Show filters
538 Total Results
Displaying 71-80 of 538
Sort by:
Attacker Value
Unknown

CVE-2024-1249

Disclosure Date: April 17, 2024 (last updated October 22, 2024)
A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.
0
Attacker Value
Unknown

CVE-2024-1132

Disclosure Date: April 17, 2024 (last updated October 22, 2024)
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.
0
Attacker Value
Unknown

CVE-2023-5394

Disclosure Date: April 11, 2024 (last updated April 25, 2024)
Server receiving a malformed message that where the GCL message hostname may be too large which may cause a stack overflow; resulting in possible remote code execution. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
0
Attacker Value
Unknown

CVE-2023-5393

Disclosure Date: April 11, 2024 (last updated April 25, 2024)
Server receiving a malformed message that causes a disconnect to a hostname may causing a stack overflow resulting in possible remote code execution. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
0
Attacker Value
Unknown

CVE-2024-2700

Disclosure Date: April 04, 2024 (last updated December 12, 2024)
A vulnerability was found in the quarkus-core component. Quarkus captures local environment variables from the Quarkus namespace during the application's build, therefore, running the resulting application inherits the values captured at build time. Some local environment variables may have been set by the developer or CI environment for testing purposes, such as dropping the database during application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application, which can lead to dangerous behavior if the application does not override these values. This behavior only happens for configuration properties from the `quarkus.*` namespace. Application-specific properties are not captured.
0
Attacker Value
Unknown

CVE-2024-25599

Disclosure Date: March 28, 2024 (last updated April 02, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Castos Seriously Simple Podcasting allows Reflected XSS.This issue affects Seriously Simple Podcasting: from n/a through 3.0.2.
0
Attacker Value
Unknown

CVE-2023-6444

Disclosure Date: March 11, 2024 (last updated April 01, 2024)
The Seriously Simple Podcasting WordPress plugin before 3.0.0 discloses the Podcast owner's email address (which by default is the admin email address) via an unauthenticated crafted request.
0
Attacker Value
Unknown

CVE-2023-50737

Disclosure Date: February 28, 2024 (last updated February 28, 2024)
The SE menu contains information used by Lexmark to diagnose device errors. A vulnerability in one of the SE menu routines can be leveraged by an attacker to execute arbitrary code.
0
Attacker Value
Unknown

CVE-2023-50736

Disclosure Date: February 28, 2024 (last updated February 28, 2024)
A memory corruption vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
0
Attacker Value
Unknown

CVE-2023-50735

Disclosure Date: February 28, 2024 (last updated February 28, 2024)
A heap corruption vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
0