├── .github └── ISSUE_TEMPLATE │ └── contribution-template.md ├── .gitignore ├── CONTRIBUTING.md ├── LICENSE.md ├── README.md ├── images ├── aad-seamless-sso-log-bypass.jpg ├── api-mgmt-ssrf-path-traversal.jpg ├── app-runner-observability.jpg ├── app-runner-vpc-connectors.jpg ├── appsync-confused-deputy.jpg ├── asset-key-thief.jpg ├── attachme.jpg ├── aws-2023-010.jpg ├── aws-codebuild-ecr-iam-vuln.jpg ├── aws-codestar-privilege-escalation.jpg ├── aws-console-rate-limit-bypass.jpg ├── aws-control-tower-lack-of-cloudtrail-logging.jpg ├── aws-directory-service-passrole.jpg ├── aws-iamadmin-cloudtrail-bypass.jpg ├── aws-java-sdk-xxe.jpg ├── aws-service-catalog-cloudtrail-bypass.jpg ├── aws-wafs-dangerous-defaults.jpg ├── azure-b2c-crypto-flaw.jpg ├── azure-cloudshell-injection.jpg ├── azure-devops-dangling-domain.jpg ├── azure-front-door-desync.jpg ├── azure-func-escape.jpg ├── azure-functions-eop.jpg ├── azure-mgmt-api-rce.jpg ├── azure-pipeline-rce.jpg ├── azure-site-dll-hijacking.jpg ├── azure_logic_app_privilege_escalation.jpg ├── azure_multiple_ssrf.jpg ├── badbuild.jpg ├── bastion-container-reg-xss.jpg ├── bluebleed.jpg ├── brokensesame.jpg ├── bypassing_policies_and_overly_privileged.jpg ├── cloudformation-dos.jpg ├── cloudformation-service-account-execution.jpg ├── cloudformation_cred_leak.jpg ├── cloudsql-escape.jpg ├── cloudsql-privesc.jpg ├── cosmiss.jpg ├── cve-2022-35829.jpg ├── cve-2022-37968.jpg ├── cve-2023-21777.jpg ├── cve-2023-23383.jpg ├── data_gateway_rce.jpg ├── dataflow-rce-jmx.jpg ├── dependency_confusion_in_AWS_CodeArtifact.jpg ├── dhcp-abuse-code-exec.jpg ├── emojideploy.jpg ├── encryption_software_development_kit.jpg ├── exfiltrating_data_via_policy_logs.jpg ├── fabricscape.jpg ├── gce_ssh_key_injection.jpg ├── gcp-cloudshell-command-injection.jpg ├── gcp-cloudshell-xss-csrf.jpg ├── ghosttoken.jpg ├── going_through_permissions.jpg ├── graph-ninja.jpg ├── guard_duty_detection_bypass.jpg ├── hellskeychain.jpg ├── iam-multiple-mfa.jpg ├── identity_aware_proxy.jpg ├── lake_admin_override.jpg ├── load_balancer_request_smuggling.jpg ├── network-bypass-cognitive-search.jpg ├── noauth.jpg ├── organization_bypass.jpg ├── owner_launched_machine.jpg ├── policy_changed_in_unexpected_and_insecure_ways.jpg ├── power-platform-info-leak.jpg ├── public-ecr-undocumented-api.jpg ├── recovering_deleted_files.jpg ├── script_elastic_compute_console.jpg ├── synapse_spark_lpe.jpg ├── unauditible_hosted_zones.jpg └── vm_extensions_creds_leak.jpg ├── pages ├── about.md ├── announcements.md ├── contribute.md ├── sample.yaml └── terms.md ├── vulnerabilities ├── aad-seamless-sso-log-bypass.yaml ├── acsessed.yaml ├── actions-core-delimiter-injection.yaml ├── admin-azure-rh-update-infrastructure.yaml ├── ai-hub-jupyter-csrf.yaml ├── alb-http-smuggling.yaml ├── amazon-workspaces-appstream-vulnerability.yaml ├── ami-recoverable-files.yaml ├── apatchme.yaml ├── api-mgmt-ssrf-path-traversal.yaml ├── apiary-ssrf.yaml ├── app-runner-observability.yaml ├── app-runner-vpc-connectors.yaml ├── asset-key-thief.yaml ├── assumerole-confused-deputy.yaml ├── attachme.yaml ├── autowarp.yaml ├── aws-2023-010.yaml ├── aws-amazon-q-data-exfil.yaml ├── aws-amplify-iam-role-publicly-assumable-exposure.yaml ├── aws-api-gateway-header-smuggling.yaml ├── aws-api-gw-smuggling.yaml ├── aws-appflow-undocumented-api.yaml ├── aws-appflow-woocommerce-connector-ssrf.yaml ├── aws-appstream-cloudtrail-bypass.yaml ├── aws-appsync-confused-deputy.yaml ├── aws-auth-multiple-issues.yaml ├── aws-cdk-cli-credential-plugin-issue.yaml ├── aws-cdk-squatting.yaml ├── aws-client-vpn-buffer-overflow.yaml ├── aws-cloudshell-terminal-escape.yaml ├── aws-codebuild-access-token-leak.yaml ├── aws-codebuild-ecr-iam-vuln.yaml ├── aws-codestar-privilege-escalation.yaml ├── aws-cognito-reset-vulnerability.yaml ├── aws-console-rate-limit-bypass.yaml ├── aws-control-tower-lack-of-cloudtrail-logging.yaml ├── aws-data-post.yaml ├── aws-default-roles-service-takeover.yaml ├── aws-deployment-framework-issue.yaml ├── aws-direct-connect-route-injection.yaml ├── aws-directory-service-passrole.yaml ├── aws-ec2-autoscaling-privilege-escalation-vulnerability.yaml ├── aws-ecs-agent-information-disclosure-vulnerability.yaml ├── aws-elasticsearch-index-name-leakage.yaml ├── aws-fall-2020-soc2.yaml ├── aws-fall-2021-soc2.yaml ├── aws-glue-database-password-leakage.yaml ├── aws-iam-identity-center-expiry.yaml ├── aws-iam-login-username-enumeration.yaml ├── aws-iam-trust-policy-condition-evaluation-bug.yaml ├── aws-iamadmin-cloudtrail-bypass.yaml ├── aws-imds-credential-exfiltration.yaml ├── aws-java-sdk-xxe.yaml ├── aws-neuron-sdk-dependency-confusion.yaml ├── aws-non-production-endpoints-attack.yaml ├── aws-package-backfill.yaml ├── aws-rds-local-file-read.yaml ├── aws-rds-no-ssl-tls.yaml ├── aws-route-table-modify.yaml ├── aws-s3-recon-account-id-of-bucket.yaml ├── aws-security-tool-risk.yaml ├── aws-serverless-image-handler-weakness.yaml ├── aws-service-catalog-cloudtrail-bypass.yaml ├── aws-sigv1-insecure.yaml ├── aws-ssm-agent-path-traversal.yaml ├── aws-team-cve-2025-1969.yaml ├── aws-transit-gateway-peering-flaw.yaml ├── aws-xss-console.yaml ├── azure-ad-saml-persistence-flaw.yaml ├── azure-ai-playground-data-exfil.yaml ├── azure-airflow-vulnerabilities.yaml ├── azure-api-connections-secrets.yaml ├── azure-api-management-dev-portal-rce.yaml ├── azure-apim-reader-contributor-escalation.yaml ├── azure-automation-crypto-mining.yaml ├── azure-aznfs-mount-privilege-escalation.yaml ├── azure-b2c-crypto-flaw.yaml ├── azure-cli-credential-leak.yaml ├── azure-cloud-shell-and-container-instance-lpe.yaml ├── azure-cloudshell-injection.yaml ├── azure-cloudshell-terminal-escape.yaml ├── azure-devops-dangling-domain.yaml ├── azure-devops-zero-click.yaml ├── azure-firewall-bypass.yaml ├── azure-front-door-desync.yaml ├── azure-func-escape.yaml ├── azure-function-credential-extraction.yaml ├── azure-functions-eop.yaml ├── azure-hdinsight-dos.yaml ├── azure-health-pe-ssrf.yaml ├── azure-info-disclosure.yaml ├── azure-internal-acr-secret.yaml ├── azure-logic-app-contributor-escalation-to-root-owner.yaml ├── azure-logic-apps-secrets-control-plane-exfiltration.yaml ├── azure-mgmt-api-rce.yaml ├── azure-ml-notebook-hijacking.yaml ├── azure-ml-ssrf-pt.yaml ├── azure-multiple-ssrf.yaml ├── azure-openai-control-bypass.yaml ├── azure-pipeline-rce.yaml ├── azure-site-recovery-pe.yaml ├── azure-subdomain-takeover.yaml ├── azure-tenant-takeover-microsoft-application.yaml ├── azure-vault-recon-keyvault-secret-metadata-control-plane-exfiltration.yaml ├── azurescape.yaml ├── badbuild.yaml ├── bastion-container-reg-xss.yaml ├── bazel_supply_chain.yaml ├── bedrock-access-control-flaw.yaml ├── bedrock-api-logging-issue.yaml ├── bedrock-models-iam-flaw.yaml ├── bluebleed.yaml ├── breakingformation.yaml ├── brokensesame.yaml ├── bucket-monopoly-aws-attack.yaml ├── burning-data-azure-sql-firewall.yaml ├── cap-net-raw-metadata-mitm.yaml ├── chaosdb.yaml ├── cli-tools-leak-credentials-github-actions-logs.yaml ├── client-side-ssrf-google-cloud-project-takeover.yaml ├── cloud-architecture-tool-vulnerabilities.yaml ├── cloud-func-gke-bypass.yaml ├── cloud-sql-shell-drop.yaml ├── cloud-sql-vulns-google-rds.yaml ├── cloudformation-dos.yaml ├── cloudformation_cred_leak.yaml ├── cloudformer-review.yaml ├── cloudimposer-gcp.yaml ├── cloudshell-aws-access-vulnerability.yaml ├── cloudsql-escape.yaml ├── cloudsql-privesc.yaml ├── cloudtrail-data-exfiltration.yaml ├── cloudwatch-dashboard-sharing-exposes-tags.yaml ├── codebuild-data-exfil.yaml ├── codeql-supply-chain-attack-exposed-secret.yaml ├── cognito-rate-limit-bypass.yaml ├── cognito-user-group-spoofing.yaml ├── copilot-studio-infoleak-ssrf.yaml ├── cosmiss.yaml ├── critical-gitlab-account-takeover-vulnerability.yaml ├── cve-2018-15869.yaml ├── cve-2019-1372.yaml ├── cve-2021-27075.yaml ├── cve-2021-38112.yaml ├── cve-2021-42306.yaml ├── cve-2022-2385.yaml ├── cve-2022-25165.yaml ├── cve-2022-29149.yaml ├── cve-2022-29527.yaml ├── cve-2022-30137.yaml ├── cve-2022-33675.yaml ├── cve-2022-35829.yaml ├── cve-2022-37968.yaml ├── cve-2022-39327.yaml ├── cve-2023-21777.yaml ├── cve-2023-23383.yaml ├── data-all-framework-cves.yaml ├── data-fusion-github-actions-vulns.yaml ├── data_gateway_rce.yaml ├── dataflow-rce-jmx.yaml ├── dataform-path-traversal.yaml ├── datazone-confused-deputy-vulnerability.yaml ├── dependency-confusion-in-aws-codeartifact.yaml ├── dhcp-abuse-code-exec.yaml ├── dialogflow-privilege-escalation.yaml ├── docker-command-escaping-github-actions-runner.yaml ├── ec2-console-xss.yaml ├── ec2-vm-import-export-issue.yaml ├── eks-logged-serviceaccount-tokens-plaintext.yaml ├── elb-cache-http-smuggling.yaml ├── eltima-cloud-desktop-lpe.yaml ├── emojideploy.yaml ├── encryption-sdk-issues.yaml ├── entra-id-immutable-users-bug.yaml ├── entra-id-privilege-elevation.yaml ├── entra-id-upn-update-flaw.yaml ├── extrareplica.yaml ├── flowfixation.yaml ├── freertos-coresntp-advisories.yaml ├── gce_ssh_key_injection.yaml ├── gcp-2021-019.yaml ├── gcp-2021-022.yaml ├── gcp-2022-011.yaml ├── gcp-2023-007.yaml ├── gcp-8kb-bypass.yaml ├── gcp-chronicle-cross-customer-bucket-access.yaml ├── gcp-cloud-functions-privilege-escalation-vulnerability.yaml ├── gcp-cloud-workstations-persistence-flaw.yaml ├── gcp-cloudshell-command-injection.yaml ├── gcp-cloudshell-cswsh.yaml ├── gcp-cloudshell-open-in-command-injection.yaml ├── gcp-cloudshell-xss-csrf.yaml ├── gcp-cloudworkstations-auth-bypass.yaml ├── gcp-cloushell-bugs.yaml ├── gcp-confused-composer-vulnerability.yaml ├── gcp-default-compute-account.yaml ├── gcp-document-ai-data-exfil.yaml ├── gcp-gke-sys-all.yaml ├── gcp-hmac-keys-insufficient-logging.yaml ├── gcp-hmac-keys-unauditable.yaml ├── gcp-iam-pe-multiple-services.yaml ├── gcp-iap-bypass.yaml ├── gcp-org-policies-bypass.yaml ├── gcp-org-policy-exfiltrate-data.yaml ├── gcp-organization-rename-impersonation.yaml ├── gcp-os-login-pe.yaml ├── gcp-service-accounts-leak.yaml ├── gcp-speech-to-text-info-disclosure.yaml ├── gcp-stackdriver-ssrf.yaml ├── gcp-vertex-ai-data-exfil.yaml ├── gcp-vertex-theia-xss.yaml ├── gcp-vertexai-vulnerabilities.yaml ├── gcs-bucket-traversal.yaml ├── ghosttoken.yaml ├── github-copilot-chat-data-exfiltration.yaml ├── github-runner-images-supply-chain.yaml ├── gitlab-duo-prompt-injection-leak.yaml ├── gke-autopilot-allowlist.yaml ├── gke-gvisor-sandbox-escape.yaml ├── global-admin-entra-id-actor-tokens.yaml ├── google-app-engine-rce.yaml ├── google-bard-prompt-injection.yaml ├── google-cloud-api-gateway-bypass.yaml ├── google-cloud-iap-cors-misconfiguration-email-disclosure.yaml ├── google-cloud-platform-vrp-prize.yaml ├── google-cloud-shell-bugs.yaml ├── google-cloud-shell-xss-rce.yaml ├── google-domain-check-bypass.yaml ├── google-oauth-vulnerability-indefinite-access.yaml ├── google-workspace-domain-wide-delegation-risk.yaml ├── graph-ninja.yaml ├── guardduty-cloudtrail-bypass.yaml ├── guardduty-s3-bypass.yaml ├── hellskeychain.yaml ├── iam-managed-policies-lack-controls.yaml ├── iam-multiple-mfa.yaml ├── iam-policies-bypass-overprivileged.yaml ├── iap-bypass-google-cloud.yaml ├── imagerunner.yaml ├── imposter-commits-vulnerability-github-actions.yaml ├── lake_admin_override.yaml ├── lambda-cloudwatch-timing-attack.yaml ├── lethal-injection.yaml ├── lightsail-keys-logged.yaml ├── log-analytics-role-privesc.yaml ├── log4shell-hotpatch.yaml ├── mdc-aws-findings-disclosure.yaml ├── microsoft-healthcare-chatbot-vulnerabilities.yaml ├── missing-jwt-issuer.yaml ├── mwaa-leaky-logs.yaml ├── noauth.yaml ├── notlegit.yaml ├── omigod.yaml ├── overprivileged-aws-support-iam.yaml ├── pipelines-agent-ppe.yaml ├── power-platform-info-leak.yaml ├── power-platform-privilege-escalation.yaml ├── privilege-identification-cloudtrail.yaml ├── public-ecr-undocumented-api.yaml ├── rce-in-cloud-dm.yaml ├── remote-code-execution-via-github-import.yaml ├── repo-swatting-attack-deletes-github-gitlab-accounts.yaml ├── resource-policy-confused-deputy.yaml ├── s3-bucket-tagging-not-restricted.yaml ├── s3-crypto-sdk.yaml ├── s3-replicator-cloudtrail.yaml ├── sagemaker-jupyter-csrf.yaml ├── sns-signingcerturl-improper-validation.yaml ├── ssrf-in-google-cloud-monitoring.yaml ├── ssrfs-azure-devops.yaml ├── subdomain-takeover-vulnerability-gitlab-pages.yaml ├── superglue.yaml ├── synapse-pwnalytics.yaml ├── synapse-spark-lpe.yaml ├── synapse-vegas-lpe.yaml ├── synlapse.yaml ├── terms-conditions-customer-data.yaml ├── unauthorized-access-codespace-secrets-github.yaml ├── vpc-endpoint-log-data-exfil.yaml ├── vpc-hosted-zones-unauditable.yaml └── wireserving-credentials-azure-kubernetes.yaml └── webscheme.png /.github/ISSUE_TEMPLATE/contribution-template.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/.github/ISSUE_TEMPLATE/contribution-template.md -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | .DS_Store -------------------------------------------------------------------------------- /CONTRIBUTING.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/CONTRIBUTING.md -------------------------------------------------------------------------------- /LICENSE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/LICENSE.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/README.md -------------------------------------------------------------------------------- /images/aad-seamless-sso-log-bypass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aad-seamless-sso-log-bypass.jpg -------------------------------------------------------------------------------- /images/api-mgmt-ssrf-path-traversal.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/api-mgmt-ssrf-path-traversal.jpg -------------------------------------------------------------------------------- /images/app-runner-observability.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/app-runner-observability.jpg -------------------------------------------------------------------------------- /images/app-runner-vpc-connectors.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/app-runner-vpc-connectors.jpg -------------------------------------------------------------------------------- /images/appsync-confused-deputy.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/appsync-confused-deputy.jpg -------------------------------------------------------------------------------- /images/asset-key-thief.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/asset-key-thief.jpg -------------------------------------------------------------------------------- /images/attachme.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/attachme.jpg -------------------------------------------------------------------------------- /images/aws-2023-010.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-2023-010.jpg -------------------------------------------------------------------------------- /images/aws-codebuild-ecr-iam-vuln.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-codebuild-ecr-iam-vuln.jpg -------------------------------------------------------------------------------- /images/aws-codestar-privilege-escalation.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-codestar-privilege-escalation.jpg -------------------------------------------------------------------------------- /images/aws-console-rate-limit-bypass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-console-rate-limit-bypass.jpg -------------------------------------------------------------------------------- /images/aws-control-tower-lack-of-cloudtrail-logging.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-control-tower-lack-of-cloudtrail-logging.jpg -------------------------------------------------------------------------------- /images/aws-directory-service-passrole.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-directory-service-passrole.jpg -------------------------------------------------------------------------------- /images/aws-iamadmin-cloudtrail-bypass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-iamadmin-cloudtrail-bypass.jpg -------------------------------------------------------------------------------- /images/aws-java-sdk-xxe.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-java-sdk-xxe.jpg -------------------------------------------------------------------------------- /images/aws-service-catalog-cloudtrail-bypass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-service-catalog-cloudtrail-bypass.jpg -------------------------------------------------------------------------------- /images/aws-wafs-dangerous-defaults.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/aws-wafs-dangerous-defaults.jpg -------------------------------------------------------------------------------- /images/azure-b2c-crypto-flaw.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure-b2c-crypto-flaw.jpg -------------------------------------------------------------------------------- /images/azure-cloudshell-injection.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure-cloudshell-injection.jpg -------------------------------------------------------------------------------- /images/azure-devops-dangling-domain.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure-devops-dangling-domain.jpg -------------------------------------------------------------------------------- /images/azure-front-door-desync.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure-front-door-desync.jpg -------------------------------------------------------------------------------- /images/azure-func-escape.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure-func-escape.jpg -------------------------------------------------------------------------------- /images/azure-functions-eop.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure-functions-eop.jpg -------------------------------------------------------------------------------- /images/azure-mgmt-api-rce.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure-mgmt-api-rce.jpg -------------------------------------------------------------------------------- /images/azure-pipeline-rce.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure-pipeline-rce.jpg -------------------------------------------------------------------------------- /images/azure-site-dll-hijacking.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure-site-dll-hijacking.jpg -------------------------------------------------------------------------------- /images/azure_logic_app_privilege_escalation.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure_logic_app_privilege_escalation.jpg -------------------------------------------------------------------------------- /images/azure_multiple_ssrf.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/azure_multiple_ssrf.jpg -------------------------------------------------------------------------------- /images/badbuild.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/badbuild.jpg -------------------------------------------------------------------------------- /images/bastion-container-reg-xss.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/bastion-container-reg-xss.jpg -------------------------------------------------------------------------------- /images/bluebleed.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/bluebleed.jpg -------------------------------------------------------------------------------- /images/brokensesame.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/brokensesame.jpg -------------------------------------------------------------------------------- /images/bypassing_policies_and_overly_privileged.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/bypassing_policies_and_overly_privileged.jpg -------------------------------------------------------------------------------- /images/cloudformation-dos.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cloudformation-dos.jpg -------------------------------------------------------------------------------- /images/cloudformation-service-account-execution.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cloudformation-service-account-execution.jpg -------------------------------------------------------------------------------- /images/cloudformation_cred_leak.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cloudformation_cred_leak.jpg -------------------------------------------------------------------------------- /images/cloudsql-escape.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cloudsql-escape.jpg -------------------------------------------------------------------------------- /images/cloudsql-privesc.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cloudsql-privesc.jpg -------------------------------------------------------------------------------- /images/cosmiss.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cosmiss.jpg -------------------------------------------------------------------------------- /images/cve-2022-35829.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cve-2022-35829.jpg -------------------------------------------------------------------------------- /images/cve-2022-37968.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cve-2022-37968.jpg -------------------------------------------------------------------------------- /images/cve-2023-21777.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cve-2023-21777.jpg -------------------------------------------------------------------------------- /images/cve-2023-23383.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/cve-2023-23383.jpg -------------------------------------------------------------------------------- /images/data_gateway_rce.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/data_gateway_rce.jpg -------------------------------------------------------------------------------- /images/dataflow-rce-jmx.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/dataflow-rce-jmx.jpg -------------------------------------------------------------------------------- /images/dependency_confusion_in_AWS_CodeArtifact.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/dependency_confusion_in_AWS_CodeArtifact.jpg -------------------------------------------------------------------------------- /images/dhcp-abuse-code-exec.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/dhcp-abuse-code-exec.jpg -------------------------------------------------------------------------------- /images/emojideploy.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/emojideploy.jpg -------------------------------------------------------------------------------- /images/encryption_software_development_kit.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/encryption_software_development_kit.jpg -------------------------------------------------------------------------------- /images/exfiltrating_data_via_policy_logs.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/exfiltrating_data_via_policy_logs.jpg -------------------------------------------------------------------------------- /images/fabricscape.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/fabricscape.jpg -------------------------------------------------------------------------------- /images/gce_ssh_key_injection.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/gce_ssh_key_injection.jpg -------------------------------------------------------------------------------- /images/gcp-cloudshell-command-injection.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/gcp-cloudshell-command-injection.jpg -------------------------------------------------------------------------------- /images/gcp-cloudshell-xss-csrf.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/gcp-cloudshell-xss-csrf.jpg -------------------------------------------------------------------------------- /images/ghosttoken.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/ghosttoken.jpg -------------------------------------------------------------------------------- /images/going_through_permissions.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/going_through_permissions.jpg -------------------------------------------------------------------------------- /images/graph-ninja.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/graph-ninja.jpg -------------------------------------------------------------------------------- /images/guard_duty_detection_bypass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/guard_duty_detection_bypass.jpg -------------------------------------------------------------------------------- /images/hellskeychain.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/hellskeychain.jpg -------------------------------------------------------------------------------- /images/iam-multiple-mfa.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/iam-multiple-mfa.jpg -------------------------------------------------------------------------------- /images/identity_aware_proxy.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/identity_aware_proxy.jpg -------------------------------------------------------------------------------- /images/lake_admin_override.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/lake_admin_override.jpg -------------------------------------------------------------------------------- /images/load_balancer_request_smuggling.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/load_balancer_request_smuggling.jpg -------------------------------------------------------------------------------- /images/network-bypass-cognitive-search.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/network-bypass-cognitive-search.jpg -------------------------------------------------------------------------------- /images/noauth.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/noauth.jpg -------------------------------------------------------------------------------- /images/organization_bypass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/organization_bypass.jpg -------------------------------------------------------------------------------- /images/owner_launched_machine.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/owner_launched_machine.jpg -------------------------------------------------------------------------------- /images/policy_changed_in_unexpected_and_insecure_ways.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/policy_changed_in_unexpected_and_insecure_ways.jpg -------------------------------------------------------------------------------- /images/power-platform-info-leak.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/power-platform-info-leak.jpg -------------------------------------------------------------------------------- /images/public-ecr-undocumented-api.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/public-ecr-undocumented-api.jpg -------------------------------------------------------------------------------- /images/recovering_deleted_files.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/recovering_deleted_files.jpg -------------------------------------------------------------------------------- /images/script_elastic_compute_console.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/script_elastic_compute_console.jpg -------------------------------------------------------------------------------- /images/synapse_spark_lpe.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/synapse_spark_lpe.jpg -------------------------------------------------------------------------------- /images/unauditible_hosted_zones.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/unauditible_hosted_zones.jpg -------------------------------------------------------------------------------- /images/vm_extensions_creds_leak.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/images/vm_extensions_creds_leak.jpg -------------------------------------------------------------------------------- /pages/about.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/pages/about.md -------------------------------------------------------------------------------- /pages/announcements.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/pages/announcements.md -------------------------------------------------------------------------------- /pages/contribute.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/pages/contribute.md -------------------------------------------------------------------------------- /pages/sample.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/pages/sample.yaml -------------------------------------------------------------------------------- /pages/terms.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/pages/terms.md -------------------------------------------------------------------------------- /vulnerabilities/aad-seamless-sso-log-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aad-seamless-sso-log-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/acsessed.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/acsessed.yaml -------------------------------------------------------------------------------- /vulnerabilities/actions-core-delimiter-injection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/actions-core-delimiter-injection.yaml -------------------------------------------------------------------------------- /vulnerabilities/admin-azure-rh-update-infrastructure.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/admin-azure-rh-update-infrastructure.yaml -------------------------------------------------------------------------------- /vulnerabilities/ai-hub-jupyter-csrf.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/ai-hub-jupyter-csrf.yaml -------------------------------------------------------------------------------- /vulnerabilities/alb-http-smuggling.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/alb-http-smuggling.yaml -------------------------------------------------------------------------------- /vulnerabilities/amazon-workspaces-appstream-vulnerability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/amazon-workspaces-appstream-vulnerability.yaml -------------------------------------------------------------------------------- /vulnerabilities/ami-recoverable-files.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/ami-recoverable-files.yaml -------------------------------------------------------------------------------- /vulnerabilities/apatchme.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/apatchme.yaml -------------------------------------------------------------------------------- /vulnerabilities/api-mgmt-ssrf-path-traversal.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/api-mgmt-ssrf-path-traversal.yaml -------------------------------------------------------------------------------- /vulnerabilities/apiary-ssrf.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/apiary-ssrf.yaml -------------------------------------------------------------------------------- /vulnerabilities/app-runner-observability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/app-runner-observability.yaml -------------------------------------------------------------------------------- /vulnerabilities/app-runner-vpc-connectors.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/app-runner-vpc-connectors.yaml -------------------------------------------------------------------------------- /vulnerabilities/asset-key-thief.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/asset-key-thief.yaml -------------------------------------------------------------------------------- /vulnerabilities/assumerole-confused-deputy.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/assumerole-confused-deputy.yaml -------------------------------------------------------------------------------- /vulnerabilities/attachme.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/attachme.yaml -------------------------------------------------------------------------------- /vulnerabilities/autowarp.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/autowarp.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-2023-010.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-2023-010.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-amazon-q-data-exfil.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-amazon-q-data-exfil.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-amplify-iam-role-publicly-assumable-exposure.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-amplify-iam-role-publicly-assumable-exposure.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-api-gateway-header-smuggling.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-api-gateway-header-smuggling.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-api-gw-smuggling.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-api-gw-smuggling.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-appflow-undocumented-api.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-appflow-undocumented-api.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-appflow-woocommerce-connector-ssrf.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-appflow-woocommerce-connector-ssrf.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-appstream-cloudtrail-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-appstream-cloudtrail-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-appsync-confused-deputy.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-appsync-confused-deputy.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-auth-multiple-issues.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-auth-multiple-issues.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-cdk-cli-credential-plugin-issue.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-cdk-cli-credential-plugin-issue.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-cdk-squatting.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-cdk-squatting.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-client-vpn-buffer-overflow.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-client-vpn-buffer-overflow.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-cloudshell-terminal-escape.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-cloudshell-terminal-escape.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-codebuild-access-token-leak.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-codebuild-access-token-leak.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-codebuild-ecr-iam-vuln.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-codebuild-ecr-iam-vuln.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-codestar-privilege-escalation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-codestar-privilege-escalation.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-cognito-reset-vulnerability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-cognito-reset-vulnerability.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-console-rate-limit-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-console-rate-limit-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-control-tower-lack-of-cloudtrail-logging.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-control-tower-lack-of-cloudtrail-logging.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-data-post.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-data-post.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-default-roles-service-takeover.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-default-roles-service-takeover.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-deployment-framework-issue.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-deployment-framework-issue.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-direct-connect-route-injection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-direct-connect-route-injection.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-directory-service-passrole.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-directory-service-passrole.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-ec2-autoscaling-privilege-escalation-vulnerability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-ec2-autoscaling-privilege-escalation-vulnerability.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-ecs-agent-information-disclosure-vulnerability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-ecs-agent-information-disclosure-vulnerability.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-elasticsearch-index-name-leakage.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-elasticsearch-index-name-leakage.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-fall-2020-soc2.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-fall-2020-soc2.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-fall-2021-soc2.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-fall-2021-soc2.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-glue-database-password-leakage.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-glue-database-password-leakage.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-iam-identity-center-expiry.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-iam-identity-center-expiry.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-iam-login-username-enumeration.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-iam-login-username-enumeration.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-iam-trust-policy-condition-evaluation-bug.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-iam-trust-policy-condition-evaluation-bug.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-iamadmin-cloudtrail-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-iamadmin-cloudtrail-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-imds-credential-exfiltration.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-imds-credential-exfiltration.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-java-sdk-xxe.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-java-sdk-xxe.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-neuron-sdk-dependency-confusion.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-neuron-sdk-dependency-confusion.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-non-production-endpoints-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-non-production-endpoints-attack.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-package-backfill.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-package-backfill.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-rds-local-file-read.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-rds-local-file-read.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-rds-no-ssl-tls.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-rds-no-ssl-tls.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-route-table-modify.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-route-table-modify.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-s3-recon-account-id-of-bucket.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-s3-recon-account-id-of-bucket.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-security-tool-risk.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-security-tool-risk.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-serverless-image-handler-weakness.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-serverless-image-handler-weakness.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-service-catalog-cloudtrail-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-service-catalog-cloudtrail-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-sigv1-insecure.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-sigv1-insecure.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-ssm-agent-path-traversal.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-ssm-agent-path-traversal.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-team-cve-2025-1969.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-team-cve-2025-1969.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-transit-gateway-peering-flaw.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-transit-gateway-peering-flaw.yaml -------------------------------------------------------------------------------- /vulnerabilities/aws-xss-console.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/aws-xss-console.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-ad-saml-persistence-flaw.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-ad-saml-persistence-flaw.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-ai-playground-data-exfil.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-ai-playground-data-exfil.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-airflow-vulnerabilities.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-airflow-vulnerabilities.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-api-connections-secrets.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-api-connections-secrets.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-api-management-dev-portal-rce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-api-management-dev-portal-rce.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-apim-reader-contributor-escalation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-apim-reader-contributor-escalation.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-automation-crypto-mining.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-automation-crypto-mining.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-aznfs-mount-privilege-escalation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-aznfs-mount-privilege-escalation.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-b2c-crypto-flaw.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-b2c-crypto-flaw.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-cli-credential-leak.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-cli-credential-leak.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-cloud-shell-and-container-instance-lpe.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-cloud-shell-and-container-instance-lpe.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-cloudshell-injection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-cloudshell-injection.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-cloudshell-terminal-escape.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-cloudshell-terminal-escape.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-devops-dangling-domain.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-devops-dangling-domain.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-devops-zero-click.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-devops-zero-click.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-firewall-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-firewall-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-front-door-desync.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-front-door-desync.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-func-escape.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-func-escape.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-function-credential-extraction.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-function-credential-extraction.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-functions-eop.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-functions-eop.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-hdinsight-dos.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-hdinsight-dos.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-health-pe-ssrf.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-health-pe-ssrf.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-info-disclosure.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-info-disclosure.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-internal-acr-secret.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-internal-acr-secret.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-logic-app-contributor-escalation-to-root-owner.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-logic-app-contributor-escalation-to-root-owner.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-logic-apps-secrets-control-plane-exfiltration.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-logic-apps-secrets-control-plane-exfiltration.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-mgmt-api-rce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-mgmt-api-rce.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-ml-notebook-hijacking.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-ml-notebook-hijacking.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-ml-ssrf-pt.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-ml-ssrf-pt.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-multiple-ssrf.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-multiple-ssrf.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-openai-control-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-openai-control-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-pipeline-rce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-pipeline-rce.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-site-recovery-pe.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-site-recovery-pe.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-subdomain-takeover.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-subdomain-takeover.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-tenant-takeover-microsoft-application.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-tenant-takeover-microsoft-application.yaml -------------------------------------------------------------------------------- /vulnerabilities/azure-vault-recon-keyvault-secret-metadata-control-plane-exfiltration.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azure-vault-recon-keyvault-secret-metadata-control-plane-exfiltration.yaml -------------------------------------------------------------------------------- /vulnerabilities/azurescape.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/azurescape.yaml -------------------------------------------------------------------------------- /vulnerabilities/badbuild.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/badbuild.yaml -------------------------------------------------------------------------------- /vulnerabilities/bastion-container-reg-xss.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/bastion-container-reg-xss.yaml -------------------------------------------------------------------------------- /vulnerabilities/bazel_supply_chain.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/bazel_supply_chain.yaml -------------------------------------------------------------------------------- /vulnerabilities/bedrock-access-control-flaw.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/bedrock-access-control-flaw.yaml -------------------------------------------------------------------------------- /vulnerabilities/bedrock-api-logging-issue.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/bedrock-api-logging-issue.yaml -------------------------------------------------------------------------------- /vulnerabilities/bedrock-models-iam-flaw.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/bedrock-models-iam-flaw.yaml -------------------------------------------------------------------------------- /vulnerabilities/bluebleed.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/bluebleed.yaml -------------------------------------------------------------------------------- /vulnerabilities/breakingformation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/breakingformation.yaml -------------------------------------------------------------------------------- /vulnerabilities/brokensesame.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/brokensesame.yaml -------------------------------------------------------------------------------- /vulnerabilities/bucket-monopoly-aws-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/bucket-monopoly-aws-attack.yaml -------------------------------------------------------------------------------- /vulnerabilities/burning-data-azure-sql-firewall.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/burning-data-azure-sql-firewall.yaml -------------------------------------------------------------------------------- /vulnerabilities/cap-net-raw-metadata-mitm.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cap-net-raw-metadata-mitm.yaml -------------------------------------------------------------------------------- /vulnerabilities/chaosdb.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/chaosdb.yaml -------------------------------------------------------------------------------- /vulnerabilities/cli-tools-leak-credentials-github-actions-logs.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cli-tools-leak-credentials-github-actions-logs.yaml -------------------------------------------------------------------------------- /vulnerabilities/client-side-ssrf-google-cloud-project-takeover.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/client-side-ssrf-google-cloud-project-takeover.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloud-architecture-tool-vulnerabilities.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloud-architecture-tool-vulnerabilities.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloud-func-gke-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloud-func-gke-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloud-sql-shell-drop.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloud-sql-shell-drop.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloud-sql-vulns-google-rds.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloud-sql-vulns-google-rds.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloudformation-dos.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloudformation-dos.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloudformation_cred_leak.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloudformation_cred_leak.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloudformer-review.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloudformer-review.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloudimposer-gcp.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloudimposer-gcp.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloudshell-aws-access-vulnerability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloudshell-aws-access-vulnerability.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloudsql-escape.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloudsql-escape.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloudsql-privesc.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloudsql-privesc.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloudtrail-data-exfiltration.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloudtrail-data-exfiltration.yaml -------------------------------------------------------------------------------- /vulnerabilities/cloudwatch-dashboard-sharing-exposes-tags.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cloudwatch-dashboard-sharing-exposes-tags.yaml -------------------------------------------------------------------------------- /vulnerabilities/codebuild-data-exfil.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/codebuild-data-exfil.yaml -------------------------------------------------------------------------------- /vulnerabilities/codeql-supply-chain-attack-exposed-secret.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/codeql-supply-chain-attack-exposed-secret.yaml -------------------------------------------------------------------------------- /vulnerabilities/cognito-rate-limit-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cognito-rate-limit-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/cognito-user-group-spoofing.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cognito-user-group-spoofing.yaml -------------------------------------------------------------------------------- /vulnerabilities/copilot-studio-infoleak-ssrf.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/copilot-studio-infoleak-ssrf.yaml -------------------------------------------------------------------------------- /vulnerabilities/cosmiss.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cosmiss.yaml -------------------------------------------------------------------------------- /vulnerabilities/critical-gitlab-account-takeover-vulnerability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/critical-gitlab-account-takeover-vulnerability.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2018-15869.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2018-15869.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2019-1372.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2019-1372.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2021-27075.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2021-27075.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2021-38112.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2021-38112.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2021-42306.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2021-42306.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2022-2385.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2022-2385.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2022-25165.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2022-25165.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2022-29149.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2022-29149.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2022-29527.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2022-29527.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2022-30137.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2022-30137.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2022-33675.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2022-33675.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2022-35829.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2022-35829.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2022-37968.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2022-37968.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2022-39327.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2022-39327.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2023-21777.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2023-21777.yaml -------------------------------------------------------------------------------- /vulnerabilities/cve-2023-23383.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/cve-2023-23383.yaml -------------------------------------------------------------------------------- /vulnerabilities/data-all-framework-cves.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/data-all-framework-cves.yaml -------------------------------------------------------------------------------- /vulnerabilities/data-fusion-github-actions-vulns.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/data-fusion-github-actions-vulns.yaml -------------------------------------------------------------------------------- /vulnerabilities/data_gateway_rce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/data_gateway_rce.yaml -------------------------------------------------------------------------------- /vulnerabilities/dataflow-rce-jmx.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/dataflow-rce-jmx.yaml -------------------------------------------------------------------------------- /vulnerabilities/dataform-path-traversal.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/dataform-path-traversal.yaml -------------------------------------------------------------------------------- /vulnerabilities/datazone-confused-deputy-vulnerability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/datazone-confused-deputy-vulnerability.yaml -------------------------------------------------------------------------------- /vulnerabilities/dependency-confusion-in-aws-codeartifact.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/dependency-confusion-in-aws-codeartifact.yaml -------------------------------------------------------------------------------- /vulnerabilities/dhcp-abuse-code-exec.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/dhcp-abuse-code-exec.yaml -------------------------------------------------------------------------------- /vulnerabilities/dialogflow-privilege-escalation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/dialogflow-privilege-escalation.yaml -------------------------------------------------------------------------------- /vulnerabilities/docker-command-escaping-github-actions-runner.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/docker-command-escaping-github-actions-runner.yaml -------------------------------------------------------------------------------- /vulnerabilities/ec2-console-xss.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/ec2-console-xss.yaml -------------------------------------------------------------------------------- /vulnerabilities/ec2-vm-import-export-issue.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/ec2-vm-import-export-issue.yaml -------------------------------------------------------------------------------- /vulnerabilities/eks-logged-serviceaccount-tokens-plaintext.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/eks-logged-serviceaccount-tokens-plaintext.yaml -------------------------------------------------------------------------------- /vulnerabilities/elb-cache-http-smuggling.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/elb-cache-http-smuggling.yaml -------------------------------------------------------------------------------- /vulnerabilities/eltima-cloud-desktop-lpe.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/eltima-cloud-desktop-lpe.yaml -------------------------------------------------------------------------------- /vulnerabilities/emojideploy.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/emojideploy.yaml -------------------------------------------------------------------------------- /vulnerabilities/encryption-sdk-issues.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/encryption-sdk-issues.yaml -------------------------------------------------------------------------------- /vulnerabilities/entra-id-immutable-users-bug.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/entra-id-immutable-users-bug.yaml -------------------------------------------------------------------------------- /vulnerabilities/entra-id-privilege-elevation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/entra-id-privilege-elevation.yaml -------------------------------------------------------------------------------- /vulnerabilities/entra-id-upn-update-flaw.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/entra-id-upn-update-flaw.yaml -------------------------------------------------------------------------------- /vulnerabilities/extrareplica.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/extrareplica.yaml -------------------------------------------------------------------------------- /vulnerabilities/flowfixation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/flowfixation.yaml -------------------------------------------------------------------------------- /vulnerabilities/freertos-coresntp-advisories.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/freertos-coresntp-advisories.yaml -------------------------------------------------------------------------------- /vulnerabilities/gce_ssh_key_injection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gce_ssh_key_injection.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-2021-019.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-2021-019.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-2021-022.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-2021-022.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-2022-011.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-2022-011.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-2023-007.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-2023-007.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-8kb-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-8kb-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-chronicle-cross-customer-bucket-access.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-chronicle-cross-customer-bucket-access.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-cloud-functions-privilege-escalation-vulnerability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-cloud-functions-privilege-escalation-vulnerability.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-cloud-workstations-persistence-flaw.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-cloud-workstations-persistence-flaw.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-cloudshell-command-injection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-cloudshell-command-injection.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-cloudshell-cswsh.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-cloudshell-cswsh.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-cloudshell-open-in-command-injection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-cloudshell-open-in-command-injection.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-cloudshell-xss-csrf.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-cloudshell-xss-csrf.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-cloudworkstations-auth-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-cloudworkstations-auth-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-cloushell-bugs.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-cloushell-bugs.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-confused-composer-vulnerability.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-confused-composer-vulnerability.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-default-compute-account.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-default-compute-account.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-document-ai-data-exfil.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-document-ai-data-exfil.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-gke-sys-all.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-gke-sys-all.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-hmac-keys-insufficient-logging.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-hmac-keys-insufficient-logging.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-hmac-keys-unauditable.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-hmac-keys-unauditable.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-iam-pe-multiple-services.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-iam-pe-multiple-services.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-iap-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-iap-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-org-policies-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-org-policies-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-org-policy-exfiltrate-data.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-org-policy-exfiltrate-data.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-organization-rename-impersonation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-organization-rename-impersonation.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-os-login-pe.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-os-login-pe.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-service-accounts-leak.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-service-accounts-leak.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-speech-to-text-info-disclosure.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-speech-to-text-info-disclosure.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-stackdriver-ssrf.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-stackdriver-ssrf.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-vertex-ai-data-exfil.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-vertex-ai-data-exfil.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-vertex-theia-xss.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-vertex-theia-xss.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcp-vertexai-vulnerabilities.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcp-vertexai-vulnerabilities.yaml -------------------------------------------------------------------------------- /vulnerabilities/gcs-bucket-traversal.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gcs-bucket-traversal.yaml -------------------------------------------------------------------------------- /vulnerabilities/ghosttoken.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/ghosttoken.yaml -------------------------------------------------------------------------------- /vulnerabilities/github-copilot-chat-data-exfiltration.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/github-copilot-chat-data-exfiltration.yaml -------------------------------------------------------------------------------- /vulnerabilities/github-runner-images-supply-chain.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/github-runner-images-supply-chain.yaml -------------------------------------------------------------------------------- /vulnerabilities/gitlab-duo-prompt-injection-leak.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gitlab-duo-prompt-injection-leak.yaml -------------------------------------------------------------------------------- /vulnerabilities/gke-autopilot-allowlist.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gke-autopilot-allowlist.yaml -------------------------------------------------------------------------------- /vulnerabilities/gke-gvisor-sandbox-escape.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/gke-gvisor-sandbox-escape.yaml -------------------------------------------------------------------------------- /vulnerabilities/global-admin-entra-id-actor-tokens.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/global-admin-entra-id-actor-tokens.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-app-engine-rce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-app-engine-rce.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-bard-prompt-injection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-bard-prompt-injection.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-cloud-api-gateway-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-cloud-api-gateway-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-cloud-iap-cors-misconfiguration-email-disclosure.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-cloud-iap-cors-misconfiguration-email-disclosure.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-cloud-platform-vrp-prize.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-cloud-platform-vrp-prize.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-cloud-shell-bugs.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-cloud-shell-bugs.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-cloud-shell-xss-rce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-cloud-shell-xss-rce.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-domain-check-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-domain-check-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-oauth-vulnerability-indefinite-access.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-oauth-vulnerability-indefinite-access.yaml -------------------------------------------------------------------------------- /vulnerabilities/google-workspace-domain-wide-delegation-risk.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/google-workspace-domain-wide-delegation-risk.yaml -------------------------------------------------------------------------------- /vulnerabilities/graph-ninja.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/graph-ninja.yaml -------------------------------------------------------------------------------- /vulnerabilities/guardduty-cloudtrail-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/guardduty-cloudtrail-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/guardduty-s3-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/guardduty-s3-bypass.yaml -------------------------------------------------------------------------------- /vulnerabilities/hellskeychain.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/hellskeychain.yaml -------------------------------------------------------------------------------- /vulnerabilities/iam-managed-policies-lack-controls.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/iam-managed-policies-lack-controls.yaml -------------------------------------------------------------------------------- /vulnerabilities/iam-multiple-mfa.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/iam-multiple-mfa.yaml -------------------------------------------------------------------------------- /vulnerabilities/iam-policies-bypass-overprivileged.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/iam-policies-bypass-overprivileged.yaml -------------------------------------------------------------------------------- /vulnerabilities/iap-bypass-google-cloud.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/iap-bypass-google-cloud.yaml -------------------------------------------------------------------------------- /vulnerabilities/imagerunner.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/imagerunner.yaml -------------------------------------------------------------------------------- /vulnerabilities/imposter-commits-vulnerability-github-actions.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/imposter-commits-vulnerability-github-actions.yaml -------------------------------------------------------------------------------- /vulnerabilities/lake_admin_override.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/lake_admin_override.yaml -------------------------------------------------------------------------------- /vulnerabilities/lambda-cloudwatch-timing-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/lambda-cloudwatch-timing-attack.yaml -------------------------------------------------------------------------------- /vulnerabilities/lethal-injection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/lethal-injection.yaml -------------------------------------------------------------------------------- /vulnerabilities/lightsail-keys-logged.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/lightsail-keys-logged.yaml -------------------------------------------------------------------------------- /vulnerabilities/log-analytics-role-privesc.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/log-analytics-role-privesc.yaml -------------------------------------------------------------------------------- /vulnerabilities/log4shell-hotpatch.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/log4shell-hotpatch.yaml -------------------------------------------------------------------------------- /vulnerabilities/mdc-aws-findings-disclosure.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/mdc-aws-findings-disclosure.yaml -------------------------------------------------------------------------------- /vulnerabilities/microsoft-healthcare-chatbot-vulnerabilities.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/microsoft-healthcare-chatbot-vulnerabilities.yaml -------------------------------------------------------------------------------- /vulnerabilities/missing-jwt-issuer.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/missing-jwt-issuer.yaml -------------------------------------------------------------------------------- /vulnerabilities/mwaa-leaky-logs.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/mwaa-leaky-logs.yaml -------------------------------------------------------------------------------- /vulnerabilities/noauth.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/noauth.yaml -------------------------------------------------------------------------------- /vulnerabilities/notlegit.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/notlegit.yaml -------------------------------------------------------------------------------- /vulnerabilities/omigod.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/omigod.yaml -------------------------------------------------------------------------------- /vulnerabilities/overprivileged-aws-support-iam.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/overprivileged-aws-support-iam.yaml -------------------------------------------------------------------------------- /vulnerabilities/pipelines-agent-ppe.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/pipelines-agent-ppe.yaml -------------------------------------------------------------------------------- /vulnerabilities/power-platform-info-leak.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/power-platform-info-leak.yaml -------------------------------------------------------------------------------- /vulnerabilities/power-platform-privilege-escalation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/power-platform-privilege-escalation.yaml -------------------------------------------------------------------------------- /vulnerabilities/privilege-identification-cloudtrail.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/privilege-identification-cloudtrail.yaml -------------------------------------------------------------------------------- /vulnerabilities/public-ecr-undocumented-api.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/public-ecr-undocumented-api.yaml -------------------------------------------------------------------------------- /vulnerabilities/rce-in-cloud-dm.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/rce-in-cloud-dm.yaml -------------------------------------------------------------------------------- /vulnerabilities/remote-code-execution-via-github-import.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/remote-code-execution-via-github-import.yaml -------------------------------------------------------------------------------- /vulnerabilities/repo-swatting-attack-deletes-github-gitlab-accounts.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/repo-swatting-attack-deletes-github-gitlab-accounts.yaml -------------------------------------------------------------------------------- /vulnerabilities/resource-policy-confused-deputy.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/resource-policy-confused-deputy.yaml -------------------------------------------------------------------------------- /vulnerabilities/s3-bucket-tagging-not-restricted.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/s3-bucket-tagging-not-restricted.yaml -------------------------------------------------------------------------------- /vulnerabilities/s3-crypto-sdk.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/s3-crypto-sdk.yaml -------------------------------------------------------------------------------- /vulnerabilities/s3-replicator-cloudtrail.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/s3-replicator-cloudtrail.yaml -------------------------------------------------------------------------------- /vulnerabilities/sagemaker-jupyter-csrf.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/sagemaker-jupyter-csrf.yaml -------------------------------------------------------------------------------- /vulnerabilities/sns-signingcerturl-improper-validation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/sns-signingcerturl-improper-validation.yaml -------------------------------------------------------------------------------- /vulnerabilities/ssrf-in-google-cloud-monitoring.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/ssrf-in-google-cloud-monitoring.yaml -------------------------------------------------------------------------------- /vulnerabilities/ssrfs-azure-devops.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/ssrfs-azure-devops.yaml -------------------------------------------------------------------------------- /vulnerabilities/subdomain-takeover-vulnerability-gitlab-pages.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/subdomain-takeover-vulnerability-gitlab-pages.yaml -------------------------------------------------------------------------------- /vulnerabilities/superglue.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/superglue.yaml -------------------------------------------------------------------------------- /vulnerabilities/synapse-pwnalytics.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/synapse-pwnalytics.yaml -------------------------------------------------------------------------------- /vulnerabilities/synapse-spark-lpe.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/synapse-spark-lpe.yaml -------------------------------------------------------------------------------- /vulnerabilities/synapse-vegas-lpe.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/synapse-vegas-lpe.yaml -------------------------------------------------------------------------------- /vulnerabilities/synlapse.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/synlapse.yaml -------------------------------------------------------------------------------- /vulnerabilities/terms-conditions-customer-data.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/terms-conditions-customer-data.yaml -------------------------------------------------------------------------------- /vulnerabilities/unauthorized-access-codespace-secrets-github.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/unauthorized-access-codespace-secrets-github.yaml -------------------------------------------------------------------------------- /vulnerabilities/vpc-endpoint-log-data-exfil.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/vpc-endpoint-log-data-exfil.yaml -------------------------------------------------------------------------------- /vulnerabilities/vpc-hosted-zones-unauditable.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/vpc-hosted-zones-unauditable.yaml -------------------------------------------------------------------------------- /vulnerabilities/wireserving-credentials-azure-kubernetes.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/vulnerabilities/wireserving-credentials-azure-kubernetes.yaml -------------------------------------------------------------------------------- /webscheme.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec/open-cvdb/HEAD/webscheme.png --------------------------------------------------------------------------------