Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Portainer
(Portainer)Repositories | https://github.com/portainer/portainer |
#Vulnerabilities | 18 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-11-07 | CVE-2019-16874 | Portainer before 1.22.1 has Incorrect Access Control (issue 2 of 4). | Portainer | N/A | ||
2019-11-07 | CVE-2019-16872 | Portainer before 1.22.1 has Incorrect Access Control (issue 1 of 4). | Portainer | N/A | ||
2019-11-07 | CVE-2019-16878 | Portainer before 1.22.1 has XSS (issue 2 of 2). | Portainer | N/A | ||
2019-11-07 | CVE-2019-16876 | Portainer before 1.22.1 allows Directory Traversal. | Portainer | N/A | ||
2019-11-07 | CVE-2019-16873 | Portainer before 1.22.1 has XSS (issue 1 of 2). | Portainer | N/A | ||
2018-11-20 | CVE-2018-19367 | Portainer through 1.19.2 provides an API endpoint (/api/users/admin/check) to verify that the admin user is already created. This API endpoint will return 404 if admin was not created and 204 if it was already created. Attackers can set an admin password in the 404 case. | Portainer | 9.8 | ||
2018-09-01 | CVE-2018-16316 | A stored Cross-site scripting (XSS) vulnerability in Portainer through 1.19.1 allows remote authenticated users to inject arbitrary JavaScript and/or HTML via the Team Name field. | Portainer | 5.4 | ||
2018-06-22 | CVE-2018-12678 | Portainer before 1.18.0 supports unauthenticated requests to the websocket endpoint with an unvalidated id query parameter for the /websocket/exec endpoint, which allows remote attackers to bypass intended access restrictions or conduct SSRF attacks. | Portainer | 9.8 |