Show filters
16 Total Results
Displaying 1-10 of 16
Sort by:
Attacker Value
Unknown
CVE-2022-4132
Disclosure Date: October 04, 2023 (last updated October 09, 2023)
A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
0
Attacker Value
Unknown
CVE-2021-4213
Disclosure Date: August 24, 2022 (last updated October 08, 2023)
A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.
0
Attacker Value
Unknown
CVE-2022-2414
Disclosure Date: July 29, 2022 (last updated October 08, 2023)
Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
0
Attacker Value
Unknown
CVE-2021-3551
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2020-25715
Disclosure Date: May 28, 2021 (last updated November 28, 2024)
A flaw was found in pki-core 10.9.0. A specially crafted POST request can be used to reflect a DOM-based cross-site scripting (XSS) attack to inject code into the search query form which can get automatically executed. The highest threat from this vulnerability is to data integrity.
0
Attacker Value
Unknown
CVE-2020-1721
Disclosure Date: April 30, 2021 (last updated November 28, 2024)
A flaw was found in the Key Recovery Authority (KRA) Agent Service in pki-core 10.10.5 where it did not properly sanitize the recovery ID during a key recovery request, enabling a reflected cross-site scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.
0
Attacker Value
Unknown
CVE-2021-20179
Disclosure Date: March 15, 2021 (last updated November 08, 2023)
A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2020-15720
Disclosure Date: July 14, 2020 (last updated February 21, 2025)
In Dogtag PKI through 10.8.3, the pki.client.PKIConnection class did not enable python-requests certificate validation. Since the verify parameter was hard-coded in all request functions, it was not possible to override the setting. As a result, tools making use of this class, such as the pki-server command, may have been vulnerable to Person-in-the-Middle attacks in certain non-localhost use cases. This is fixed in 10.9.0-b1.
0
Attacker Value
Unknown
CVE-2019-10180
Disclosure Date: March 31, 2020 (last updated February 21, 2025)
A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code.
0
Attacker Value
Unknown
CVE-2019-10179
Disclosure Date: March 20, 2020 (last updated February 21, 2025)
A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.
0