CVE-2020-10758
- EPSS 0.53%
- Published 16.09.2020 16:15:14
- Last modified 21.11.2024 04:56:00
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body...
CVE-2020-1727
- EPSS 0.18%
- Published 22.06.2020 19:15:10
- Last modified 21.11.2024 05:11:15
A vulnerability was found in Keycloak before 9.0.2, where every Authorization URL that points to an IDP server lacks proper input validation as it allows a wide range of characters. This flaw allows a malicious to craft deep links that introduce furt...
CVE-2020-1758
- EPSS 0.25%
- Published 15.05.2020 19:15:12
- Last modified 21.11.2024 05:11:19
A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack.
CVE-2020-1714
- EPSS 2.15%
- Published 13.05.2020 19:15:11
- Last modified 21.11.2024 05:11:13
A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privi...
CVE-2020-1718
- EPSS 0.37%
- Published 12.05.2020 21:15:11
- Last modified 21.11.2024 05:11:13
A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.
CVE-2020-1724
- EPSS 0.23%
- Published 11.05.2020 21:15:11
- Last modified 21.11.2024 05:11:14
A flaw was found in Keycloak in versions before 9.0.2. This flaw allows a malicious user that is currently logged in, to see the personal information of a previously logged out user in the account manager section.
CVE-2020-1698
- EPSS 0.05%
- Published 11.05.2020 14:15:11
- Last modified 21.11.2024 05:11:11
A flaw was found in keycloak in versions before 9.0.0. A logged exception in the HttpMethod class may leak the password given as parameter. The highest threat from this vulnerability is to data confidentiality.
CVE-2019-10169
- EPSS 0.61%
- Published 08.05.2020 14:15:11
- Last modified 21.11.2024 04:18:34
A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary...
CVE-2019-10170
- EPSS 0.74%
- Published 08.05.2020 14:15:11
- Last modified 21.11.2024 04:18:34
A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to t...
CVE-2020-10686
- EPSS 0.24%
- Published 04.05.2020 21:15:11
- Last modified 21.11.2024 04:55:51
A flaw was found in Keycloak version 8.0.2 and 9.0.0, and was fixed in Keycloak version 9.0.1, where a malicious user registers as oneself. The attacker could then use the remove devices form to post different credential IDs and possibly remove MFA d...