Login Server Pivotal Software Login Server

Do you want an email whenever new security vulnerabilities are reported in Pivotal Software Login Server?

By the Year

In 2024 there have been 0 vulnerabilities in Pivotal Software Login Server . Login Server did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Login Server vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Pivotal Software Login Server Security Vulnerabilities

The UAA reset password flow in Cloud Foundry release v236 and earlier versions

CVE-2016-3084 8.1 - High - May 25, 2017

The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions, all versions of Login-server, UAA release v10 and earlier versions and Pivotal Elastic Runtime versions prior to 1.7.2 is vulnerable to a brute force attack due to multiple active codes at a given time. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected.

Permissions, Privileges, and Access Controls

The UAA OAuth approval pages in Cloud Foundry v208 to v231

CVE-2016-0781 6.1 - Medium - May 25, 2017

The UAA OAuth approval pages in Cloud Foundry v208 to v231, Login-server v1.6 to v1.14, UAA v2.0.0 to v2.7.4.1, UAA v3.0.0 to v3.2.0, UAA-Release v2 to v7 and Pivotal Elastic Runtime 1.6.x versions prior to 1.6.20 are vulnerable to an XSS attack by specifying malicious java script content in either the OAuth scopes (SCIM groups) or SCIM group descriptions.

XSS

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cloudfoundry Cloud Foundry Uaa Bosh or by Pivotal Software? Click the Watch button to subscribe.

subscribe