Lookup for vulnerable packages by Package URL.
| Purl | pkg:rpm/redhat/rh-sso7-keycloak@9.0.5-1.redhat_00001.1?arch=el6sso |
| Type | rpm |
| Namespace | redhat |
| Name | rh-sso7-keycloak |
| Version | 9.0.5-1.redhat_00001.1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-f8mj-85vd-2yh5 |
| vulnerability_id |
VCID-f8mj-85vd-2yh5 |
| summary |
Allocation of Resources Without Limits or Throttling
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10758 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.67253 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.67194 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.67221 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.67234 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.67254 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.6724 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.67207 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.67241 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.67133 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00529 |
| scoring_system |
epss |
| scoring_elements |
0.6717 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10758 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10758, GHSA-52rg-hpwq-qp56
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f8mj-85vd-2yh5 |
|
| 1 |
| url |
VCID-yp87-przu-bbbg |
| vulnerability_id |
VCID-yp87-przu-bbbg |
| summary |
Improper Restriction of Rendered UI Layers or Frames in Keycloak
A vulnerability was found in all versions of Keycloak where, the pages on the Admin Console area of the application are completely missing general HTTP security headers in HTTP-responses. This does not directly lead to a security issue, yet it might aid attackers in their efforts to exploit other problems. The flaws unnecessarily make the servers more prone to Clickjacking, channel downgrade attacks and other similar client-based attack vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1728 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.32926 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.32973 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.33003 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.33006 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.32968 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.32943 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.32985 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.32963 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.32935 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.33064 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.33097 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00134 |
| scoring_system |
epss |
| scoring_elements |
0.32927 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1728 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1728 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1728 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-1728, GHSA-3gg7-9q2x-79fc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yp87-przu-bbbg |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-sso7-keycloak@9.0.5-1.redhat_00001.1%3Farch=el6sso |