Show filters
188 Total Results
Displaying 91-100 of 188
Sort by:
Attacker Value
Unknown

CVE-2021-32074

Disclosure Date: May 07, 2021 (last updated February 22, 2025)
HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.
Attacker Value
Unknown

CVE-2021-29653

Disclosure Date: April 22, 2021 (last updated February 22, 2025)
HashiCorp Vault and Vault Enterprise 1.5.1 and newer, under certain circumstances, may exclude revoked but unexpired certificates from the CRL. Fixed in 1.5.8, 1.6.4, and 1.7.1.
Attacker Value
Unknown

CVE-2021-27400

Disclosure Date: April 22, 2021 (last updated February 22, 2025)
HashiCorp Vault and Vault Enterprise Cassandra integrations (storage backend and database secrets engine plugin) did not validate TLS certificates when connecting to Cassandra clusters. Fixed in 1.6.4 and 1.7.1
Attacker Value
Unknown

CVE-2021-3024

Disclosure Date: February 01, 2021 (last updated November 28, 2024)
HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
Attacker Value
Unknown

CVE-2021-3282

Disclosure Date: February 01, 2021 (last updated February 22, 2025)
HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2.
Attacker Value
Unknown

CVE-2020-25594

Disclosure Date: February 01, 2021 (last updated November 28, 2024)
HashiCorp Vault and Vault Enterprise allowed for enumeration of Secrets Engine mount paths via unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
Attacker Value
Unknown

CVE-2020-36164

Disclosure Date: January 06, 2021 (last updated November 28, 2024)
An issue was discovered in Veritas Enterprise Vault through 14.0. On start-up, it loads the OpenSSL library. The OpenSSL library then attempts to load the openssl.cnf configuration file (which does not exist) at the following locations in both the System drive (typically C:\) and the product's installation drive (typically not C:\): \Isode\etc\ssl\openssl.cnf (on SMTP Server) or \user\ssl\openssl.cnf (on other affected components). By default, on Windows systems, users can create directories under C:\. A low privileged user can create a openssl.cnf configuration file to load a malicious OpenSSL engine, resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc. This vulnerability only affects a server with MTP Server, SMTP Archiving IMAP Server, IMAP Archiving, Vault Cloud Adapter, NetApp File server, or File System Arc…
Attacker Value
Unknown

CVE-2020-35453

Disclosure Date: December 17, 2020 (last updated November 28, 2024)
HashiCorp Vault Enterprise’s Sentinel EGP policy feature incorrectly allowed requests to be processed in parent and sibling namespaces. Fixed in 1.5.6 and 1.6.1.
Attacker Value
Unknown

CVE-2020-35177

Disclosure Date: December 17, 2020 (last updated February 22, 2025)
HashiCorp Vault and Vault Enterprise 1.4.1 and newer allowed the enumeration of users via the LDAP auth method. Fixed in 1.5.6 and 1.6.1.
Attacker Value
Unknown

CVE-2020-35192

Disclosure Date: December 17, 2020 (last updated February 22, 2025)
The official vault docker images before 0.11.6 contain a blank password for a root user. System using the vault docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.