Dogtagpki Dogtagpki

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Dogtagpki product.

RSS Feeds for Dogtagpki security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Dogtagpki products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Dogtagpki Sorted by Most Security Vulnerabilities since 2018

Dogtagpki14 vulnerabilities

By the Year

In 2026 there have been 0 vulnerabilities in Dogtagpki. Dogtagpki did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 1 5.90
2022 3 7.60
2021 3 6.10
2020 7 5.46
2019 0 0.00
2018 2 8.10

It may take a day or so for new Dogtagpki vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Dogtagpki Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2022-4132 Oct 04, 2023
Jamf Pro (JSS) Memory Leak DoS via Login Page A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
Network Security Services Java
CVE-2021-4213 Aug 24, 2022
DoS via OOM in JSS from unchecked memory free A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the servers RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.
Network Security Services Java
CVE-2022-2414 Jul 29, 2022
XXE in XML Parser: Remote File Retrieval via XXE (CVE20222414) Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
Dogtagpki
CVE-2021-3551 Feb 16, 2022
A flaw was found in the PKI-server A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
Dogtagpki
CVE-2020-25715 May 28, 2021
A flaw was found in pki-core 10.9.0 A flaw was found in pki-core 10.9.0. A specially crafted POST request can be used to reflect a DOM-based cross-site scripting (XSS) attack to inject code into the search query form which can get automatically executed. The highest threat from this vulnerability is to data integrity.
Dogtagpki
CVE-2020-1721 Apr 30, 2021
A flaw was found in the Key Recovery Authority (KRA) Agent Service in pki-core 10.10.5 where it did not properly sanitize the recovery ID during a key recovery request A flaw was found in the Key Recovery Authority (KRA) Agent Service in pki-core 10.10.5 where it did not properly sanitize the recovery ID during a key recovery request, enabling a reflected cross-site scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.
Dogtagpki
CVE-2021-20179 Mar 15, 2021
A flaw was found in pki-core A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity.
Dogtagpki
CVE-2020-15720 Jul 14, 2020
In Dogtag PKI through 10.8.3, the pki.client.PKIConnection class did not enable python-requests certificate validation In Dogtag PKI through 10.8.3, the pki.client.PKIConnection class did not enable python-requests certificate validation. Since the verify parameter was hard-coded in all request functions, it was not possible to override the setting. As a result, tools making use of this class, such as the pki-server command, may have been vulnerable to Person-in-the-Middle attacks in certain non-localhost use cases. This is fixed in 10.9.0-b1.
Dogtagpki
CVE-2019-10180 Mar 31, 2020
A vulnerability was found in all pki-core 10.x.x version A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code.
Dogtagpki
CVE-2020-1696 Mar 20, 2020
A flaw was found in the all pki-core 10.x.x versions A flaw was found in the all pki-core 10.x.x versions, where Token Processing Service (TPS) where it did not properly sanitize Profile IDs, enabling a Stored Cross-Site Scripting (XSS) vulnerability when the profile ID is printed. An attacker with sufficient permissions could trick an authenticated victim into executing a specially crafted Javascript code.
Dogtagpki
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.