cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-46463,https://securityvulnerability.io/vulnerability/CVE-2022-46463,Access Control Issue in Harbor Image Repository by VMware,"An access control issue present in Harbor versions up to v2.5.3 allows unauthorized users to access both public and private image repositories without requiring authentication. This situation can lead to potential data exposure and misuse, as sensitive images stored within the repository can be accessed freely. While the vendor indicates this functionality is documented as a feature, it presents significant security concerns for users relying on secure access to their repositories.",Linux,Harbor,7.5,HIGH,0.07878000289201736,false,,false,false,true,2023-03-21T10:40:19.000Z,true,false,false,,2023-01-13T00:15:00.000Z,0 CVE-2019-19030,https://securityvulnerability.io/vulnerability/CVE-2019-19030,Unauthenticated API Vulnerability in Harbor by Cloud Native Computing Foundation,"The Harbor application, developed by the Cloud Native Computing Foundation, is vulnerable to resource enumeration due to unauthenticated API calls. This vulnerability allows attackers to discover the existence of specific resources through HTTP status codes, thereby potentially exposing sensitive information about the system's configuration. Users of Harbor versions prior to 1.10.3 and 2.x prior to 2.0.1 are urged to upgrade their installations to mitigate this risk.",Linux,Harbor,5.3,MEDIUM,0.0006200000061653554,false,,false,false,true,2024-06-12T20:46:57.000Z,true,false,false,,2022-12-26T00:00:00.000Z,0 CVE-2020-29662,https://securityvulnerability.io/vulnerability/CVE-2020-29662,,In Harbor 2.0 before 2.0.5 and 2.1.x before 2.1.2 the catalog’s registry API is exposed on an unauthenticated path.,Linux,Harbor,5.3,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2021-02-02T20:54:33.000Z,0 CVE-2020-13794,https://securityvulnerability.io/vulnerability/CVE-2020-13794,,Harbor 1.9.* 1.10.* and 2.0.* allows Exposure of Sensitive Information to an Unauthorized Actor.,Linux,Harbor,4.3,MEDIUM,0.0011599999852478504,false,,false,false,false,,,false,false,,2020-09-30T18:15:00.000Z,0 CVE-2020-13788,https://securityvulnerability.io/vulnerability/CVE-2020-13788,,Harbor prior to 2.0.1 allows SSRF with this limitation: an attacker with the ability to edit projects can scan ports of hosts accessible on the Harbor server's intranet.,Linux,Harbor,4.3,MEDIUM,0.0011599999852478504,false,,false,false,false,,,false,false,,2020-07-15T20:04:57.000Z,0 CVE-2019-19023,https://securityvulnerability.io/vulnerability/CVE-2019-19023,,Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 has a Privilege Escalation Vulnerability in the VMware Harbor Container Registry for the Pivotal Platform.,Linux,Harbor,8.8,HIGH,0.0009899999713525176,false,,false,false,false,,,false,false,,2020-03-20T02:22:41.000Z,0 CVE-2019-19029,https://securityvulnerability.io/vulnerability/CVE-2019-19029,,Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via user-groups in the VMware Harbor Container Registry for the Pivotal Platform.,Linux,Harbor,7.2,HIGH,0.0016700000269338489,false,,false,false,false,,,false,false,,2020-03-20T02:02:28.000Z,0 CVE-2019-19026,https://securityvulnerability.io/vulnerability/CVE-2019-19026,,Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via project quotas in the VMware Harbor Container Registry for the Pivotal Platform.,Linux,Harbor,4.9,MEDIUM,0.0009899999713525176,false,,false,false,false,,,false,false,,2020-03-20T02:01:55.000Z,0 CVE-2019-19025,https://securityvulnerability.io/vulnerability/CVE-2019-19025,,Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows CSRF in the VMware Harbor Container Registry for the Pivotal Platform.,Linux,Harbor,8.8,HIGH,0.001769999973475933,false,,false,false,false,,,false,false,,2020-03-20T02:01:41.000Z,0 CVE-2019-3990,https://securityvulnerability.io/vulnerability/CVE-2019-3990,,"A User Enumeration flaw exists in Harbor. The issue is present in the ""/users"" API endpoint. This endpoint is supposed to be restricted to administrators. This restriction is able to be bypassed and information can be obtained about registered users can be obtained via the ""search"" functionality.",Linux,Harbor,4.3,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2019-12-03T16:55:15.000Z,0 CVE-2019-16919,https://securityvulnerability.io/vulnerability/CVE-2019-16919,,Harbor API has a Broken Access Control vulnerability. The vulnerability allows project administrators to use the Harbor API to create a robot account with unauthorized push and/or pull access permissions to a project they don't have access or control for. The Harbor API did not enforce the proper project permissions and project scope on the API request to create a new robot account.,Linux,Harbor,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2019-10-18T11:59:57.000Z,0 CVE-2019-16097,https://securityvulnerability.io/vulnerability/CVE-2019-16097,,"core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP.",Linux,Harbor,6.5,MEDIUM,0.9631100296974182,false,,false,false,true,2019-11-14T10:19:47.000Z,true,false,false,,2019-09-08T15:22:49.000Z,0 CVE-2017-17697,https://securityvulnerability.io/vulnerability/CVE-2017-17697,,The Ping() function in ui/api/target.go in Harbor through 1.3.0-rc4 has SSRF via the endpoint parameter to /api/targets/ping.,Linux,Harbor,8.6,HIGH,0.007910000160336494,false,,false,false,false,,,false,false,,2017-12-15T09:00:00.000Z,0