📦 Harbor
by Linuxfoundation
🔍 What is Harbor?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows authenticated Harbor users to modify tag retention policies in projects they shouldn't have access to. Attackers can exploit improper permission validation to alter retention...
This vulnerability in Harbor allows authenticated users to modify p2p preheat policies in projects they shouldn't have access to. Attackers can exploit improper permission validation to tamper with co...
This vulnerability in Harbor allows authenticated users to revoke robot account permissions belonging to projects they don't have access to. Attackers with valid credentials can disrupt automated work...
This vulnerability in Harbor container registry allows authenticated users to modify system configurations due to incorrect permission validation. It affects Harbor installations running versions belo...
This CVE describes an open redirect vulnerability in Harbor container registry software. Attackers can craft malicious URLs that redirect Harbor users to external malicious sites when clicked. This af...