Vulnerabilities > Redhat > Keycloak > Medium

DATE CVE VULNERABILITY TITLE RISK
2019-06-12 CVE-2019-3875 Improper Certificate Validation vulnerability in Redhat Keycloak and Single Sign-On
A vulnerability was found in keycloak before 6.0.2.
network
high complexity
redhat CWE-295
4.8
2019-06-12 CVE-2019-10157 Improper Authentication vulnerability in Redhat Keycloak and Single Sign-On
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout .
local
low complexity
redhat CWE-287
5.5
2018-11-13 CVE-2018-14658 Open Redirect vulnerability in Redhat Keycloak 3.2.1
A flaw was found in JBOSS Keycloak 3.2.1.Final.
network
low complexity
redhat CWE-601
6.1
2018-11-13 CVE-2018-14655 Cross-site Scripting vulnerability in Redhat Keycloak and Single Sign-On
A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final.
network
low complexity
redhat CWE-79
5.4
2018-08-01 CVE-2018-10894 Improper Certificate Validation vulnerability in Redhat Keycloak and Single Sign-On
It was found that SAML authentication in Keycloak 3.4.3.Final incorrectly authenticated expired certificates.
network
low complexity
redhat CWE-295
5.4
2018-07-26 CVE-2017-2582 Information Exposure vulnerability in Redhat Keycloak
It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property.
network
low complexity
redhat CWE-200
6.5
2018-07-23 CVE-2018-10912 Infinite Loop vulnerability in Redhat Keycloak
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement.
network
low complexity
redhat CWE-835
4.9
2018-05-11 CVE-2016-8627 Resource Exhaustion vulnerability in Redhat Jboss Enterprise Application Platform and Keycloak
admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks.
network
low complexity
redhat CWE-400
6.5
2018-03-12 CVE-2017-2585 Information Exposure vulnerability in Redhat Keycloak
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
network
high complexity
redhat CWE-200
5.9
2018-03-12 CVE-2016-8629 Permissions, Privileges, and Access Controls vulnerability in Redhat Keycloak
Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server.
network
low complexity
redhat CWE-264
6.5