Description
keycloak: XSS on impersonation under specific circumstances.
Moment.js: Path traversal in moment.locale.
keycloak: missing email notification template allowlist.
keycloak: minimist: prototype pollution.
moment: inefficient parsing algorithm resulting in DoS.
undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.
snakeyaml: Denial of Service due to missing nested depth limitation for collections.
loader-utils: loader-utils:Regular expression denial of service.
keycloak: Session takeover with OIDC offline refreshtokens.
keycloak: path traversal via double URL encoding.
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode.
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match.
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject.
keycloak: Client Registration endpoint does not check token revocation.
keycloak: glob-parent: Regular Expression Denial of Service.
json5: Prototype Pollution in JSON5 via Parse Method.
keycloak: keycloak: user impersonation via stolen uuid code.
snakeyaml: Constructor Deserialization Remote Code Execution.
CXF: Apache CXF: SSRF Vulnerability.
rcue-bootstrap: bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip.
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos.
sshd-common: mina-sshd: Java unsafe deserialization vulnerability.
jettison: memory exhaustion via user-supplied XML or JSON data.
jettison: parser crash by stackoverflow.
jackson-databind: use of deeply nested arrays.
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS.
jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method.
jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution.
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute.
jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection.
CXF: Apache CXF: directory listing / code exfiltration.
keycloak: reflected XSS attack.