Total vulnerabilities in the database
It was found that keycloak before version 8.0.0 exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.
Software | From | Fixed in |
---|---|---|
redhat / keycloak | - | 8.0.0 |
redhat / single_sign-on | 7.3 | 7.3.x |
redhat / jboss_enterprise_application_platform | 6.4.0 | 6.4.0.x |
redhat / jboss_enterprise_application_platform | 7.2.0 | 7.2.0.x |
redhat / jboss_fuse | 7.0.0 | 7.0.0.x |
![]() |
- | 8.0.0 |