Show filters
188 Total Results
Displaying 91-100 of 188
Sort by:
Attacker Value
Unknown
CVE-2021-32074
Disclosure Date: May 07, 2021 (last updated February 22, 2025)
HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.
0
Attacker Value
Unknown
CVE-2021-29653
Disclosure Date: April 22, 2021 (last updated February 22, 2025)
HashiCorp Vault and Vault Enterprise 1.5.1 and newer, under certain circumstances, may exclude revoked but unexpired certificates from the CRL. Fixed in 1.5.8, 1.6.4, and 1.7.1.
0
Attacker Value
Unknown
CVE-2021-27400
Disclosure Date: April 22, 2021 (last updated February 22, 2025)
HashiCorp Vault and Vault Enterprise Cassandra integrations (storage backend and database secrets engine plugin) did not validate TLS certificates when connecting to Cassandra clusters. Fixed in 1.6.4 and 1.7.1
0
Attacker Value
Unknown
CVE-2021-3024
Disclosure Date: February 01, 2021 (last updated November 28, 2024)
HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
0
Attacker Value
Unknown
CVE-2021-3282
Disclosure Date: February 01, 2021 (last updated February 22, 2025)
HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2.
0
Attacker Value
Unknown
CVE-2020-25594
Disclosure Date: February 01, 2021 (last updated November 28, 2024)
HashiCorp Vault and Vault Enterprise allowed for enumeration of Secrets Engine mount paths via unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
0
Attacker Value
Unknown
CVE-2020-36164
Disclosure Date: January 06, 2021 (last updated November 28, 2024)
An issue was discovered in Veritas Enterprise Vault through 14.0. On start-up, it loads the OpenSSL library. The OpenSSL library then attempts to load the openssl.cnf configuration file (which does not exist) at the following locations in both the System drive (typically C:\) and the product's installation drive (typically not C:\): \Isode\etc\ssl\openssl.cnf (on SMTP Server) or \user\ssl\openssl.cnf (on other affected components). By default, on Windows systems, users can create directories under C:\. A low privileged user can create a openssl.cnf configuration file to load a malicious OpenSSL engine, resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc. This vulnerability only affects a server with MTP Server, SMTP Archiving IMAP Server, IMAP Archiving, Vault Cloud Adapter, NetApp File server, or File System Arc…
0
Attacker Value
Unknown
CVE-2020-35453
Disclosure Date: December 17, 2020 (last updated November 28, 2024)
HashiCorp Vault Enterprise’s Sentinel EGP policy feature incorrectly allowed requests to be processed in parent and sibling namespaces. Fixed in 1.5.6 and 1.6.1.
0
Attacker Value
Unknown
CVE-2020-35177
Disclosure Date: December 17, 2020 (last updated February 22, 2025)
HashiCorp Vault and Vault Enterprise 1.4.1 and newer allowed the enumeration of users via the LDAP auth method. Fixed in 1.5.6 and 1.6.1.
0
Attacker Value
Unknown
CVE-2020-35192
Disclosure Date: December 17, 2020 (last updated February 22, 2025)
The official vault docker images before 0.11.6 contain a blank password for a root user. System using the vault docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
0