Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

KeyCloak — Vulnerabilities & Security Advisories 88

All 88 CVE vulnerabilities found in KeyCloak, with AI-generated Chinese analysis, references, and POCs.

This page provides vulnerability aggregation data for KeyCloak, an open-source identity and access management solution developed by Red Hat. It collects security weaknesses and common vulnerability exposures associated with this specific vendor and product line. The resource covers vulnerabilities identified over the last five years, offering a historical perspective on security incidents and patches released for the platform. Users can discover a comprehensive timeline of advisory announcements, allowing them to track how Red Hat has responded to emerging threats in recent months and years. The page enables readers to understand specific weakness classes affecting KeyCloak, such as authentication bypasses, privilege escalations, and cross-site scripting issues. By examining aggregated records, analysts can look up a product’s vulnerability history to assess risk trends and remediation timelines. This data supports security teams in evaluating the overall security posture of their KeyCloak deployments without needing to search multiple disparate sources. The information is structured to facilitate rapid analysis of critical vulnerabilities and their corresponding fix versions. It helps organizations prioritize patching efforts by highlighting the frequency and severity of reported issues. Readers interested in compliance, audit trails, or incident response planning will find this aggregation useful for understanding past security failures. The content is derived from official vendor advisories and widely recognized vulnerability databases. It does not include speculative or unverified reports, ensuring the integrity of the historical record. This page serves as a centralized reference point for anyone monitoring the security evolution of KeyCloak.

Vendor: JBoss

CVE IDTitleCVSSSeverityPublished
CVE-2020-1744 Red Hat Keycloak 信息泄露漏洞 CWE-755 5.6 Medium2020-03-24
CVE-2020-1731 Red Hat Keycloak operator 安全漏洞 CWE-341 9.1 Critical2020-03-02
CVE-2020-1697 Red Hat Keycloak 跨站脚本漏洞 CWE-79 6.1 Medium2020-02-10
CVE-2019-14820 Red Hat Keycloak 信息泄露漏洞 CWE-200 7.5 -2020-01-08
CVE-2019-14837 Red Hat Keycloak 安全漏洞 CWE-547 8.1 -2020-01-07
CVE-2019-14910 Red Hat Keycloak 授权问题漏洞 CWE-287 9.8 -2019-12-05
CVE-2019-14909 Red Hat Keycloak 授权问题漏洞 CWE-287 8.6 -2019-12-04
CVE-2014-3655 Red Hat Keycloak 跨站请求伪造漏洞 6.5 -2019-11-13
CVE-2019-10201 Red Hat Keycloak 授权问题漏洞 CWE-592 8.1 -2019-08-14
CVE-2019-10199 红帽 Red Hat Keycloak 跨站请求伪造漏洞 CWE-352 8.8 -2019-08-14
CVE-2019-3875 Red Hat Keycloak 信任管理问题漏洞 CWE-345 6.5 -2019-06-12
CVE-2019-10157 Red Hat Keycloak Node.js adapter 授权问题漏洞 CWE-345 5.5 -2019-06-12
CVE-2019-3868 Red Hat Keycloak 信息泄露漏洞 CWE-200 3.8 -2019-04-24
CVE-2018-14637 Red Hat keycloak 安全漏洞 CWE-287 5.9 -2018-11-30
CVE-2018-14658 Red Hat JBoss KeyCloak 安全漏洞 CWE-601 6.1 -2018-11-13
CVE-2018-14657 Red Hat Keycloak 安全特征问题漏洞 CWE-307 9.4 -2018-11-13
CVE-2018-14655 Red Hat Keycloak 跨站脚本漏洞 CWE-79 5.4 -2018-11-13
CVE-2016-8609 Red Hat keycloak 授权问题漏洞 CWE-384 8.8 -2018-08-01
CVE-2018-10894 Red Hat Keycloak 安全漏洞 CWE-345 8.1 -2018-08-01
CVE-2017-2646 Red Hat keycloak 安全漏洞 CWE-835 7.5 -2018-07-27
CVE-2017-2582 Red Hat Picketlink和KeyCloak 信息泄露漏洞 CWE-201 7.5 -2018-07-26
CVE-2018-10912 Red Hat keycloak 安全漏洞 CWE-835 4.9 -2018-07-23
CVE-2017-2585 Red Hat Keycloak 信息泄露漏洞 5.9 -2018-03-12
CVE-2016-8629 Red Hat Keycloak 权限许可和访问控制漏洞 CWE-284 7.1 -2018-03-12
CVE-2017-12161 Red Hat keycloak 安全漏洞 CWE-602 8.8 -2018-02-21
CVE-2017-12160 Keycloak oauth 安全漏洞 CWE-285 7.2 -2017-10-26
CVE-2017-12159 Red Hat Keycloak 安全漏洞 CWE-613 6.5 -2017-10-26
CVE-2017-12158 Red Hat Keycloak 跨站脚本漏洞 CWE-444 5.4 -2017-10-26

All 88 known CVE vulnerabilities affecting KeyCloak with full Chinese analysis, references, and POCs where available.