Search for packages
purl | pkg:npm/keycloak-connect@4.0.0%2BBeta2 |
Tags | Ghost |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-pmym-rq6e-aaas
Aliases: CVE-2018-14655 GHSA-458h-wv48-fq75 |
Cross-site Scripting When using `response_mode=form_post` it is possible to inject arbitrary Javascript-Code via the `state`-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login. |
Affected by 32 other vulnerabilities. Affected by 32 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2024-09-17T22:44:09.804839+00:00 | GitLab Importer | Affected by | VCID-pmym-rq6e-aaas | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2018-14655.yml | 34.0.1 |
2024-01-03T18:05:54.458646+00:00 | GitLab Importer | Affected by | VCID-pmym-rq6e-aaas | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2018-14655.yml | 34.0.0rc1 |