Show filters
185 Total Results
Displaying 91-100 of 185
Sort by:
Attacker Value
Unknown
CVE-2018-21034
Disclosure Date: April 09, 2020 (last updated February 21, 2025)
In Argo versions prior to v1.5.0-rc1, it was possible for authenticated Argo users to submit API calls to retrieve secrets and other manifests which were stored within git.
0
Attacker Value
Unknown
CVE-2020-8828
Disclosure Date: April 08, 2020 (last updated February 21, 2025)
As of v1.5.0, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere.
0
Attacker Value
Unknown
CVE-2020-8826
Disclosure Date: April 08, 2020 (last updated February 21, 2025)
As of v1.5.0, the Argo web interface authentication system issued immutable tokens. Authentication tokens, once issued, were usable forever without expiration—there was no refresh or forced re-authentication.
0
Attacker Value
Unknown
CVE-2020-8827
Disclosure Date: April 08, 2020 (last updated February 21, 2025)
As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
0
Attacker Value
Unknown
CVE-2020-11576
Disclosure Date: April 08, 2020 (last updated February 21, 2025)
Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise.
0
Attacker Value
Unknown
CVE-2020-9402
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
0
Attacker Value
Unknown
CVE-2020-7471
Disclosure Date: February 03, 2020 (last updated February 21, 2025)
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
0
Attacker Value
Unknown
CVE-2019-20088
Disclosure Date: December 30, 2019 (last updated November 27, 2024)
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GetPayload in GPMF_mp4reader.c.
0
Attacker Value
Unknown
CVE-2019-20087
Disclosure Date: December 30, 2019 (last updated November 27, 2024)
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GPMF_seekToSamples in GPMF-parse.c for the "matching tags" feature.
0
Attacker Value
Unknown
CVE-2019-20086
Disclosure Date: December 30, 2019 (last updated November 27, 2024)
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GPMF_Next in GPMF_parser.c.
0