Back to bug 1796281
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Paramvir jindal | 2020-01-30 05:31:15 UTC | CC | security-response-team | |
| Dhananjay Arunesh | 2020-01-30 06:36:33 UTC | Summary | EMBARGOED Keycloak: A logged in user can do an account email enumeration attack | EMBARGOED CVE-2020-1717 Keycloak: A logged in user can do an account email enumeration attack |
| Alias | CVE-2020-1717 | |||
| Paramvir jindal | 2021-02-10 06:23:16 UTC | Group | security, qe_staff | |
| CC | gmalinko | |||
| Summary | EMBARGOED CVE-2020-1717 Keycloak: A logged in user can do an account email enumeration attack | CVE-2020-1717 Keycloak: A logged in user can do an account email enumeration attack | ||
| Pedro Sampaio | 2021-02-10 18:52:51 UTC | Comment | 0 | updated |
| Eric Christensen | 2021-02-16 20:30:59 UTC | Doc Text | A flaw was found in keycloak. An attacker could use the change email function in the account settings to determine if an email address was already used for another account (an account enumeration attack). The highest threat from this flaw is to data confidentiality. | |
| Red Hat Bugzilla | 2022-04-19 04:39:06 UTC | CC | ggaughan | |
| Red Hat Bugzilla | 2022-08-31 22:23:10 UTC | CC | mszynkie | |
| Red Hat Bugzilla | 2022-10-28 13:13:09 UTC | CC | krathod | |
| Red Hat Bugzilla | 2022-12-31 23:43:22 UTC | CC | aboyko | |
| Red Hat Bugzilla | 2023-05-15 18:09:27 UTC | CC | drieden | |
| Red Hat Bugzilla | 2023-07-07 08:34:20 UTC | CC | security-response-team | |
| Assignee | security-response-team | nobody |
Back to bug 1796281