The issue has been fixed in version 0.10.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2024-41659 | 2024-08-20T20:15:08 | 2024-10-08T04:20:16.791331 | memos is a privacy-first, lightweight note-taking service. A CORS misconfiguration exists in memos 0.20.1 and earlier where an arbitrary origin is reflected with Access-Control-Allow-Credentials set to true. This may allow an attacking website to make a cross-origin request, allowing the attacker to read private information or make privileged changes to the system as the vulnerable user account. This vulnerability is fixed in 0.21.0. | null | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-0106 | 2023-01-07T04:15:08 | 2025-01-15T04:36:49.505367 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-0111 | 2023-01-07T04:15:08 | 2025-01-15T04:37:20.694743 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-0107 | 2023-01-07T04:15:08 | 2025-01-15T04:36:54.166929 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-0110 | 2023-01-07T04:15:08 | 2025-01-15T04:37:11.158449 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-0112 | 2023-01-07T04:15:08 | 2025-01-15T04:37:15.866850 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-0108 | 2023-01-07T04:15:08 | 2025-01-15T04:37:16.620971 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-4698 | 2023-09-01T01:15:09 | 2025-01-15T05:00:21.420964 | Improper Input Validation in GitHub repository usememos/memos prior to 0.13.2. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-4696 | 2023-09-01T01:15:08 | 2025-01-15T05:00:18.554147 | Improper Access Control in GitHub repository usememos/memos prior to 0.13.2. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-5036 | 2023-09-18T06:15:08 | 2025-01-15T05:02:23.881951 | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.15.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2023-4697 | 2023-09-01T01:15:09 | 2025-01-15T05:00:19.754757 | Improper Privilege Management in GitHub repository usememos/memos prior to 0.13.2. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-25978 | 2023-02-15T05:15:11 | 2025-01-15T02:18:20.463842 | All versions of the package github.com/usememos/memos/server are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4813 | 2022-12-28T14:15:11 | 2025-01-15T04:26:56.187136 | Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4811 | 2022-12-28T14:15:11 | 2025-01-15T04:27:49.879967 | Authorization Bypass Through User-Controlled Key vulnerability in usememos usememos/memos.This issue affects usememos/memos before 0.9.1.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4848 | 2022-12-29T18:15:10 | 2025-01-15T04:29:31.192700 | Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4846 | 2022-12-29T18:15:10 | 2025-01-15T04:30:58.096985 | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4844 | 2022-12-29T18:15:10 | 2025-01-15T04:29:26.184819 | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4841 | 2022-12-29T17:15:21 | 2025-01-15T04:26:12.071725 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4840 | 2022-12-29T17:15:21 | 2025-01-15T02:18:33.170970 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4806 | 2022-12-28T14:15:11 | 2025-01-15T04:25:51.605960 | Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4797 | 2022-12-28T14:15:10 | 2025-01-15T04:25:27.538426 | Improper Restriction of Excessive Authentication Attempts in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4798 | 2022-12-28T14:15:10 | 2025-01-15T04:25:32.283375 | Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4866 | 2022-12-31T09:15:11 | 2025-01-15T04:31:37.670102 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4807 | 2022-12-28T14:15:11 | 2025-01-15T04:27:06.429417 | Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4801 | 2022-12-28T14:15:10 | 2025-01-15T04:26:45.721372 | Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4847 | 2022-12-29T18:15:10 | 2025-01-15T04:31:02.824758 | Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4799 | 2022-12-28T14:15:10 | 2025-01-15T04:25:42.020864 | Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4684 | 2022-12-23T12:15:10 | 2025-01-15T04:10:39.279463 | Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4689 | 2022-12-23T12:15:12 | 2025-01-15T04:10:58.810010 | Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4851 | 2022-12-29T18:15:10 | 2025-01-15T04:29:36.159078 | Improper Handling of Values in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4849 | 2022-12-29T18:15:10 | 2025-01-15T04:30:24.608355 | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4802 | 2022-12-28T14:15:10 | 2025-01-15T04:26:47.518994 | Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4809 | 2022-12-28T14:15:11 | 2025-01-15T04:27:03.845123 | Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4691 | 2022-12-27T15:15:11 | 2025-01-15T04:11:04.210527 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4850 | 2022-12-29T18:15:10 | 2025-01-15T04:30:20.086152 | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4683 | 2022-12-23T12:15:08 | 2025-01-15T04:10:16.762579 | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4609 | 2022-12-19T12:15:11 | 2025-01-15T03:56:48.215302 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4808 | 2022-12-28T14:15:11 | 2025-01-15T04:25:37.077977 | Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4863 | 2022-12-30T16:15:09 | 2025-01-15T04:31:07.561484 | Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4734 | 2022-12-27T15:15:12 | 2025-01-15T04:19:08.440239 | Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository usememos/memos prior to 0.9.1.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4800 | 2022-12-28T14:15:10 | 2025-01-15T04:27:14.646060 | Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4804 | 2022-12-28T14:15:10 | 2025-01-15T04:27:01.174033 | Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4687 | 2022-12-23T12:15:11 | 2025-01-15T04:11:18.362160 | Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4695 | 2022-12-27T15:15:11 | 2025-01-15T04:10:53.605525 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4805 | 2022-12-28T14:15:10 | 2025-01-15T04:26:50.883308 | Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4812 | 2022-12-28T14:15:11 | 2025-01-15T04:25:46.974411 | Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4803 | 2022-12-28T14:15:10 | 2025-01-15T04:26:52.237954 | Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4865 | 2022-12-31T09:15:08 | 2025-01-15T04:31:11.306272 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4814 | 2022-12-28T14:15:11 | 2025-01-15T04:26:56.778443 | Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4686 | 2022-12-23T12:15:11 | 2025-01-15T04:10:11.609032 | Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4845 | 2022-12-29T18:15:10 | 2025-01-15T04:30:29.113411 | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4796 | 2022-12-28T14:15:09 | 2025-01-15T04:20:22.655591 | Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4690 | 2022-12-23T12:15:12 | 2025-01-15T04:11:57.063981 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4839 | 2022-12-29T17:15:21 | 2025-01-15T04:28:47.653655 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4694 | 2022-12-27T15:15:11 | 2025-01-15T04:12:20.592696 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4692 | 2022-12-23T20:15:20 | 2025-01-15T04:12:11.852364 | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4688 | 2022-12-23T12:15:11 | 2025-01-15T04:12:01.494840 | Improper Authorization in GitHub repository usememos/memos prior to 0.9.0. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4767 | 2022-12-27T15:15:12 | 2025-01-15T04:20:01.737401 | Denial of Service in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-4810 | 2022-12-28T14:15:11 | 2025-01-15T04:27:42.444906 | Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/usememos/memos | [] | [
"7ec22482c16bbcacfbfe369c216c022623601723"
] |
CVE-2022-21221 | 2022-03-17T12:15:08 | 2025-01-15T02:14:18.499972 | The package github.com/valyala/fasthttp before 1.34.0 are vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only. | [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/valyala/fasthttp | [] | [
"61aa8b17a240b66ead927f945a3e8a96c3f0ec40"
] |
CVE-2023-35163 | 2023-06-23T21:15:09 | 2025-01-15T04:54:55.689367 | Vega is a decentralized trading platform that allows pseudo-anonymous trading of derivatives on a blockchain. Prior to version 0.71.6, a vulnerability exists that allows a malicious validator to trick the Vega network into re-processing past Ethereum events from Vega’s Ethereum bridge. For example, a deposit to the collateral bridge for 100USDT that credits a party’s general account on Vega, can be re-processed 50 times resulting in 5000USDT in that party’s general account. This is without depositing any more than the original 100USDT on the bridge. Despite this exploit requiring access to a validator's Vega key, a validator key can be obtained at the small cost of 3000VEGA, the amount needed to announce a new node onto the network.
A patch is available in version 0.71.6. No known workarounds are available, however there are mitigations in place should this vulnerability be exploited. There are monitoring alerts for `mainnet1` in place to identify any issues of this nature including this vulnerability being exploited. The validators have the ability to stop the bridge thus stopping any withdrawals should this vulnerability be exploited. | [
{
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"type": "CVSS_V3"
}
] | https://github.com/vegaprotocol/vega | [] | [
"491d8b92dbc35f759044fd32896b0e05e12c08ca"
] |
CVE-2023-0290 | 2023-01-18T22:15:10 | 2025-01-14T11:17:44.028373 | Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of "../clients/server" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client.
Normally, to schedule an artifact on the server, the COLLECT_SERVER permission is required. This permission is normally only granted to "administrator" role. Due to this issue, it is sufficient to have the COLLECT_CLIENT privilege, which is normally granted to the "investigator" role.
To exploit this vulnerability, the attacker must already have a Velociraptor user account at least "investigator" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI.
This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
] | https://github.com/velocidex/velociraptor | [] | [
"00a58d673852aad141a354fe18bd58f721ceaccd"
] |
CVE-2023-0242 | 2023-01-18T21:15:11 | 2025-01-14T11:17:44.455745 | Rapid7 Velociraptor allows users to be created with different privileges on the server. Administrators are generally allowed to run any command on the server including writing arbitrary files. However, lower privilege users are generally forbidden from writing or modifying files on the server.
The VQL copy() function applies permission checks for reading files but does not check for permission to write files. This allows a low privilege user (usually, users with the Velociraptor "investigator" role) to overwrite files on the server, including Velociraptor configuration files.
To exploit this vulnerability, the attacker must already have a Velociraptor user account at a low privilege level (at least "analyst") and be able to log into the GUI and create a notebook where they can run the VQL query invoking the copy() VQL function. Typically, most users deploy Velociraptor with limited access to a trusted group (most users will be administrators within the GUI).
This vulnerability is associated with program files https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go and program routines copy().
This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.
| [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
] | https://github.com/velocidex/velociraptor | [] | [
"00a58d673852aad141a354fe18bd58f721ceaccd"
] |
Subsets and Splits