Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown
CVE-2020-19907
Disclosure Date: July 12, 2021 (last updated February 23, 2025)
A command injection vulnerability in the sandcat plugin of Caldera 2.3.1 and earlier allows authenticated attackers to execute any command or service.
0
Attacker Value
Unknown
CVE-2021-26715
Disclosure Date: March 25, 2021 (last updated February 22, 2025)
The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network.
0
Attacker Value
Unknown
CVE-2021-27582
Disclosure Date: February 23, 2021 (last updated February 22, 2025)
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
0
Attacker Value
Unknown
CVE-2020-14462
Disclosure Date: June 19, 2020 (last updated February 21, 2025)
CALDERA 2.7.0 allows XSS via the Operation Name box.
0
Attacker Value
Unknown
CVE-2020-10807
Disclosure Date: March 22, 2020 (last updated February 21, 2025)
auth_svc in Caldera before 2.6.5 allows authentication bypass (for REST API requests) via a forged "localhost" string in the HTTP Host header.
0
Attacker Value
Unknown
CVE-2020-5497
Disclosure Date: January 04, 2020 (last updated February 21, 2025)
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
0
Attacker Value
Unknown
CVE-2008-4704
Disclosure Date: October 23, 2008 (last updated October 04, 2023)
PHP remote file inclusion vulnerability in SezHooTabsAndActions.php in SezHoo 0.1 allows remote attackers to execute arbitrary PHP code via a URL in the IP parameter.
0