Show filters
70 Total Results
Displaying 31-40 of 70
Sort by:
Attacker Value
Unknown
CVE-2021-20718
Disclosure Date: May 20, 2021 (last updated February 22, 2025)
mod_auth_openidc 2.4.0 to 2.4.7 allows a remote attacker to cause a denial-of-service (DoS) condition via unspecified vectors.
0
Attacker Value
Unknown
CVE-2021-24214
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
The OpenID Connect Generic Client WordPress plugin 3.8.0 and 3.8.1 did not sanitise the login error when output back in the login form, leading to a reflected Cross-Site Scripting issue. This issue does not require authentication and can be exploited with the default configuration.
0
Attacker Value
Unknown
CVE-2021-22852
Disclosure Date: January 19, 2021 (last updated February 22, 2025)
HGiga EIP product contains SQL Injection vulnerability. Attackers can inject SQL commands into specific URL parameter (online registration) to obtain database schema and data.
0
Attacker Value
Unknown
CVE-2021-22851
Disclosure Date: January 19, 2021 (last updated February 22, 2025)
HGiga EIP product contains SQL Injection vulnerability. Attackers can inject SQL commands into specific URL parameter (document management page) to obtain database schema and data.
0
Attacker Value
Unknown
CVE-2020-26244
Disclosure Date: December 02, 2020 (last updated February 22, 2025)
Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library. The issues are: 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) iat claim was not checked for sanity (i.e. it could be in the future). These issues are patched in version 1.2.1.
0
Attacker Value
Unknown
CVE-2019-20479
Disclosure Date: February 20, 2020 (last updated February 21, 2025)
A flaw was found in mod_auth_openidc before version 2.4.1. An open redirect issue exists in URLs with a slash and backslash at the beginning.
0
Attacker Value
Unknown
CVE-2019-14857
Disclosure Date: November 26, 2019 (last updated November 08, 2023)
A flaw was found in mod_auth_openidc before version 2.4.0.1. An open redirect issue exists in URLs with trailing slashes similar to CVE-2019-3877 in mod_auth_mellon.
0
Attacker Value
Unknown
CVE-2019-1010247
Disclosure Date: July 19, 2019 (last updated November 27, 2024)
ZmartZone IAM mod_auth_openidc 2.3.10.1 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Redirecting the user to a phishing page or interacting with the application on behalf of the user. The component is: File: src/mod_auth_openidc.c, Line: 3109. The fixed version is: 2.3.10.2.
0
Attacker Value
Unknown
CVE-2019-11027
Disclosure Date: June 10, 2019 (last updated November 27, 2024)
Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the "example app" provided by the project are at highest risk.
0
Attacker Value
Unknown
CVE-2019-11066
Disclosure Date: May 10, 2019 (last updated November 27, 2024)
openid.php in LightOpenID through 1.3.1 allows SSRF via a crafted OpenID 2.0 assertion request using the HTTP GET method.
0