Filtered by vendor Keyfactor
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-34196 | 1 Keyfactor | 1 Ejbca | 2024-11-21 | N/A | 8.2 HIGH |
In the Keyfactor EJBCA before 8.0.0, the RA web certificate distribution servlet /ejbca/ra/cert allows partial denial of service due to an authentication issue. In configurations using OAuth, disclosure of CA certificates (attributes and public keys) to unauthenticated or less privileged users may occur. | |||||
CVE-2022-42954 | 1 Keyfactor | 1 Kefactor Ejbca | 2024-11-21 | N/A | 5.4 MEDIUM |
Keyfactor EJBCA before 7.10.0 allows XSS. | |||||
CVE-2022-39834 | 1 Keyfactor | 1 Primekey Ejbca | 2024-11-21 | N/A | 5.4 MEDIUM |
A stored XSS vulnerability was discovered in adminweb/ra/viewendentity.jsp in PrimeKey EJBCA through 7.9.0.2. A low-privilege user can store JavaScript in order to exploit a higher-privilege user. | |||||
CVE-2024-36066 | 1 Keyfactor | 1 Ejbca | 2024-09-18 | N/A | 3.1 LOW |
The CMP CLI client in KeyFactor EJBCA before 8.3.1 has only 6 octets of salt, and is thus not compliant with the security requirements of RFC 4211, and might make man-in-the-middle attacks easier. CMP includes password-based MAC as one of the options for message integrity and authentication (the other option is certificate-based). RFC 4211 section 4.4 requires that password-based MAC parameters use a salt with a random value of at least 8 octets. This helps to inhibit dictionary attacks. Because the standalone CMP client originally was developed as test code, the salt was instead hardcoded and only 6 octets long. | |||||
CVE-2024-34458 | 1 Keyfactor | 1 Command | 2024-08-21 | N/A | 7.5 HIGH |
Keyfactor Command 10.5.x before 10.5.1 and 11.5.x before 11.5.1 allows SQL Injection which could result in information disclosure. | |||||
CVE-2024-42006 | 1 Keyfactor | 1 Aws Orchestrator | 2024-08-21 | N/A | 7.5 HIGH |
Keyfactor AWS Orchestrator through 2.0 allows Information Disclosure. |