7.5
CVE-2020-10758
- EPSS 0.53%
- Published 16.09.2020 16:15:14
- Last modified 21.11.2024 04:56:00
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
Data is provided by the National Vulnerability Database (NVD)
Redhat ≫ Openshift Application Runtimes Version- SwEditiontext-only
Redhat ≫ Openshift Application Runtimes Version1.0
Redhat ≫ Single Sign-on Version- SwEditiontext-only
Redhat ≫ Single Sign-on Version7.0
Redhat ≫ Single Sign-on Version7.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.53% | 0.645 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.