CVE-2024-7885
- EPSS 10.7%
- Veröffentlicht 21.08.2024 14:15:09
- Zuletzt bearbeitet 19.01.2026 04:15:58
A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection....
CVE-2024-5967
- EPSS 0.15%
- Veröffentlicht 18.06.2024 12:15:12
- Zuletzt bearbeitet 21.11.2024 09:48:39
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-r...
CVE-2023-6787
- EPSS 0.39%
- Veröffentlicht 25.04.2024 16:15:10
- Zuletzt bearbeitet 30.06.2025 13:49:15
A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "p...
CVE-2023-6484
- EPSS 0.34%
- Veröffentlicht 25.04.2024 16:15:09
- Zuletzt bearbeitet 21.11.2024 08:43:56
A log injection flaw was found in Keycloak. A text string may be injected through the authentication form when using the WebAuthn authentication mode. This issue may have a minor impact to the logs integrity.
CVE-2024-1132
- EPSS 0.25%
- Veröffentlicht 17.04.2024 14:15:07
- Zuletzt bearbeitet 30.06.2025 13:58:57
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain ...
CVE-2024-1635
- EPSS 22.69%
- Veröffentlicht 19.02.2024 22:15:48
- Zuletzt bearbeitet 07.05.2025 12:27:53
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immedia...
CVE-2023-6291
- EPSS 0.18%
- Veröffentlicht 26.01.2024 15:15:08
- Zuletzt bearbeitet 21.11.2024 08:43:32
A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate o...
CVE-2023-2585
- EPSS 0.11%
- Veröffentlicht 21.12.2023 10:15:34
- Zuletzt bearbeitet 21.11.2024 07:58:52
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malic...
CVE-2023-6927
- EPSS 0.84%
- Veröffentlicht 18.12.2023 23:15:10
- Zuletzt bearbeitet 21.11.2024 08:44:51
A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-...
CVE-2023-48795
- EPSS 62.63%
- Veröffentlicht 18.12.2023 16:15:10
- Zuletzt bearbeitet 04.11.2025 22:15:55
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...