Show filters
402 Total Results
Displaying 51-60 of 402
Sort by:
Attacker Value
Unknown

CVE-2024-5967

Disclosure Date: June 18, 2024 (last updated February 26, 2025)
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
0
Attacker Value
Unknown

CVE-2023-7264

Disclosure Date: June 11, 2024 (last updated February 26, 2025)
The Build App Online plugin for WordPress is vulnerable to account takeover due to a weak password reset mechanism in all versions up to, and including, 1.0.21. This makes it possible for unauthenticated attackers to reset the password of arbitrary users by guessing an 4-digit numeric reset code.
Attacker Value
Unknown

CVE-2024-4540

Disclosure Date: June 03, 2024 (last updated February 26, 2025)
A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authorization request, possibly leading to an information disclosure vulnerability.
0
Attacker Value
Unknown

CVE-2023-51479

Disclosure Date: May 17, 2024 (last updated February 26, 2025)
Improper Privilege Management vulnerability in Abdul Hakeem Build App Online allows Privilege Escalation.This issue affects Build App Online: from n/a through 1.0.19.
Attacker Value
Unknown

CVE-2024-4029

Disclosure Date: May 02, 2024 (last updated February 26, 2025)
A vulnerability was found in Wildfly’s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.
0
Attacker Value
Unknown

CVE-2024-1726

Disclosure Date: April 25, 2024 (last updated February 26, 2025)
A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurations, if an attacker has knowledge of any POST, PUT, or PATCH request paths, they can potentially identify vulnerable endpoints and trigger excessive resource usage as the endpoints process the requests. This can result in a denial of service.
0
Attacker Value
Unknown

CVE-2024-1102

Disclosure Date: April 25, 2024 (last updated February 26, 2025)
A vulnerability was found in jberet-core logging. An exception in 'dbProperties' might display user credentials such as the username and password for the database-connection.
0
Attacker Value
Unknown

CVE-2023-6787

Disclosure Date: April 25, 2024 (last updated February 26, 2025)
A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "prompt=login," prompting the user to re-enter their credentials. If the user cancels this re-authentication by selecting "Restart login," an account takeover may occur, as the new session, with a different SUB, will possess the same SID as the previous session.
0
Attacker Value
Unknown

CVE-2023-6717

Disclosure Date: April 25, 2024 (last updated February 26, 2025)
A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.
0
Attacker Value
Unknown

CVE-2023-6544

Disclosure Date: April 25, 2024 (last updated February 26, 2025)
A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardize an environment with this specific Dynamic Client Registration and TrustedDomain configuration previously unauthorized.
0