VYPR
Vendor
Products
2
CVEs
8
Across products
20
Status
Private

Products

2

Recent CVEs

8
CVESevRiskCVSSEPSSKEVPublishedDescription
CVE-2015-5284Cri0.649.80.00Sep 21, 2017ipa-kra-install in FreeIPA before 4.2.2 puts the CA agent certificate and private key in /etc/httpd/alias/kra-agent.pem, which is world readable.
CVE-2015-5179Hig0.497.50.00Sep 20, 2017FreeIPA might display user data improperly via vectors involving non-printable characters.
CVE-2016-5414Hig0.497.50.00Jun 27, 2017FreeIPA 4.4.0 allows remote attackers to request an arbitrary SAN name for services.
CVE-2016-5404Med0.426.50.00Sep 7, 2016The cert_revoke command in FreeIPA does not check for the "revoke certificate" permission, which allows remote authenticated users to revoke arbitrary certificates by leveraging the "retrieve certificate" permission.
CVE-2016-95750.000.00Mar 13, 2018Ipa versions 4.2.x, 4.3.x before 4.3.3 and 4.4.x before 4.4.3 did not properly check the user's permissions while modifying certificate profiles in IdM's certprofile-mod command. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks.
CVE-2017-121690.000.01Jan 10, 2018It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability.
CVE-2014-78500.000.00Nov 28, 2014Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.
CVE-2014-78280.000.00Nov 19, 2014FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind.