Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown

CVE-2022-3916

Disclosure Date: September 20, 2023 (last updated February 25, 2025)
A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user.
Attacker Value
Unknown

CVE-2023-1108

Disclosure Date: September 14, 2023 (last updated February 25, 2025)
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
Attacker Value
Unknown

CVE-2023-0264

Disclosure Date: August 04, 2023 (last updated February 25, 2025)
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
Attacker Value
Unknown

CVE-2022-4361

Disclosure Date: July 07, 2023 (last updated February 25, 2025)
Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.
Attacker Value
Unknown

CVE-2023-3089

Disclosure Date: July 05, 2023 (last updated February 25, 2025)
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Attacker Value
Unknown

CVE-2023-0056

Disclosure Date: March 23, 2023 (last updated February 24, 2025)
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
Attacker Value
Unknown

CVE-2020-8945

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.