Show filters
175 Total Results
Displaying 91-100 of 175
Sort by:
Attacker Value
Unknown

CVE-2022-2668

Disclosure Date: August 05, 2022 (last updated October 08, 2023)
An issue was discovered in Keycloak that allows arbitrary Javascript to be uploaded for the SAML protocol mapper even if the UPLOAD_SCRIPTS feature is disabled
Attacker Value
Unknown

CVE-2022-1245

Disclosure Date: July 08, 2022 (last updated February 24, 2025)
A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
Attacker Value
Unknown

CVE-2022-1466

Disclosure Date: April 26, 2022 (last updated February 23, 2025)
Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.
Attacker Value
Unknown

CVE-2021-3461

Disclosure Date: April 01, 2022 (last updated February 23, 2025)
A flaw was found in keycloak where keycloak may fail to logout user session if the logout request comes from external SAML identity provider and Principal Type is set to Attribute [Name].
Attacker Value
Unknown

CVE-2021-20323

Disclosure Date: March 25, 2022 (last updated February 23, 2025)
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.
Attacker Value
Unknown

CVE-2021-4133

Disclosure Date: January 25, 2022 (last updated February 23, 2025)
A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.
Attacker Value
Unknown

CVE-2021-37913

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
The HGiga OAKlouds mobile portal does not filter special characters of the IPv6 Gateway parameter of the network interface card setting page. Remote attackers can use this vulnerability to perform command injection and execute arbitrary commands in the system without logging in.
0
Attacker Value
Unknown

CVE-2021-37912

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
The HGiga OAKlouds mobile portal does not filter special characters of the Ethernet number parameter of the network interface card setting page. Remote attackers can use this vulnerability to perform command injection and execute arbitrary commands in the system without logging in.
Attacker Value
Unknown

CVE-2021-3637

Disclosure Date: July 09, 2021 (last updated February 23, 2025)
A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.
Attacker Value
Unknown

CVE-2021-20195

Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.