Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total2
Critical0
High0
Medium1
Reset
Showing 1-2 of 2 records
Threat Entry Updated 2026-01-16

CVE-2026-0976 - Red Hat Build of Keycloak Plugin

A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker can craft requests to mask path segments, potentially bypassing proxy-level path filtering. This could expose administrative or sensitive endpoints that operators believe are not externally reachable.

PLUGIN Red Hat Build of Keycloak

CVE-2026-0976

LOW CVSS 3.7 2026-01-15
Threat Entry Updated 2026-01-08

CVE-2026-0707 - Red Hat Build of Keycloak Plugin

A flaw was found in Keycloak. The Keycloak Authorization header parser is overly permissive regarding the formatting of the "Bearer" authentication scheme. It accepts non-standard characters (such as tabs) as separators and tolerates case variations that deviate from RFC 6750 specifications.

PLUGIN Red Hat Build of Keycloak

CVE-2026-0707

MEDIUM CVSS 5.3 2026-01-08
Scroll to top