Show filters
167 Total Results
Displaying 21-30 of 167
Sort by:
Attacker Value
Unknown

CVE-2024-2877

Disclosure Date: April 30, 2024 (last updated May 01, 2024)
Vault Enterprise, when configured with performance standby nodes and a configured audit device, will inadvertently log request headers on the standby node. These logs may have included sensitive HTTP request information in cleartext. This vulnerability, CVE-2024-2877, was fixed in Vault Enterprise 1.15.8.
0
Attacker Value
Unknown

CVE-2024-3817

Disclosure Date: April 17, 2024 (last updated April 18, 2024)
HashiCorp’s go-getter library is vulnerable to argument injection when executing Git to discover remote branches. This vulnerability does not affect the go-getter/v2 branch and package.
0
Attacker Value
Unknown

CVE-2024-2660

Disclosure Date: April 04, 2024 (last updated September 26, 2024)
Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. This vulnerability, CVE-2024-2660, affects Vault and Vault Enterprise 1.14.0 and above, and is fixed in Vault 1.16.0 and Vault Enterprise 1.16.1, 1.15.7, and 1.14.11.
0
Attacker Value
Unknown

CVE-2024-2048

Disclosure Date: March 04, 2024 (last updated March 05, 2024)
Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious certificate that could be used to bypass authentication. Fixed in Vault 1.15.5 and 1.14.10.
0
Attacker Value
Unknown

CVE-2024-1329

Disclosure Date: February 08, 2024 (last updated September 26, 2024)
HashiCorp Nomad and Nomad Enterprise 1.5.13 up to 1.6.6, and 1.7.3 template renderer is vulnerable to arbitrary file write on the host as the Nomad client user through symlink attacks. This vulnerability, CVE-2024-1329, is fixed in Nomad 1.7.4, 1.6.7, and 1.5.14.
Attacker Value
Unknown

CVE-2024-1052

Disclosure Date: February 05, 2024 (last updated February 16, 2024)
Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
Attacker Value
Unknown

CVE-2024-0831

Disclosure Date: February 01, 2024 (last updated February 10, 2024)
Vault and Vault Enterprise (“Vault”) may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `log_raw`.
Attacker Value
Unknown

CVE-2023-6337

Disclosure Date: December 08, 2023 (last updated February 14, 2025)
HashiCorp Vault and Vault Enterprise 1.12.0 and newer are vulnerable to a denial of service through memory exhaustion of the host when handling large unauthenticated and authenticated HTTP requests from a client. Vault will attempt to map the request to memory, resulting in the exhaustion of available memory on the host, which may cause Vault to crash. Fixed in Vault 1.15.4, 1.14.8, 1.13.12.
Attacker Value
Unknown

CVE-2023-5332

Disclosure Date: December 04, 2023 (last updated December 08, 2023)
Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.
Attacker Value
Unknown

CVE-2023-5954

Disclosure Date: November 09, 2023 (last updated November 17, 2023)
HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.