| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-7260 | Keycloak-core: open redirect on account page | - | - | Medium | 6.1 | 2024-09-09 18:49:59 | Deep Dive |
| CVE-2024-4629 | Keycloak: potential bypass of brute force protection | - | - | Medium | 6.5 | 2024-09-03 19:42:01 | Deep Dive |
| CVE-2024-7885 | Undertow: improper state management in proxy protocol parsing causes information leakage | - | - | High | 7.5 | 2024-08-21 14:13:37 | Deep Dive |
| CVE-2024-3653 | Undertow: learningpushhandler can lead to remote memory dos attacks | - | - | Medium | 5.3 | 2024-07-08 21:21:21 | Deep Dive |
| CVE-2024-5971 | Undertow: response write hangs in case of java 17 tlsv1.3 newsessionticket | - | - | High | 7.5 | 2024-07-08 20:51:29 | Deep Dive |
| CVE-2024-6162 | Undertow: url-encoded request path information can be broken on ajp-listener | - | - | High | 7.5 | 2024-06-20 14:33:10 | Deep Dive |
| CVE-2024-5967 | Keycloak: leak of configured ldap bind credentials through the keycloak admin console | - | - | Low | 2.7 | 2024-06-18 12:05:39 | Deep Dive |
| CVE-2024-4540 | Keycloak: exposure of sensitive information in pushed authorization requests (par) kc_restart cookie | - | - | High | 7.5 | 2024-06-03 15:33:18 | Deep Dive |
| CVE-2024-4029 | Wildfly: no timeout for eap management interface may lead to denial of service (dos) | - | - | Medium | 4.1 | 2024-05-02 14:55:27 | Deep Dive |
| CVE-2024-1102 | Jberet: jberet-core logging database credentials | - | - | Medium | 6.5 | 2024-04-25 16:24:30 | Deep Dive |
| CVE-2023-6787 | Keycloak: session hijacking via re-authentication | - | - | Medium | 6.5 | 2024-04-25 16:02:33 | Deep Dive |
| CVE-2023-6717 | Keycloak: xss via assertion consumer service url in saml post-binding flow | - | - | Medium | 6.0 | 2024-04-25 16:02:03 | Deep Dive |
| CVE-2023-6544 | Keycloak: authorization bypass | - | - | Medium | 5.4 | 2024-04-25 15:58:47 | Deep Dive |
| CVE-2023-6484 | Keycloak: log injection during webauthn authentication or registration | - | - | Medium | 5.3 | 2024-04-25 15:58:18 | Deep Dive |
| CVE-2023-3597 | Keycloak: secondary factor bypass in step-up authentication | - | - | Medium | 5.0 | 2024-04-25 12:20:12 | Deep Dive |
| CVE-2024-2419 | Keycloak: path traversal in the redirect validation | - | - | High | 7.1 | 2024-04-17 13:23:35 | Deep Dive |
| CVE-2024-1249 | Keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkloginiframe leads to ddos | - | - | High | 7.4 | 2024-04-17 13:22:48 | Deep Dive |
| CVE-2024-1132 | Keycloak: path transversal in redirection validation | - | - | High | 8.1 | 2024-04-17 13:21:19 | Deep Dive |
| CVE-2024-2700 | Quarkus-core: leak of local configuration properties into quarkus applications | - | - | High | 7.0 | 2024-04-04 13:46:40 | Deep Dive |
| CVE-2024-1300 | Io.vertx:vertx-core: memory leak when a tcp server is configured with tls and sni support | - | - | Medium | 5.4 | 2024-04-02 07:33:05 | Deep Dive |