Show filters
167 Total Results
Displaying 1-10 of 167
Sort by:
Attacker Value
Unknown

CVE-2025-1293

Disclosure Date: February 20, 2025 (last updated February 20, 2025)
Hermes versions up to 0.4.0 improperly validated the JWT provided when using the AWS ALB authentication mode, potentially allowing for authentication bypass. This vulnerability, CVE-2025-1293, was fixed in Hermes 0.5.0.
0
Attacker Value
Unknown

CVE-2025-0937

Disclosure Date: February 12, 2025 (last updated February 13, 2025)
Nomad Community and Nomad Enterprise ("Nomad") event stream configured with a wildcard namespace can bypass the ACL Policy allowing reads on other namespaces.
0
Attacker Value
Unknown

CVE-2025-0377

Disclosure Date: January 21, 2025 (last updated January 22, 2025)
HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.
0
Attacker Value
Unknown

CVE-2024-12678

Disclosure Date: December 20, 2024 (last updated December 21, 2024)
Nomad Community and Nomad Enterprise ("Nomad") allocations are vulnerable to privilege escalation within a namespace through unredacted workload identity tokens. This vulnerability, identified as CVE-2024-12678, is fixed in Nomad Community Edition 1.9.4 and Nomad Enterprise 1.9.4, 1.8.8, and 1.7.16.
0
Attacker Value
Unknown

CVE-2024-12289

Disclosure Date: December 12, 2024 (last updated December 18, 2024)
Boundary Community Edition and Boundary Enterprise (“Boundary”) incorrectly handle HTTP requests during the initialization of the Boundary controller, which may cause the Boundary server to terminate prematurely. Boundary is only vulnerable to this flaw during the initialization of the Boundary controller, which on average is measured in milliseconds during the Boundary startup process. This vulnerability, CVE-2024-12289, is fixed in Boundary Community Edition and Boundary Enterprise 0.16.4, 0.17.3, 0.18.2.
0
Attacker Value
Unknown

CVE-2024-10975

Disclosure Date: November 07, 2024 (last updated November 08, 2024)
Nomad Community and Nomad Enterprise ("Nomad") volume specification is vulnerable to arbitrary cross-namespace volume creation through unauthorized Container Storage Interface (CSI) volume writes. This vulnerability, identified as CVE-2024-10975, is fixed in Nomad Community Edition 1.9.2 and Nomad Enterprise 1.9.2, 1.8.7, and 1.7.15.
0
Attacker Value
Unknown

CVE-2024-8185

Disclosure Date: October 31, 2024 (last updated November 01, 2024)
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself. This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
0
Attacker Value
Unknown

CVE-2024-10086

Disclosure Date: October 30, 2024 (last updated November 09, 2024)
A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.
Attacker Value
Unknown

CVE-2024-10006

Disclosure Date: October 30, 2024 (last updated November 09, 2024)
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using Headers in L7 traffic intentions could bypass HTTP header based access rules.
Attacker Value
Unknown

CVE-2024-10005

Disclosure Date: October 30, 2024 (last updated November 09, 2024)
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules.