Show filters
645 Total Results
Displaying 141-150 of 645
Sort by:
Attacker Value
Unknown
CVE-2023-45822
Disclosure Date: October 19, 2023 (last updated October 31, 2023)
Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which a default unsafe rego built-in was allowed to be used when defining authorization policies. Artifact Hub includes a fine-grained authorization mechanism that allows organizations to define what actions can be performed by their members. It is based on customizable authorization policies that are enforced by the `Open Policy Agent`. Policies are written using `rego` and their data files are expected to be json documents. By default, `rego` allows policies to make HTTP requests, which can be abused to send requests to internal resources and forward the responses to an external entity. In the context of Artifact Hub, this capability should have been disabled. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known…
0
Attacker Value
Unknown
CVE-2023-45821
Disclosure Date: October 19, 2023 (last updated November 01, 2023)
Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which the `registryIsDockerHub` function was only checking that the registry domain had the `docker.io` suffix. Artifact Hub allows providing some Docker credentials that are used to increase the rate limit applied when interacting with the Docker Hub registry API to read publicly available content. Due to the incorrect check described above, it'd be possible to hijack those credentials by purchasing a domain which ends with `docker.io` and deploying a fake OCI registry on it. <https://artifacthub.io/> uses some credentials that only have permissions to read public content available in the Docker Hub. However, even though credentials for private repositories (disabled on `artifacthub.io`) are handled in a different way, other Artifact Hub deployments could ha…
0
Attacker Value
Unknown
CVE-2023-42189
Disclosure Date: October 10, 2023 (last updated February 25, 2025)
Insecure Permissions vulnerability in Connectivity Standards Alliance Matter Official SDK v.1.1.0.0 , Nanoleaf Light strip v.3.5.10, Govee LED Strip v.3.00.42, switchBot Hub2 v.1.0-0.8, Phillips hue hub v.1.59.1959097030, and yeelight smart lamp v.1.12.69 allows a remote attacker to cause a denial of service via a crafted script to the KeySetRemove function.
0
Attacker Value
Unknown
CVE-2023-3361
Disclosure Date: October 04, 2023 (last updated February 25, 2025)
A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.
0
Attacker Value
Unknown
CVE-2023-24850
Disclosure Date: October 03, 2023 (last updated February 25, 2025)
Memory Corruption in HLOS while importing a cryptographic key into KeyMaster Trusted Application.
0
Attacker Value
Unknown
CVE-2023-4987
Disclosure Date: September 15, 2023 (last updated February 25, 2025)
A vulnerability, which was classified as critical, has been found in infinitietech taskhub 2.8.7. Affected by this issue is some unknown functionality of the file /home/get_tasks_list of the component GET Parameter Handler. The manipulation of the argument project/status/user_id/sort/search leads to sql injection. VDB-239798 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2023-41423
Disclosure Date: September 12, 2023 (last updated February 25, 2025)
Cross Site Scripting vulnerability in WP Githuber MD plugin v.1.16.2 allows a remote attacker to execute arbitrary code via a crafted payload to the new article function.
0
Attacker Value
Unknown
CVE-2023-33021
Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Memory corruption in Graphics while processing user packets for command submission.
0
Attacker Value
Unknown
CVE-2023-33020
Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Transient DOS in WLAN Host when an invalid channel (like channel out of range) is received in STA during CSA IE.
0
Attacker Value
Unknown
CVE-2023-33019
Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Transient DOS in WLAN Host while doing channel switch announcement (CSA), when a mobile station receives invalid channel in CSA IE.
0