Show filters
649 Total Results
Displaying 181-190 of 649
Sort by:
Attacker Value
Unknown

CVE-2020-27782

Disclosure Date: February 23, 2021 (last updated February 22, 2025)
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1.
Attacker Value
Unknown

CVE-2020-10734

Disclosure Date: February 11, 2021 (last updated February 22, 2025)
A vulnerability was found in keycloak in the way that the OIDC logout endpoint does not have CSRF protection. Versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes are believed to be vulnerable.
Attacker Value
Unknown

CVE-2020-1717

Disclosure Date: February 11, 2021 (last updated February 22, 2025)
A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.
Attacker Value
Unknown

CVE-2020-35859

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the lucet-runtime-internals crate before 0.5.1 for Rust. It mishandles sigstack allocation. Guest programs may be able to obtain sensitive information, or guest programs can experience memory corruption.
Attacker Value
Unknown

CVE-2020-7544

Disclosure Date: November 19, 2020 (last updated February 22, 2025)
A CWE-269 Improper Privilege Management vulnerability exists in EcoStruxureª Operator Terminal Expert runtime (Vijeo XD) that could cause privilege escalation on the workstation when interacting directly with a driver installed by the runtime software of EcoStruxureª Operator Terminal Expert.
Attacker Value
Unknown

CVE-2020-12510

Disclosure Date: November 19, 2020 (last updated February 22, 2025)
The default installation path of the TwinCAT XAR 3.1 software in all versions is underneath C:\TwinCAT. If the directory does not exist it and further subdirectories are created with permissions which allow every local user to modify the content. The default installation registers TcSysUI.exe for automatic execution upon log in of a user. If a less privileged user has a local account he or she can replace TcSysUI.exe. It will be executed automatically by another user during login. This is also true for users with administrative access. Consequently, a less privileged user can trick a higher privileged user into executing code he or she modified this way. By default Beckhoff’s IPCs are shipped with TwinCAT software installed this way and with just a single local user configured. Thus the vulnerability exists if further less privileged users have been added.
Attacker Value
Unknown

CVE-2020-25689

Disclosure Date: November 02, 2020 (last updated February 22, 2025)
A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial of service. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2020-10746

Disclosure Date: October 19, 2020 (last updated February 22, 2025)
A flaw was found in Infinispan (org.infinispan:infinispan-server-runtime) version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server.
Attacker Value
Unknown

CVE-2020-14299

Disclosure Date: October 16, 2020 (last updated February 22, 2025)
A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability.
Attacker Value
Unknown

CVE-2020-25644

Disclosure Date: October 06, 2020 (last updated February 22, 2025)
A memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. It may allow the attacker to cause OOM leading to a denial of service. The highest threat from this vulnerability is to system availability.