Show filters
61 Total Results
Displaying 41-50 of 61
Sort by:
Attacker Value
Unknown
CVE-2018-19045
Disclosure Date: November 08, 2018 (last updated November 27, 2024)
keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to PrintData or PrintStats, potentially leaking sensitive information.
0
Attacker Value
Unknown
CVE-2018-1000211
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.
0
Attacker Value
Unknown
CVE-2018-8739
Disclosure Date: March 16, 2018 (last updated November 26, 2024)
VPN Unlimited 4.2.0 for macOS suffers from a root privilege escalation vulnerability in its privileged helper tool. The privileged helper tool implements an XPC interface, which allows arbitrary applications to execute system commands as root.
0
Attacker Value
Unknown
CVE-2018-1000088
Disclosure Date: March 13, 2018 (last updated November 26, 2024)
Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link.. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.
0
Attacker Value
Unknown
CVE-2017-1000066
Disclosure Date: July 17, 2017 (last updated November 26, 2024)
The entry details view function in KeePass version 1.32 inadvertently decrypts certain database entries into memory, which may result in the disclosure of sensitive information.
0
Attacker Value
Unknown
CVE-2015-8378
Disclosure Date: April 10, 2017 (last updated November 26, 2024)
In KeePassX before 0.4.4, a cleartext copy of password data is created upon a cancel of an XML export action. This allows context-dependent attackers to obtain sensitive information by reading the .xml dotfile.
0
Attacker Value
Unknown
CVE-2016-6582
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
0
Attacker Value
Unknown
CVE-2016-5119
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The automatic update feature in KeePass 2.33 and earlier allows man-in-the-middle attackers to execute arbitrary code by spoofing the version check response and supplying a crafted update.
0
Attacker Value
Unknown
CVE-2014-8144
Disclosure Date: December 31, 2014 (last updated October 05, 2023)
Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors.
0
Attacker Value
Unknown
CVE-2014-5982
Disclosure Date: September 22, 2014 (last updated October 05, 2023)
The RunKeeper - GPS Track Run Walk (aka com.fitnesskeeper.runkeeper.pro) application 4.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0