CVE-2024-7318
- EPSS 1.22%
- Veröffentlicht 09.09.2024 19:15:14
- Zuletzt bearbeitet 07.10.2024 20:15:17
A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additiona...
CVE-2024-7341
- EPSS 2.25%
- Veröffentlicht 09.09.2024 19:15:14
- Zuletzt bearbeitet 27.03.2026 00:16:19
A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who ...
CVE-2024-4629
- EPSS 0.44%
- Veröffentlicht 03.09.2024 20:15:09
- Zuletzt bearbeitet 21.11.2024 09:43:14
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed...
CVE-2024-6162
- EPSS 2.02%
- Veröffentlicht 20.06.2024 15:15:50
- Zuletzt bearbeitet 15.04.2026 00:35:42
A vulnerability was found in Undertow, where URL-encoded request paths can be mishandled during concurrent requests on the AJP listener. This issue arises because the same buffer is used to decode the paths for multiple requests simultaneously, leadi...
CVE-2024-5967
- EPSS 0.09%
- Veröffentlicht 18.06.2024 12:15:12
- Zuletzt bearbeitet 15.04.2026 00:35:42
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-r...
CVE-2023-4727
- EPSS 0.05%
- Veröffentlicht 11.06.2024 20:15:09
- Zuletzt bearbeitet 15.04.2026 00:35:42
A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory s...
CVE-2024-4540
- EPSS 0.31%
- Veröffentlicht 03.06.2024 16:15:08
- Zuletzt bearbeitet 15.04.2026 00:35:42
A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authori...
CVE-2024-1102
- EPSS 0.09%
- Veröffentlicht 25.04.2024 17:15:47
- Zuletzt bearbeitet 24.10.2025 12:15:36
A vulnerability was found in jberet-core logging. An exception in 'dbProperties' might display user credentials such as the username and password for the database-connection.
CVE-2023-6544
- EPSS 1.31%
- Veröffentlicht 25.04.2024 16:15:10
- Zuletzt bearbeitet 15.04.2026 00:35:42
A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardiz...
- EPSS 0.1%
- Veröffentlicht 25.04.2024 16:15:10
- Zuletzt bearbeitet 15.04.2026 00:35:42
A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow...