|ID||CVSS||Summary||Last (major) update||Published|
aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM
|24-04-2018 - 12:08||27-03-2018 - 18:29|
When using the Azure backend with a shared access signature (SAS), Terraform versions prior to 0.12.17 may transmit the token and state snapshot using cleartext HTTP.
|02-12-2019 - 21:15||02-12-2019 - 21:15|
HashiCorp Terraform Enterprise up to v202006-1 contained a default signup page that allowed user registration even when disabled, bypassing SAML enforcement. Fixed in v202007-1.
|30-07-2020 - 15:24||30-07-2020 - 14:15|