Show filters
611 Total Results
Displaying 81-90 of 611
Sort by:
Attacker Value
Unknown
CVE-2024-2227
Disclosure Date: March 22, 2024 (last updated April 02, 2024)
This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227.
0
Attacker Value
Unknown
CVE-2024-1683
Disclosure Date: February 23, 2024 (last updated December 18, 2024)
A DLL injection vulnerability exists where an authenticated, low-privileged local attacker could modify application files on the TIE Secure Relay host, which could allow for overriding of the configuration and running of new Secure Relay services.
0
Attacker Value
Unknown
CVE-2024-1714
Disclosure Date: February 21, 2024 (last updated April 17, 2024)
An issue exists in all supported versions of IdentityIQ Lifecycle Manager that can result if an entitlement with a value containing leading or trailing whitespace is requested by an authenticated user in an access request.
0
Attacker Value
Unknown
CVE-2024-20251
Disclosure Date: January 17, 2024 (last updated February 02, 2024)
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
0
Attacker Value
Unknown
CVE-2024-21643
Disclosure Date: January 10, 2024 (last updated January 20, 2024)
IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the `SignedHttpRequest`protocol or the `SignedHttpRequestValidator`is vulnerable. Microsoft.IdentityModel trusts the `jku`claim by default for the `SignedHttpRequest`protocol. This raises the possibility to make any remote or local `HTTP GET` request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.
0
Attacker Value
Unknown
CVE-2024-21319
Disclosure Date: January 09, 2024 (last updated January 12, 2025)
Microsoft Identity Denial of service vulnerability
0
Attacker Value
Unknown
CVE-2023-6911
Disclosure Date: December 18, 2023 (last updated December 23, 2023)
Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.
0
Attacker Value
Unknown
CVE-2023-6838
Disclosure Date: December 15, 2023 (last updated December 20, 2023)
Reflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.
0
Attacker Value
Unknown
CVE-2023-6837
Disclosure Date: December 15, 2023 (last updated January 04, 2025)
Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning. In order for this vulnerability to have any impact on your deployment, following conditions must be met:
* An IDP configured for federated authentication and JIT provisioning enabled with the "Prompt for username, password and consent" option.
* A service provider that uses the above IDP for federated authentication and has the "Assert identity using mapped local subject identifier" flag enabled.
Attacker should have:
* A fresh valid user account in the federated IDP that has not been used earlier.
* Knowledge of the username of a valid user in the local IDP.
When all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.
0
Attacker Value
Unknown
CVE-2023-6836
Disclosure Date: December 15, 2023 (last updated December 20, 2023)
Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
0