Vulnerabilities > Redhat > Keycloak

DATE CVE VULNERABILITY TITLE RISK
2024-09-10 CVE-2023-6841 Unspecified vulnerability in Redhat Keycloak and Single Sign-On
A denial of service vulnerability was found in keycloak where the amount of attributes per object is not limited,an attacker by sending repeated HTTP requests could cause a resource exhaustion when the application send back rows with long attribute values.
network
low complexity
redhat
7.5
2024-09-09 CVE-2024-7260 Open Redirect vulnerability in Redhat Build of Keycloak and Keycloak
An open redirect vulnerability was found in Keycloak.
network
low complexity
redhat CWE-601
6.1
2024-09-09 CVE-2024-7341 Session Fixation vulnerability in Redhat Keycloak
A session fixation issue was discovered in the SAML adapters provided by Keycloak.
network
high complexity
redhat CWE-384
7.1
2024-09-03 CVE-2024-4629 Improper Enforcement of a Single, Unique Action vulnerability in Redhat products
A vulnerability was found in Keycloak.
network
low complexity
redhat CWE-837
6.5
2024-01-26 CVE-2023-6291 Open Redirect vulnerability in Redhat products
A flaw was found in the redirect_uri validation logic in Keycloak.
network
low complexity
redhat CWE-601
7.1
2023-12-18 CVE-2023-6927 Open Redirect vulnerability in Redhat Keycloak and Single Sign-On
A flaw was found in Keycloak.
network
low complexity
redhat CWE-601
6.1
2023-12-18 CVE-2023-48795 Improper Validation of Integrity Check Value vulnerability in multiple products
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.
5.9
2023-12-14 CVE-2023-6134 Cross-site Scripting vulnerability in Redhat products
A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token.
network
low complexity
redhat CWE-79
5.4
2023-12-14 CVE-2023-6563 Allocation of Resources Without Limits or Throttling vulnerability in Redhat products
An unconstrained memory consumption vulnerability was discovered in Keycloak.
network
low complexity
redhat CWE-770
7.7
2023-10-04 CVE-2023-2422 Improper Certificate Validation vulnerability in Redhat products
A flaw was found in Keycloak.
network
low complexity
redhat CWE-295
7.1