Vulnerabilities in Keycloak Authentication