Show filters
402 Total Results
Displaying 61-70 of 402
Sort by:
Attacker Value
Unknown

CVE-2023-6484

Disclosure Date: April 25, 2024 (last updated February 26, 2025)
A log injection flaw was found in Keycloak. A text string may be injected through the authentication form when using the WebAuthn authentication mode. This issue may have a minor impact to the logs integrity.
0
Attacker Value
Unknown

CVE-2023-5675

Disclosure Date: April 25, 2024 (last updated February 26, 2025)
A flaw was found in Quarkus. When a Quarkus RestEasy Classic or Reactive JAX-RS endpoint has its methods declared in the abstract Java class or customized by Quarkus extensions using the annotation processor, the authorization of these methods will not be enforced if it is enabled by either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties.
0
Attacker Value
Unknown

CVE-2023-3597

Disclosure Date: April 25, 2024 (last updated February 26, 2025)
A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to register a false second authentication factor along with an existing one and bypass authentication.
0
Attacker Value
Unknown

CVE-2023-51478

Disclosure Date: April 25, 2024 (last updated February 26, 2025)
Improper Authentication vulnerability in Abdul Hakeem Build App Online allows Privilege Escalation.This issue affects Build App Online: from n/a through 1.0.19.
Attacker Value
Unknown

CVE-2024-2419

Disclosure Date: April 17, 2024 (last updated February 26, 2025)
A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other users. It is very similar to CVE-2023-6291.
0
Attacker Value
Unknown

CVE-2024-1249

Disclosure Date: April 17, 2024 (last updated February 26, 2025)
A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.
0
Attacker Value
Unknown

CVE-2024-1132

Disclosure Date: April 17, 2024 (last updated February 26, 2025)
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.
0
Attacker Value
Unknown

CVE-2022-47604

Disclosure Date: April 11, 2024 (last updated February 26, 2025)
Missing Authorization vulnerability in junkcoder, ristoniinemets AJAX Thumbnail Rebuild.This issue affects AJAX Thumbnail Rebuild: from n/a through 1.13.
0
Attacker Value
Unknown

CVE-2024-1812

Disclosure Date: April 09, 2024 (last updated April 10, 2024)
The Everest Forms plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.0.7 via the 'font_url' parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
0
Attacker Value
Unknown

CVE-2024-2700

Disclosure Date: April 04, 2024 (last updated February 26, 2025)
A vulnerability was found in the quarkus-core component. Quarkus captures local environment variables from the Quarkus namespace during the application's build, therefore, running the resulting application inherits the values captured at build time. Some local environment variables may have been set by the developer or CI environment for testing purposes, such as dropping the database during application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application, which can lead to dangerous behavior if the application does not override these values. This behavior only happens for configuration properties from the `quarkus.*` namespace. Application-specific properties are not captured.
0