Show filters
39 Total Results
Displaying 11-20 of 39
Sort by:
Attacker Value
Unknown

CVE-2024-8883

Disclosure Date: September 19, 2024 (last updated February 26, 2025)
A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
Attacker Value
Unknown

CVE-2024-4629

Disclosure Date: September 03, 2024 (last updated February 26, 2025)
A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.
Attacker Value
Unknown

CVE-2024-35260

Disclosure Date: June 27, 2024 (last updated February 26, 2025)
An authenticated attacker can exploit an untrusted search path vulnerability in Microsoft Dataverse to execute code over a network.
Attacker Value
Unknown

CVE-2023-6291

Disclosure Date: January 26, 2024 (last updated February 26, 2025)
A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
Attacker Value
Unknown

CVE-2023-2585

Disclosure Date: December 21, 2023 (last updated February 25, 2025)
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
Attacker Value
Unknown

CVE-2023-6134

Disclosure Date: December 14, 2023 (last updated February 25, 2025)
A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
Attacker Value
Unknown

CVE-2023-6563

Disclosure Date: December 14, 2023 (last updated February 25, 2025)
An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
Attacker Value
Unknown

CVE-2023-36019

Disclosure Date: December 12, 2023 (last updated February 25, 2025)
Microsoft Power Platform Connector Spoofing Vulnerability
Attacker Value
Unknown

CVE-2023-5625

Disclosure Date: November 01, 2023 (last updated February 25, 2025)
A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.
Attacker Value
Unknown

CVE-2023-3223

Disclosure Date: September 27, 2023 (last updated February 25, 2025)
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null.