Show filters
16 Total Results
Displaying 11-16 of 16
Sort by:
Attacker Value
Unknown
CVE-2022-3916
Disclosure Date: September 20, 2023 (last updated February 25, 2025)
A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.
0
Attacker Value
Unknown
CVE-2023-0264
Disclosure Date: August 04, 2023 (last updated February 25, 2025)
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2023-3089
Disclosure Date: July 05, 2023 (last updated February 25, 2025)
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
0
Attacker Value
Unknown
CVE-2023-0056
Disclosure Date: March 23, 2023 (last updated February 24, 2025)
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
0
Attacker Value
Unknown
CVE-2020-8945
Disclosure Date: February 12, 2020 (last updated February 21, 2025)
The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.
0
Attacker Value
Unknown
CVE-2019-15718
Disclosure Date: September 04, 2019 (last updated November 08, 2023)
In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivileged user can exploit this by executing D-Bus methods that should be restricted to privileged users, in order to change the system's DNS resolver settings.
0