Vulnerabilities (CVE)

Filtered by vendor Forgerock Subscribe
Filtered by product Openam
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-14395 1 Forgerock 2 Access Management, Openam 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Auth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to execute a script in the user's browser via reflected XSS.
CVE-2017-14394 1 Forgerock 2 Access Management, Openam 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
OAuth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to perform phishing via an unvalidated redirect.
CVE-2016-10097 1 Forgerock 1 Openam 2024-11-21 5.0 MEDIUM 7.5 HIGH
XML External Entity (XXE) Vulnerability in /SSOPOST/metaAlias/%realm%/idpv2 in OpenAM - Access Management 10.1.0 allows remote attackers to read arbitrary files via the SAMLRequest parameter.
CVE-2014-7246 1 Forgerock 1 Openam 2024-11-21 3.5 LOW N/A
The Core Server in OpenAM 9.5.3 through 9.5.5, 10.0.0 through 10.0.2, 10.1.0-Xpress, and 11.0.0 through 11.0.2, when deployed on a multi-server network, allows remote authenticated users to cause a denial of service (infinite loop) via a crafted cookie in a request.
CVE-2021-35464 1 Forgerock 2 Am, Openam 2024-02-28 10.0 HIGH 9.8 CRITICAL
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
CVE-2021-29156 1 Forgerock 1 Openam 2024-02-28 5.0 MEDIUM 7.5 HIGH
ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.