Filtered by vendor Fusionauth
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-45921 | 1 Fusionauth | 1 Fusionauth | 2024-11-21 | N/A | 7.5 HIGH |
FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process. | |||||
CVE-2021-27736 | 1 Fusionauth | 1 Saml V2 | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
FusionAuth fusionauth-samlv2 before 0.5.4 allows XXE attacks via a forged AuthnRequest or LogoutRequest because parseFromBytes uses javax.xml.parsers.DocumentBuilderFactory unsafely. | |||||
CVE-2020-7799 | 1 Fusionauth | 1 Fusionauth | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
An issue was discovered in FusionAuth before 1.11.0. An authenticated user, allowed to edit e-mail templates (Home -> Settings -> Email Templates) or themes (Home -> Settings -> Themes), can execute commands on the underlying operating system by abusing freemarker.template.utility.Execute in the Apache FreeMarker engine that processes custom templates. | |||||
CVE-2020-12676 | 1 Fusionauth | 1 Samlv2 | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
FusionAuth fusionauth-samlv2 0.2.3 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a "Signature exclusion attack". |