Show filters
121 Total Results
Displaying 61-70 of 121
Sort by:
Attacker Value
Unknown
CVE-2020-1723
Disclosure Date: January 28, 2021 (last updated February 22, 2025)
A flaw was found in Keycloak Gatekeeper (Louketo). The logout endpoint can be abused to redirect logged-in users to arbitrary web pages. Affected versions of Keycloak Gatekeeper (Louketo): 6.0.1, 7.0.0
0
Attacker Value
Unknown
CVE-2020-16272
Disclosure Date: August 03, 2020 (last updated February 21, 2025)
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 is missing validation for a client-provided parameter, which allows remote attackers to read and modify data in the KeePass database via an A=0 WebSocket connection.
0
Attacker Value
Unknown
CVE-2020-16271
Disclosure Date: August 03, 2020 (last updated February 21, 2025)
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 generates insufficiently random numbers, which allows remote attackers to read and modify data in the KeePass database via a WebSocket connection.
0
Attacker Value
Unknown
CVE-2020-12845
Disclosure Date: July 27, 2020 (last updated February 21, 2025)
Cherokee 0.4.27 to 1.2.104 is affected by a denial of service due to a NULL pointer dereferences. A remote unauthenticated attacker can crash the server by sending an HTTP request to protected resources using a malformed Authorization header that is mishandled during a cherokee_buffer_add call within cherokee_validator_parse_basic or cherokee_validator_parse_digest.
0
Attacker Value
Unknown
CVE-2019-20800
Disclosure Date: May 18, 2020 (last updated February 21, 2025)
In Cherokee through 1.2.104, remote attackers can trigger an out-of-bounds write in cherokee_handler_cgi_add_env_pair in handler_cgi.c by sending many request headers, as demonstrated by a GET request with many "Host: 127.0.0.1" headers.
0
Attacker Value
Unknown
CVE-2019-20799
Disclosure Date: May 18, 2020 (last updated February 21, 2025)
In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server.
0
Attacker Value
Unknown
CVE-2019-20798
Disclosure Date: May 18, 2020 (last updated February 21, 2025)
An XSS issue was discovered in handler_server_info.c in Cherokee through 1.2.104. The requested URL is improperly displayed on the About page in the default configuration of the web server and its administrator panel. The XSS in the administrator panel can be used to reconfigure the server and execute arbitrary commands.
0
Attacker Value
Unknown
CVE-2020-10187
Disclosure Date: May 04, 2020 (last updated February 21, 2025)
Doorkeeper version 5.0.0 and later contains an information disclosure vulnerability that allows an attacker to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their authorized applications in a JSON format (usually GET /oauth/authorized_applications.json). An application is vulnerable if the authorized applications controller is enabled.
0
Attacker Value
Unknown
CVE-2019-18671
Disclosure Date: December 06, 2019 (last updated November 27, 2024)
Insufficient checks in the USB packet handling of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow out-of-bounds writes in the .bss segment via crafted messages. The vulnerability could allow code execution or other forms of impact. It can be triggered by unauthenticated attackers and the interface is reachable via WebUSB.
0
Attacker Value
Unknown
CVE-2019-16398
Disclosure Date: September 19, 2019 (last updated November 27, 2024)
On Keeper K5 20.1.0.25 and 20.1.0.63 devices, remote code execution can occur by inserting an SD card containing a file named zskj_script_run.sh that executes a reverse shell.
0