Show filters
36 Total Results
Displaying 11-20 of 36
Sort by:
Attacker Value
Unknown

CVE-2021-3642

Disclosure Date: August 05, 2021 (last updated November 28, 2024)
A flaw was found in Wildfly Elytron in versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.
Attacker Value
Unknown

CVE-2020-10688

Disclosure Date: May 27, 2021 (last updated November 28, 2024)
A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
Attacker Value
Unknown

CVE-2020-27782

Disclosure Date: February 23, 2021 (last updated November 28, 2024)
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1.
Attacker Value
Unknown

CVE-2020-10734

Disclosure Date: February 11, 2021 (last updated November 28, 2024)
A vulnerability was found in keycloak in the way that the OIDC logout endpoint does not have CSRF protection. Versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes are believed to be vulnerable.
Attacker Value
Unknown

CVE-2020-1717

Disclosure Date: February 11, 2021 (last updated November 28, 2024)
A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.
Attacker Value
Unknown

CVE-2020-25689

Disclosure Date: November 02, 2020 (last updated November 28, 2024)
A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial of service. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2020-14299

Disclosure Date: October 16, 2020 (last updated November 28, 2024)
A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability.
Attacker Value
Unknown

CVE-2020-25644

Disclosure Date: October 06, 2020 (last updated February 22, 2024)
A memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. It may allow the attacker to cause OOM leading to a denial of service. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2020-10758

Disclosure Date: September 16, 2020 (last updated November 28, 2024)
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
Attacker Value
Unknown

CVE-2020-1710

Disclosure Date: September 16, 2020 (last updated November 28, 2024)
The issue appears to be that JBoss EAP 6.4.21 does not parse the field-name in accordance to RFC7230[1] as it returns a 200 instead of a 400.