Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linuxfoundation harbor vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2019-19023
Cloud Native Computing Foundation Harbor before 1.8.6 and 1.9.3 has a Privilege Escalation Vulnerability in the VMware Harbor Container Registry for the Pivotal Platform.
Linuxfoundation Harbor
Pivotal Vmware Harbor Registry -
8.8
CVSSv3
CVE-2019-19025
Cloud Native Computing Foundation Harbor before 1.8.6 and 1.9.3 allows CSRF in the VMware Harbor Container Registry for the Pivotal Platform.
Linuxfoundation Harbor
Pivotal Vmware Harbor Registry -
8.6
CVSSv3
CVE-2017-17697
The Ping() function in ui/api/target.go in Harbor up to and including 1.3.0-rc4 has SSRF via the endpoint parameter to /api/targets/ping.
Linuxfoundation Harbor
Linuxfoundation Harbor 1.3.0
7.5
CVSSv3
CVE-2022-46463
An access control issue in Harbor v1.X.X to v2.5.3 allows malicious users to access public and private image repositories without authentication. NOTE: the vendor's position is that this "is clearly described in the documentation as a feature."
Linuxfoundation Harbor
3 Github repositories
7.5
CVSSv3
CVE-2019-16919
Harbor API has a Broken Access Control vulnerability. The vulnerability allows project administrators to use the Harbor API to create a robot account with unauthorized push and/or pull access permissions to a project they don't have access or control for. The Harbor API did ...
Linuxfoundation Harbor
Linuxfoundation Harbor 1.9.0
Vmware Cloud Foundation -
Vmware Harbor Container Registry
7.2
CVSSv3
CVE-2019-19029
Cloud Native Computing Foundation Harbor before 1.8.6 and 1.9.3 allows SQL Injection via user-groups in the VMware Harbor Container Registry for the Pivotal Platform.
Linuxfoundation Harbor
Pivotal Vmware Harbor Registry -
6.5
CVSSv3
CVE-2023-20902
A timing condition in Harbor 2.6.x and below, Harbor 2.7.2 and below, Harbor 2.8.2 and below, and Harbor 1.10.17 and below allows an attacker with network access to create jobs/stop job tasks and retrieve job task information.
Linuxfoundation Harbor
6.5
CVSSv3
CVE-2019-16097
core/api/user.go in Harbor 1.7.0 up to and including 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround...
Linuxfoundation Harbor 1.7.0
Linuxfoundation Harbor 1.7.1
Linuxfoundation Harbor 1.7.2
Linuxfoundation Harbor 1.7.3
Linuxfoundation Harbor 1.7.4
Linuxfoundation Harbor 1.7.5
Linuxfoundation Harbor 1.8.0
Linuxfoundation Harbor 1.8.1
Linuxfoundation Harbor 1.8.2
Linuxfoundation Harbor 1.9.0
6 Github repositories
1 Article
5.3
CVSSv3
CVE-2019-19030
Cloud Native Computing Foundation Harbor prior to 1.10.3 and 2.x prior to 2.0.1 allows resource enumeration because unauthenticated API calls reveal (via the HTTP status code) whether a resource exists.
Linuxfoundation Harbor
1 Github repository
5.3
CVSSv3
CVE-2020-29662
In Harbor 2.0 prior to 2.0.5 and 2.1.x prior to 2.1.2 the catalog’s registry API is exposed on an unauthenticated path.
Linuxfoundation Harbor
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »