CVE-2024-10234
- EPSS 0.57%
- Veröffentlicht 22.10.2024 14:15:14
- Zuletzt bearbeitet 23.07.2025 19:15:31
A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior aga...
CVE-2024-3656
- EPSS 89.66%
- Veröffentlicht 09.10.2024 19:15:13
- Zuletzt bearbeitet 15.04.2026 00:35:42
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breach...
CVE-2024-8883
- EPSS 6.59%
- Veröffentlicht 19.09.2024 16:15:06
- Zuletzt bearbeitet 26.11.2024 19:15:32
A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes...
CVE-2024-7341
- EPSS 2.25%
- Veröffentlicht 09.09.2024 19:15:14
- Zuletzt bearbeitet 27.03.2026 00:16:19
A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who ...
CVE-2024-7318
- EPSS 1.22%
- Veröffentlicht 09.09.2024 19:15:14
- Zuletzt bearbeitet 07.10.2024 20:15:17
A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additiona...
CVE-2024-7260
- EPSS 0.37%
- Veröffentlicht 09.09.2024 19:15:14
- Zuletzt bearbeitet 01.10.2024 14:15:06
An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the referrer and referrer_uri parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into b...
CVE-2024-4629
- EPSS 0.44%
- Veröffentlicht 03.09.2024 20:15:09
- Zuletzt bearbeitet 21.11.2024 09:43:14
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed...
CVE-2024-7885
- EPSS 10.7%
- Veröffentlicht 21.08.2024 14:15:09
- Zuletzt bearbeitet 19.01.2026 04:15:58
A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection....
CVE-2023-6787
- EPSS 0.57%
- Veröffentlicht 25.04.2024 16:15:10
- Zuletzt bearbeitet 30.06.2025 13:49:15
A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "p...
CVE-2024-1132
- EPSS 0.33%
- Veröffentlicht 17.04.2024 14:15:07
- Zuletzt bearbeitet 30.06.2025 13:58:57
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain ...