Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-3513: Invalid Bug ID

A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.

CVE
#vulnerability

‘1953439?cve=title’ is not a valid bug number nor an alias to a bug.

Please press Back and try again.

Related news

GHSA-xv7h-95r7-595j: Incorrect implementation of lockout feature in Keycloak

A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.

RHSA-2021:3529: Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 8

New Red Hat Single Sign-On 7.4.9 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28491: jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception * CVE-2020-35509: keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity * CVE-2021-3513: keycloak: Brute force attack is possible even after the account lockout * CVE-2021-3632: keycloak: An...

RHSA-2021:3528: Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 7

New Red Hat Single Sign-On 7.4.9 packages are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28491: jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception * CVE-2020-35509: keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity * CVE-2021-3513: keycloak: Brute force attack is possible even after the account lockout * CVE-2021-3632: keycloak: An...

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907