Show filters
61 Total Results
Displaying 31-40 of 61
Sort by:
Attacker Value
Unknown
CVE-2021-44225
Disclosure Date: November 26, 2021 (last updated February 23, 2025)
In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property
0
Attacker Value
Unknown
CVE-2020-1723
Disclosure Date: January 28, 2021 (last updated February 22, 2025)
A flaw was found in Keycloak Gatekeeper (Louketo). The logout endpoint can be abused to redirect logged-in users to arbitrary web pages. Affected versions of Keycloak Gatekeeper (Louketo): 6.0.1, 7.0.0
0
Attacker Value
Unknown
CVE-2020-10187
Disclosure Date: May 04, 2020 (last updated February 21, 2025)
Doorkeeper version 5.0.0 and later contains an information disclosure vulnerability that allows an attacker to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their authorized applications in a JSON format (usually GET /oauth/authorized_applications.json). An application is vulnerable if the authorized applications controller is enabled.
0
Attacker Value
Unknown
CVE-2019-18671
Disclosure Date: December 06, 2019 (last updated November 27, 2024)
Insufficient checks in the USB packet handling of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow out-of-bounds writes in the .bss segment via crafted messages. The vulnerability could allow code execution or other forms of impact. It can be triggered by unauthenticated attackers and the interface is reachable via WebUSB.
0
Attacker Value
Unknown
CVE-2019-16398
Disclosure Date: September 19, 2019 (last updated November 27, 2024)
On Keeper K5 20.1.0.25 and 20.1.0.63 devices, remote code execution can occur by inserting an SD card containing a file named zskj_script_run.sh that executes a reverse shell.
0
Attacker Value
Unknown
CVE-2019-20184
Disclosure Date: June 19, 2019 (last updated February 21, 2025)
KeePass 2.4.1 allows CSV injection in the title field of a CSV export.
0
Attacker Value
Unknown
CVE-2018-1000835
Disclosure Date: December 20, 2018 (last updated November 27, 2024)
KeePassDX version <= 2.5.0.0beta17 contains a XML External Entity (XXE) vulnerability in kdbx file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.
0
Attacker Value
Unknown
CVE-2018-19046
Disclosure Date: November 08, 2018 (last updated November 27, 2024)
keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.
0
Attacker Value
Unknown
CVE-2018-19044
Disclosure Date: November 08, 2018 (last updated November 27, 2024)
keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.
0
Attacker Value
Unknown
CVE-2018-19115
Disclosure Date: November 08, 2018 (last updated November 27, 2024)
keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
0