Show filters
167 Total Results
Displaying 101-110 of 167
Sort by:
Attacker Value
Unknown

CVE-2021-38554

Disclosure Date: August 13, 2021 (last updated February 23, 2025)
HashiCorp Vault and Vault Enterprise’s UI erroneously cached and exposed user-viewed secrets between sessions in a single shared browser. Fixed in 1.8.0 and pending 1.7.4 / 1.6.6 releases.
Attacker Value
Unknown

CVE-2021-38553

Disclosure Date: August 13, 2021 (last updated February 23, 2025)
HashiCorp Vault and Vault Enterprise 1.4.0 through 1.7.3 initialized an underlying database file associated with the Integrated Storage feature with excessively broad filesystem permissions. Fixed in Vault and Vault Enterprise 1.8.0.
Attacker Value
Unknown

CVE-2021-36230

Disclosure Date: July 20, 2021 (last updated February 23, 2025)
HashiCorp Terraform Enterprise releases up to v202106-1 did not properly perform authorization checks on a subset of API requests executed using the run token, allowing privilege escalation to organization owner. Fixed in v202107-1.
Attacker Value
Unknown

CVE-2021-32574

Disclosure Date: July 17, 2021 (last updated February 23, 2025)
HashiCorp Consul and Consul Enterprise 1.3.0 through 1.10.0 Envoy proxy TLS configuration does not validate destination service identity in the encoded subject alternative name. Fixed in 1.8.14, 1.9.8, and 1.10.1.
Attacker Value
Unknown

CVE-2021-36213

Disclosure Date: July 17, 2021 (last updated November 28, 2024)
HashiCorp Consul and Consul Enterprise 1.9.0 through 1.10.0 default deny policy with a single L7 application-aware intention deny action cancels out, causing the intention to incorrectly fail open, allowing L4 traffic. Fixed in 1.9.8 and 1.10.1.
Attacker Value
Unknown

CVE-2021-32575

Disclosure Date: June 17, 2021 (last updated November 28, 2024)
HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.
Attacker Value
Unknown

CVE-2021-32923

Disclosure Date: June 03, 2021 (last updated February 22, 2025)
HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.
Attacker Value
Unknown

CVE-2021-32074

Disclosure Date: May 07, 2021 (last updated February 22, 2025)
HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.
Attacker Value
Unknown

CVE-2021-29653

Disclosure Date: April 22, 2021 (last updated February 22, 2025)
HashiCorp Vault and Vault Enterprise 1.5.1 and newer, under certain circumstances, may exclude revoked but unexpired certificates from the CRL. Fixed in 1.5.8, 1.6.4, and 1.7.1.
Attacker Value
Unknown

CVE-2021-30476

Disclosure Date: April 22, 2021 (last updated November 28, 2024)
HashiCorp Terraform’s Vault Provider (terraform-provider-vault) did not correctly configure GCE-type bound labels for Vault’s GCP auth method. Fixed in 2.19.1.