Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown

CVE-2020-19907

Disclosure Date: July 12, 2021 (last updated February 23, 2025)
A command injection vulnerability in the sandcat plugin of Caldera 2.3.1 and earlier allows authenticated attackers to execute any command or service.
Attacker Value
Unknown

CVE-2021-26715

Disclosure Date: March 25, 2021 (last updated February 22, 2025)
The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network.
Attacker Value
Unknown

CVE-2021-27582

Disclosure Date: February 23, 2021 (last updated February 22, 2025)
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
Attacker Value
Unknown

CVE-2020-14462

Disclosure Date: June 19, 2020 (last updated February 21, 2025)
CALDERA 2.7.0 allows XSS via the Operation Name box.
Attacker Value
Unknown

CVE-2020-10807

Disclosure Date: March 22, 2020 (last updated February 21, 2025)
auth_svc in Caldera before 2.6.5 allows authentication bypass (for REST API requests) via a forged "localhost" string in the HTTP Host header.
Attacker Value
Unknown

CVE-2020-5497

Disclosure Date: January 04, 2020 (last updated February 21, 2025)
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
Attacker Value
Unknown

CVE-2008-4704

Disclosure Date: October 23, 2008 (last updated October 04, 2023)
PHP remote file inclusion vulnerability in SezHooTabsAndActions.php in SezHoo 0.1 allows remote attackers to execute arbitrary PHP code via a URL in the IP parameter.
0