{"vulnerability": "CVE-2024-10973", "sightings": [{"uuid": "001ed091-17d3-401a-bf1d-300f210b439f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10973", "type": "seen", "source": "https://t.me/cvedetector/13143", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10973 - Keycloak JGroups Plain Text Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-10973 \nPublished : Dec. 17, 2024, 11:15 p.m. | 43\u00a0minutes ago \nDescription : A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T01:08:51.000000Z"}, {"uuid": "20d090cf-4d60-44df-9971-f14380322710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10973", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113670670595620844", "content": "", "creation_timestamp": "2024-12-17T23:06:25.654758Z"}]}