CVE-2024-4629
- EPSS 0.17%
- Veröffentlicht 03.09.2024 20:15:09
- Zuletzt bearbeitet 21.11.2024 09:43:14
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed...
CVE-2023-6134
- EPSS 1.41%
- Veröffentlicht 14.12.2023 22:15:44
- Zuletzt bearbeitet 21.11.2024 08:43:12
A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or furthe...
CVE-2023-5625
- EPSS 0.08%
- Veröffentlicht 01.11.2023 14:15:38
- Zuletzt bearbeitet 06.12.2024 11:15:07
A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.
CVE-2022-4318
- EPSS 0.04%
- Veröffentlicht 25.09.2023 20:15:10
- Zuletzt bearbeitet 21.11.2024 07:35:01
A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.
CVE-2022-3916
- EPSS 0.23%
- Veröffentlicht 20.09.2023 15:15:11
- Zuletzt bearbeitet 21.11.2024 07:20:31
A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user auth...
- EPSS 3.94%
- Veröffentlicht 04.08.2023 18:15:11
- Zuletzt bearbeitet 21.11.2024 07:36:51
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the vic...
CVE-2023-3089
- EPSS 0.05%
- Veröffentlicht 05.07.2023 13:15:09
- Zuletzt bearbeitet 21.11.2024 08:16:25
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
CVE-2023-0056
- EPSS 0.15%
- Veröffentlicht 23.03.2023 21:15:19
- Zuletzt bearbeitet 25.02.2025 20:15:31
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impac...