Redhat

Single Sign-on

103 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.67%
  • Published 29.03.2023 21:15:07
  • Last modified 21.11.2024 06:40:23

A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.

  • EPSS 0.09%
  • Published 27.03.2023 22:15:11
  • Last modified 24.02.2025 20:15:31

A flaw was found in the Keycloak Node.js Adapter. This flaw allows an attacker to benefit from an Open Redirect vulnerability in the checkSso function.

  • EPSS 0.12%
  • Published 23.02.2023 20:15:12
  • Last modified 12.03.2025 15:15:38

The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol...

  • EPSS 0.88%
  • Published 13.09.2022 14:15:08
  • Last modified 21.11.2024 06:40:23

A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain.

  • EPSS 0.38%
  • Published 01.09.2022 21:15:09
  • Last modified 21.11.2024 07:00:37

A Stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7. This flaw allows a privileged attacker to execute malicious scripts in the admin console, abusing the default roles functionality.

  • EPSS 0.12%
  • Published 01.09.2022 21:15:09
  • Last modified 21.11.2024 07:01:39

A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.

  • EPSS 0.18%
  • Published 31.08.2022 16:15:09
  • Last modified 21.11.2024 06:40:21

A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may cause overhead or a denial of service in the server. This flaw exists because of an incomplete fix for CVE-2021-3629.

  • EPSS 0.23%
  • Published 31.08.2022 16:15:09
  • Last modified 21.11.2024 06:40:28

A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400...

  • EPSS 0.23%
  • Published 26.08.2022 18:15:08
  • Last modified 21.11.2024 06:37:52

A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-rel...

Exploit
  • EPSS 0.37%
  • Published 26.08.2022 18:15:08
  • Last modified 21.11.2024 06:38:10

A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack.