Show filters
167 Total Results
Displaying 61-70 of 167
Sort by:
Attacker Value
Unknown

CVE-2022-3867

Disclosure Date: November 10, 2022 (last updated February 24, 2025)
HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 event stream subscribers using a token with TTL receive updates until token garbage is collected. Fixed in 1.4.2.
Attacker Value
Unknown

CVE-2022-36182

Disclosure Date: October 27, 2022 (last updated February 24, 2025)
Hashicorp Boundary v0.8.0 is vulnerable to Clickjacking which allow for the interception of login credentials, re-direction of users to malicious sites, or causing users to perform malicious actions on the site.
Attacker Value
Unknown

CVE-2022-41316

Disclosure Date: October 12, 2022 (last updated February 24, 2025)
HashiCorp Vault and Vault Enterprise’s TLS certificate auth method did not initially load the optionally configured CRL issued by the role's CA into memory on startup, resulting in the revocation list not being checked if the CRL has not yet been retrieved. Fixed in 1.12.0, 1.11.4, 1.10.7, and 1.9.10.
Attacker Value
Unknown

CVE-2022-41606

Disclosure Date: October 12, 2022 (last updated October 08, 2023)
HashiCorp Nomad and Nomad Enterprise 1.0.2 up to 1.2.12, and 1.3.5 jobs submitted with an artifact stanza using invalid S3 or GCS URLs can be used to crash client agents. Fixed in 1.2.13, 1.3.6, and 1.4.0.
Attacker Value
Unknown

CVE-2022-42717

Disclosure Date: October 11, 2022 (last updated February 24, 2025)
An issue was discovered in Hashicorp Packer before 2.3.1. The recommended sudoers configuration for Vagrant on Linux is insecure. If the host has been configured according to this documentation, non-privileged users on the host can leverage a wildcard in the sudoers configuration to execute arbitrary commands as root.
Attacker Value
Unknown

CVE-2022-40716

Disclosure Date: September 23, 2022 (last updated February 24, 2025)
HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."
Attacker Value
Unknown

CVE-2021-41803

Disclosure Date: September 23, 2022 (last updated February 24, 2025)
HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2."
Attacker Value
Unknown

CVE-2022-40186

Disclosure Date: September 22, 2022 (last updated November 29, 2024)
An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault.
Attacker Value
Unknown

CVE-2022-36130

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
HashiCorp Boundary up to 0.10.1 did not properly perform data integrity checks to ensure the resources were associated with the correct scopes, allowing potential privilege escalation for authorized users of another scope. Fixed in Boundary 0.10.2.
Attacker Value
Unknown

CVE-2022-38149

Disclosure Date: August 17, 2022 (last updated February 24, 2025)
HashiCorp Consul Template up to 0.27.2, 0.28.2, and 0.29.1 may expose the contents of Vault secrets in the error returned by the *template.Template.Execute method, when given a template using Vault secret contents incorrectly. Fixed in 0.27.3, 0.28.3, and 0.29.2.