Lookup for vulnerable packages by Package URL.
| Purl | pkg:rpm/redhat/rh-sso7-keycloak@3.4.14-1.Final_redhat_00001.1.jbcs?arch=el7 |
| Type | rpm |
| Namespace | redhat |
| Name | rh-sso7-keycloak |
| Version | 3.4.14-1.Final_redhat_00001.1.jbcs |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-78nt-79j3-k3fh |
| vulnerability_id |
VCID-78nt-79j3-k3fh |
| summary |
Cross-site Scripting
When using `response_mode=form_post` it is possible to inject arbitrary Javascript-Code via the `state`-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14655 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44671 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.4465 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.4472 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44684 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44701 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44728 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44672 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44593 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44673 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44694 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44631 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44682 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14655 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14655, GHSA-458h-wv48-fq75
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-78nt-79j3-k3fh |
|
| 1 |
| url |
VCID-evqq-d8uz-9be1 |
| vulnerability_id |
VCID-evqq-d8uz-9be1 |
| summary |
Improper Authentication
When TOPT enabled, an improper implementation of the Brute Force detection algorithm will not enforce its protection measures. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14657 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.5855 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58528 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58534 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58551 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58532 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58512 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58545 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58399 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58485 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58505 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14657 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14657, GHSA-85v8-vx4w-q684
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-evqq-d8uz-9be1 |
|
| 2 |
| url |
VCID-hgu6-1a6g-13bw |
| vulnerability_id |
VCID-hgu6-1a6g-13bw |
| summary |
The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14637 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48527 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48539 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48512 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48525 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48575 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.4857 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48455 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48492 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48514 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48467 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48521 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00252 |
| scoring_system |
epss |
| scoring_elements |
0.48517 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14637 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14637, GHSA-gf2j-7qwg-4f5x
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hgu6-1a6g-13bw |
|
| 3 |
| url |
VCID-qexf-7axp-9kas |
| vulnerability_id |
VCID-qexf-7axp-9kas |
| summary |
Improper Certificate Validation
It was found that SAML authentication in Keycloak incorrectly authenticated expired certificates. A malicious user could use this to access unauthorized data or possibly conduct further attacks. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10894 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17237 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17084 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1705 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17107 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17089 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1718 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17215 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17167 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17088 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1726 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1731 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10894 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10894, GHSA-xvv8-8wh9-9fh2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qexf-7axp-9kas |
|
| 4 |
| url |
VCID-vnp3-9ddj-qfa2 |
| vulnerability_id |
VCID-vnp3-9ddj-qfa2 |
| summary |
A flaw was found in JBOSS Keycloak 3.2.1.Final. The Redirect URL for both Login and Logout are not normalized in org.keycloak.protocol.oidc.utils.RedirectUtils before the redirect url is verified. This can lead to an Open Redirection attack |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14658 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47069 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47064 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47088 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47062 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47125 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.4712 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47009 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47046 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47066 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47013 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47068 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14658 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14658, GHSA-3qh2-mccc-q5m6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vnp3-9ddj-qfa2 |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-sso7-keycloak@3.4.14-1.Final_redhat_00001.1.jbcs%3Farch=el7 |