Show filters
27 Total Results
Displaying 11-20 of 27
Sort by:
Attacker Value
Unknown

CVE-2023-23720

Disclosure Date: May 16, 2023 (last updated October 08, 2023)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NetReviews SAS Verified Reviews (Avis Vérifiés) plugin <= 2.3.13 versions.
Attacker Value
Unknown

CVE-2023-25793

Disclosure Date: April 25, 2023 (last updated October 08, 2023)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in George Pattihis Link Juice Keeper plugin <= 2.0.2 versions.
Attacker Value
Unknown

CVE-2022-43143

Disclosure Date: November 21, 2022 (last updated February 24, 2025)
A cross-site scripting (XSS) vulnerability in Beekeeper Studio v3.6.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error modal container.
Attacker Value
Unknown

CVE-2022-26174

Disclosure Date: March 21, 2022 (last updated February 23, 2025)
A remote code execution (RCE) vulnerability in Beekeeper Studio v3.2.0 allows attackers to execute arbitrary code via a crafted payload injected into the display fields.
Attacker Value
Unknown

CVE-2020-1723

Disclosure Date: January 28, 2021 (last updated February 22, 2025)
A flaw was found in Keycloak Gatekeeper (Louketo). The logout endpoint can be abused to redirect logged-in users to arbitrary web pages. Affected versions of Keycloak Gatekeeper (Louketo): 6.0.1, 7.0.0
Attacker Value
Unknown

CVE-2020-10187

Disclosure Date: May 04, 2020 (last updated February 21, 2025)
Doorkeeper version 5.0.0 and later contains an information disclosure vulnerability that allows an attacker to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their authorized applications in a JSON format (usually GET /oauth/authorized_applications.json). An application is vulnerable if the authorized applications controller is enabled.
Attacker Value
Unknown

CVE-2019-16398

Disclosure Date: September 19, 2019 (last updated November 27, 2024)
On Keeper K5 20.1.0.25 and 20.1.0.63 devices, remote code execution can occur by inserting an SD card containing a file named zskj_script_run.sh that executes a reverse shell.
Attacker Value
Unknown

CVE-2018-1000211

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.
0
Attacker Value
Unknown

CVE-2018-1000088

Disclosure Date: March 13, 2018 (last updated November 26, 2024)
Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link.. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.
0
Attacker Value
Unknown

CVE-2016-6582

Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
0