Show filters
121 Total Results
Displaying 61-70 of 121
Sort by:
Attacker Value
Unknown

CVE-2020-1723

Disclosure Date: January 28, 2021 (last updated February 22, 2025)
A flaw was found in Keycloak Gatekeeper (Louketo). The logout endpoint can be abused to redirect logged-in users to arbitrary web pages. Affected versions of Keycloak Gatekeeper (Louketo): 6.0.1, 7.0.0
Attacker Value
Unknown

CVE-2020-16272

Disclosure Date: August 03, 2020 (last updated February 21, 2025)
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 is missing validation for a client-provided parameter, which allows remote attackers to read and modify data in the KeePass database via an A=0 WebSocket connection.
Attacker Value
Unknown

CVE-2020-16271

Disclosure Date: August 03, 2020 (last updated February 21, 2025)
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 generates insufficiently random numbers, which allows remote attackers to read and modify data in the KeePass database via a WebSocket connection.
Attacker Value
Unknown

CVE-2020-12845

Disclosure Date: July 27, 2020 (last updated February 21, 2025)
Cherokee 0.4.27 to 1.2.104 is affected by a denial of service due to a NULL pointer dereferences. A remote unauthenticated attacker can crash the server by sending an HTTP request to protected resources using a malformed Authorization header that is mishandled during a cherokee_buffer_add call within cherokee_validator_parse_basic or cherokee_validator_parse_digest.
Attacker Value
Unknown

CVE-2019-20800

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
In Cherokee through 1.2.104, remote attackers can trigger an out-of-bounds write in cherokee_handler_cgi_add_env_pair in handler_cgi.c by sending many request headers, as demonstrated by a GET request with many "Host: 127.0.0.1" headers.
Attacker Value
Unknown

CVE-2019-20799

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server.
Attacker Value
Unknown

CVE-2019-20798

Disclosure Date: May 18, 2020 (last updated February 21, 2025)
An XSS issue was discovered in handler_server_info.c in Cherokee through 1.2.104. The requested URL is improperly displayed on the About page in the default configuration of the web server and its administrator panel. The XSS in the administrator panel can be used to reconfigure the server and execute arbitrary commands.
Attacker Value
Unknown

CVE-2020-10187

Disclosure Date: May 04, 2020 (last updated February 21, 2025)
Doorkeeper version 5.0.0 and later contains an information disclosure vulnerability that allows an attacker to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their authorized applications in a JSON format (usually GET /oauth/authorized_applications.json). An application is vulnerable if the authorized applications controller is enabled.
Attacker Value
Unknown

CVE-2019-18671

Disclosure Date: December 06, 2019 (last updated November 27, 2024)
Insufficient checks in the USB packet handling of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow out-of-bounds writes in the .bss segment via crafted messages. The vulnerability could allow code execution or other forms of impact. It can be triggered by unauthenticated attackers and the interface is reachable via WebUSB.
Attacker Value
Unknown

CVE-2019-16398

Disclosure Date: September 19, 2019 (last updated November 27, 2024)
On Keeper K5 20.1.0.25 and 20.1.0.63 devices, remote code execution can occur by inserting an SD card containing a file named zskj_script_run.sh that executes a reverse shell.