keycloak-fips vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the keycloak-fips package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Open Redirect

<23.0.4-r0
  • L
GHSA-5rxp-2rhr-qwqv

<25.0.4-r0
  • L
GHSA-cxrx-q234-m22m

<26.0.7-r1
  • H
HTTP Request Smuggling

<26.0.7-r1
  • L
GHSA-93ww-43rr-79v3

<26.0.6-r0
  • L
GHSA-jgwc-jh89-rpgq

<26.0.6-r0
  • M
Inefficient Regular Expression Complexity

<26.0.6-r0
  • L
External Control of File Name or Path

<26.0.6-r0
  • L
GHSA-5545-r4hg-rj4m

<26.0.6-r0
  • L
GHSA-v7gv-xpgf-6395

<26.0.6-r0
  • L
GHSA-wq8x-cg39-8mrr

<26.0.6-r0
  • M
Use of Hard-coded Credentials

<26.0.6-r0
  • M
HTTP Request Smuggling

<26.0.6-r0
  • L
CVE-2024-10039

<26.0.6-r0
  • H
Session Fixation

<25.0.4-r0
  • L
Information Exposure

<25.0.0-r0
  • L
GHSA-j76j-rqwj-jmvv

<25.0.4-r0
  • L
GHSA-c25h-c27q-5qpv

<25.0.0-r0
  • L
Incorrect Default Permissions

<25.0.0-r0
  • L
GHSA-gmrm-8fx4-66x7

<25.0.0-r0
  • L
GHSA-69fp-7c8p-crjr

<25.0.0-r0
  • L
CVE-2024-29857

<25.0.0-r0
  • L
GHSA-8xfc-gm6g-vgpv

<25.0.0-r0
  • L
GHSA-4h8f-2wvx-gg5w

<25.0.0-r0
  • L
CVE-2024-30172

<25.0.0-r0
  • L
CVE-2024-30171

<25.0.0-r0
  • L
GHSA-v435-xc8x-wvr9

<25.0.0-r0
  • L
CVE-2024-34447

<25.0.0-r0
  • L
GHSA-2cww-fgmg-4jqc

<25.0.0-r0
  • H
Information Exposure

<25.0.0-r0
  • L
GHSA-m44j-cfrm-g8qc

<25.0.0-r0
  • L
Improper Authorization

<24.0.3-r1
  • L
GHSA-25w4-hfqg-4r52

<24.0.3-r1
  • L
GHSA-f8h5-v2vg-46rr

<24.0.3-r1
  • L
Information Exposure Through Environmental Variables

<24.0.3-r1
  • L
Improper Authentication

<24.0.3-r0
  • L
Open Redirect

<24.0.3-r0
  • L
GHSA-mrv8-pqfj-7gp5

<24.0.3-r0
  • L
Cross-site Scripting (XSS)

<24.0.3-r0
  • L
Permissive Regular Expression

<24.0.3-r0
  • L
GHSA-4f53-xh3v-g8x4

<24.0.3-r0
  • L
GHSA-m6q9-p373-g5q8

<24.0.3-r0
  • L
GHSA-7fpj-9hr8-28vh

<24.0.3-r0
  • L
Improper Check for Dropped Privileges

<24.0.3-r0
  • L
GHSA-c9h6-v78w-52wj

<24.0.3-r0
  • L
GHSA-46c8-635v-68r2

<24.0.3-r0
  • L
GHSA-72vp-xfrc-42xm

<24.0.3-r0
  • L
Directory Traversal

<24.0.3-r0
  • L
GHSA-8rmm-gm28-pj8q

<24.0.3-r0
  • L
CVE-2024-1249

<24.0.3-r0
  • L
Improper Authentication

<24.0.3-r0
  • L
CVE-2024-29025

<24.0.3-r0
  • L
GHSA-5jpm-x58v-624v

<24.0.3-r0
  • L
Improper Input Validation

<24.0.0-r0
  • L
GHSA-jw7r-rxff-gv24

<24.0.0-r0
  • C
SQL Injection

<23.0.7-r0
  • L
GHSA-xfg6-62px-cxc2

<23.0.7-r0
  • L
GHSA-24rp-q3w6-vc56

<23.0.7-r0
  • L
GHSA-9vm7-v8wj-3fqw

<23.0.4-r0