Show filters
51 Total Results
Displaying 11-20 of 51
Sort by:
Attacker Value
Unknown
CVE-2019-9861
Disclosure Date: May 14, 2019 (last updated November 27, 2024)
Due to the use of an insecure RFID technology (MIFARE Classic), ABUS proximity chip keys (RFID tokens) of the ABUS Secvest FUAA50000 wireless alarm system can easily be cloned and used to deactivate the alarm system in an unauthorized way.
0
Attacker Value
Unknown
Java Projects using HTTP to fetch dependencies
Disclosure Date: April 25, 2019 (last updated November 27, 2024)
Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.
0
Attacker Value
Unknown
UAA redirect-uri allows wildcard in the subdomain
Disclosure Date: April 25, 2019 (last updated November 27, 2024)
Cloud Foundry UAA Release, versions prior to 71.0, allows clients to be configured with an insecure redirect uri. Given a UAA client was configured with a wildcard in the redirect uri's subdomain, a remote malicious unauthenticated user can craft a phishing link to get a UAA access code from the victim.
0
Attacker Value
Unknown
CVE-2019-9860
Disclosure Date: March 27, 2019 (last updated November 27, 2024)
Due to unencrypted signal communication and predictability of rolling codes, an attacker can "desynchronize" an ABUS Secvest wireless remote control (FUBE50014 or FUBE50015) relative to its controlled Secvest wireless alarm system FUAA50000 3.01.01, so that sent commands by the remote control are not accepted anymore.
0
Attacker Value
Unknown
CVE-2019-9863
Disclosure Date: March 27, 2019 (last updated November 27, 2024)
Due to the use of an insecure algorithm for rolling codes in the ABUS Secvest wireless alarm system FUAA50000 3.01.01 and its remote controls FUBE50014 and FUBE50015, an attacker is able to predict valid future rolling codes, and can thus remotely control the alarm system in an unauthorized way.
0
Attacker Value
Unknown
CVE-2019-9862
Disclosure Date: March 27, 2019 (last updated November 27, 2024)
An issue was discovered on ABUS Secvest wireless alarm system FUAA50000 3.01.01 in conjunction with Secvest remote control FUBE50014 or FUBE50015. Because "encrypted signal transmission" is missing, an attacker is able to eavesdrop sensitive data as cleartext (for instance, the current rolling code state).
0
Attacker Value
Unknown
UAA allows users to modify their own email address
Disclosure Date: March 07, 2019 (last updated November 27, 2024)
Cloud Foundry UAA, versions prior to v70.0, allows a user to update their own email address. A remote authenticated user can impersonate a different user by changing their email address to that of a different user.
0
Attacker Value
Unknown
UAA can issue tokens across identity providers if users with matching usernames…
Disclosure Date: December 13, 2018 (last updated November 27, 2024)
Cloud Foundry UAA, versions 60 prior to 66.0, contain an authorization logic error. In environments with multiple identity providers that contain accounts across identity providers with the same username, a remote authenticated user with access to one of these accounts may be able to obtain a token for an account of the same username in the other identity provider.
0
Attacker Value
Unknown
UAA Privilege Escalation
Disclosure Date: November 19, 2018 (last updated November 27, 2024)
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges.
0
Attacker Value
Unknown
Cloud Foundry UAA MFA does not prevent brute force of MFA code
Disclosure Date: October 05, 2018 (last updated November 27, 2024)
Cloud Foundry UAA, all versions prior to 4.20.0 and Cloud Foundry UAA Release, all versions prior to 61.0, allows brute forcing of MFA codes. A remote unauthenticated malicious user in possession of a valid username and password can brute force MFA to login as the targeted user.
0