Red Hat Upstream Vulnerabilities
Red%20hat Upstream vulnerabilities.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Bypass of Redirect URI Validation in Keycloak May Lead to Access Token Theft
CVE-2024-2419Red HatUpstream7.1HIGHVulnerability in 3Scale and Keycloak 15 (or RHSSO 7.5.0) Allows for Unauthorized Access to Tokens
CVE-2024-0560Red HatUpstreamQuarkus: potential invalid reuse of context when @cacheresult on a uni is used
CVE-2023-6393Red Hatupstream5.3MEDIUM3scale-admin-portal: logged out users tokens can be accessed
CVE-2023-4910Red Hatupstream5.5MEDIUM
17 April 2024
28 February 2024
6 December 2023
6 November 2023
No more vulnerabilities to load.