Redhat

Jboss Enterprise Application Platform Expansion Pack

21 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS -
  • Veröffentlicht 23.03.2026 08:09:22
  • Zuletzt bearbeitet 23.03.2026 09:16:26

A flaw was found in Keycloak. An improper Access Control vulnerability in Keycloak’s User-Managed Access (UMA) resource_set endpoint allows attackers with valid credentials to bypass the allowRemoteResourceManagement=false restriction. This occurs du...

  • EPSS 0.03%
  • Veröffentlicht 18.03.2026 04:02:59
  • Zuletzt bearbeitet 18.03.2026 14:52:44

A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain client configuration requests. This behavior allows an attacker to trick the server into making unintend...

  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 18:27:43
  • Zuletzt bearbeitet 10.03.2026 17:04:17

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a prev...

  • EPSS 0.02%
  • Veröffentlicht 26.01.2026 19:36:53
  • Zuletzt bearbeitet 05.03.2026 22:16:11

A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This al...

  • EPSS 0.02%
  • Veröffentlicht 26.01.2026 19:36:40
  • Zuletzt bearbeitet 05.02.2026 15:16:06

A flaw was found in Hibernate Reactive. When an HTTP endpoint is exposed to perform database operations, a remote client can prematurely close the HTTP connection. This action may lead to leaking connections from the database connection pool, potenti...

  • EPSS 0.01%
  • Veröffentlicht 21.01.2026 05:52:22
  • Zuletzt bearbeitet 26.01.2026 15:04:59

A flaw was found in the Keycloak server during refresh token processing, specifically in the TokenManager class responsible for enforcing refresh token reuse policies. When strict refresh token rotation is enabled, the validation and update of refres...

  • EPSS 0.04%
  • Veröffentlicht 20.01.2026 12:33:00
  • Zuletzt bearbeitet 26.01.2026 15:05:23

A flaw was identified in Keycloak’s OpenID Connect Dynamic Client Registration feature when clients authenticate using private_key_jwt. The issue allows a client to specify an arbitrary jwks_uri, which Keycloak then retrieves without validating the d...

  • EPSS 0.01%
  • Veröffentlicht 15.01.2026 12:06:21
  • Zuletzt bearbeitet 16.01.2026 15:55:33

A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker...

  • EPSS 0.05%
  • Veröffentlicht 07.01.2026 16:04:22
  • Zuletzt bearbeitet 18.03.2026 16:16:22

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed ...

  • EPSS 1.17%
  • Veröffentlicht 02.09.2025 13:37:59
  • Zuletzt bearbeitet 18.03.2026 16:16:24

A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload b...