-
Notifications
You must be signed in to change notification settings - Fork 58
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
GSD-automation
committed
Mar 4, 2024
1 parent
0291a24
commit 3ef2d80
Showing
83 changed files
with
6,936 additions
and
288 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,114 @@ | ||
{ | ||
"gsd": { | ||
"metadata": { | ||
"exploitCode": "unknown", | ||
"remediation": "unknown", | ||
"reportConfidence": "confirmed", | ||
"type": "vulnerability" | ||
}, | ||
"osvSchema": { | ||
"aliases": [ | ||
"CVE-2019-25210" | ||
], | ||
"details": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values).", | ||
"id": "GSD-2019-25210", | ||
"modified": "2024-03-04T06:05:46.530052Z", | ||
"schema_version": "1.4.0" | ||
} | ||
}, | ||
"namespaces": { | ||
"cve.org": { | ||
"CVE_data_meta": { | ||
"ASSIGNER": "cve@mitre.org", | ||
"ID": "CVE-2019-25210", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "n/a", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name": "n/a" | ||
} | ||
] | ||
} | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values)." | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "https://github.com/helm/helm/issues/7275", | ||
"refsource": "MISC", | ||
"url": "https://github.com/helm/helm/issues/7275" | ||
}, | ||
{ | ||
"name": "https://www.cncf.io/projects/helm/", | ||
"refsource": "MISC", | ||
"url": "https://www.cncf.io/projects/helm/" | ||
} | ||
] | ||
} | ||
}, | ||
"nvd.nist.gov": { | ||
"cve": { | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values)." | ||
} | ||
], | ||
"id": "CVE-2019-25210", | ||
"lastModified": "2024-03-03T21:15:49.867", | ||
"metrics": {}, | ||
"published": "2024-03-03T21:15:49.867", | ||
"references": [ | ||
{ | ||
"source": "cve@mitre.org", | ||
"url": "https://github.com/helm/helm/issues/7275" | ||
}, | ||
{ | ||
"source": "cve@mitre.org", | ||
"url": "https://www.cncf.io/projects/helm/" | ||
} | ||
], | ||
"sourceIdentifier": "cve@mitre.org", | ||
"vulnStatus": "Received" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
{ | ||
"gsd": { | ||
"metadata": { | ||
"exploitCode": "unknown", | ||
"remediation": "unknown", | ||
"reportConfidence": "confirmed", | ||
"type": "vulnerability" | ||
}, | ||
"osvSchema": { | ||
"aliases": [ | ||
"CVE-2022-48676" | ||
], | ||
"id": "GSD-2022-48676", | ||
"modified": "2024-03-04T06:00:40.174493Z", | ||
"schema_version": "1.4.0" | ||
} | ||
}, | ||
"namespaces": { | ||
"cve.org": { | ||
"CVE_data_meta": { | ||
"ASSIGNER": "cve@mitre.org", | ||
"ID": "CVE-2022-48676", | ||
"STATE": "RESERVED" | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." | ||
} | ||
] | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
{ | ||
"gsd": { | ||
"metadata": { | ||
"exploitCode": "unknown", | ||
"remediation": "unknown", | ||
"reportConfidence": "confirmed", | ||
"type": "vulnerability" | ||
}, | ||
"osvSchema": { | ||
"aliases": [ | ||
"CVE-2022-48677" | ||
], | ||
"id": "GSD-2022-48677", | ||
"modified": "2024-03-04T06:00:40.579353Z", | ||
"schema_version": "1.4.0" | ||
} | ||
}, | ||
"namespaces": { | ||
"cve.org": { | ||
"CVE_data_meta": { | ||
"ASSIGNER": "cve@mitre.org", | ||
"ID": "CVE-2022-48677", | ||
"STATE": "RESERVED" | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." | ||
} | ||
] | ||
} | ||
} | ||
} | ||
} |
Oops, something went wrong.