Redhat Security Vulnerabilities (CVEs)

Track 308 security vulnerabilities affecting Redhat products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

37 Critical
226 High
45 Medium
🔔 Get Alerts for Redhat
CVE-2026-3118 6.5

An authenticated user can inject malicious input into GraphQL queries in Red Hat Developer Hub's Orchestrator Plugin, causing the entire Backstage app...

Feb 25, 2026
CVE-2026-26103 7.1

A local privilege escalation vulnerability in udisks allows unprivileged users to trigger the root-owned daemon to overwrite LUKS encryption headers. ...

Feb 25, 2026
CVE-2026-1709 9.4

Keylime versions 7.12.0 and later have a critical authentication bypass vulnerability where the registrar fails to enforce client-side TLS certificate...

Feb 6, 2026
CVE-2025-14874 7.5

A denial-of-service vulnerability in Nodemailer allows attackers to crash email-sending applications by sending specially crafted email addresses that...

Dec 18, 2025
CVE-2025-14512 6.5

This vulnerability in GLib's GIO component allows heap buffer overflow and denial-of-service via integer overflow when processing malicious file attri...

Dec 11, 2025
CVE-2025-14087 5.6

A buffer-underflow vulnerability in GLib's GVariant parser allows remote attackers to cause heap corruption by sending maliciously crafted input strin...

Dec 10, 2025
CVE-2025-14010 5.5

A vulnerability in ansible-collection-community-general exposes plaintext passwords in verbose output when running Ansible with debug modes. Attackers...

Dec 4, 2025
CVE-2025-13601 7.7

A heap-based buffer overflow vulnerability in glib's g_escape_uri_string() function allows attackers to write beyond allocated memory boundaries when ...

Nov 26, 2025
CVE-2024-47866 7.5

This vulnerability in Ceph's RGW (RADOS Gateway) allows attackers to cause a denial-of-service by sending a specific S3 API request with an empty stri...

Nov 12, 2025
CVE-2025-9784 7.5

This vulnerability in Undertow allows malicious clients to send malformed requests that trigger server-side stream resets without incrementing abuse c...

Sep 2, 2025
CVE-2025-7784 6.5

A privilege escalation vulnerability in Keycloak allows administrative users with the manage-users role to elevate their privileges to realm-admin whe...

Jul 18, 2025
CVE-2025-7424 7.5

A type confusion vulnerability in libxslt's psvi memory field allows attackers to crash applications or corrupt memory during XML transformations. Thi...

Jul 10, 2025
CVE-2025-32990 6.5

This CVE describes a heap-buffer-overflow vulnerability in GnuTLS's certtool utility when parsing template files. An attacker can trigger memory corru...

Jul 10, 2025
CVE-2025-32989 5.3

A heap-buffer-overread vulnerability in GnuTLS allows attackers to create malicious certificates with malformed Certificate Transparency extensions th...

Jul 10, 2025
CVE-2025-5372 5.0

A vulnerability in libssh versions built with OpenSSL <3.0 causes the ssh_kdf() function to incorrectly report successful key derivation when it actua...

Jul 4, 2025
CVE-2025-6920 5.3

CVE-2025-6920 is an authentication bypass vulnerability in ai-inference-server's model inference API. The POST /invocations endpoint fails to validate...

Jul 1, 2025
CVE-2025-32463 9.3

This vulnerability in Sudo allows local users to escalate privileges to root by exploiting the --chroot option to load a malicious /etc/nsswitch.conf ...

Jun 30, 2025
CVE-2025-5731 5.5

This vulnerability in Infinispan CLI exposes sensitive passwords in error messages when commands fail. Attackers could potentially capture passwords b...

Jun 26, 2025
CVE-2025-5318 8.1

This vulnerability in libssh allows an authenticated remote attacker to trigger an out-of-bounds read in the sftp_handle function, potentially exposin...

Jun 24, 2025
CVE-2025-6021 7.5

This CVE describes an integer overflow vulnerability in libxml2's xmlBuildQName function that can cause stack-based buffer overflow when processing ma...

Jun 12, 2025
CVE-2025-5914 7.8

This CVE describes an integer overflow vulnerability in libarchive's RAR handling function that leads to a double-free condition. Attackers can exploi...

Jun 9, 2025
CVE-2025-4598 4.7

This vulnerability in systemd-coredump allows attackers to exploit a race condition to access privileged process coredumps. By forcing a SUID process ...

May 30, 2025
CVE-2024-4981 7.6

This vulnerability in Pagure server allows authenticated malicious users to create symbolic links in git repositories that expose files outside the re...

May 12, 2025
CVE-2025-4374 6.5

A privilege escalation vulnerability in Quay container registry allows users or robots to gain administrative permissions on newly created repositorie...

May 6, 2025
CVE-2025-46399 5.5

A NULL pointer dereference vulnerability exists in fig2dev's genge_itp_spline function, allowing local attackers to cause denial of service through in...

Apr 23, 2025
CVE-2025-46397 7.8

A buffer overflow vulnerability in xfig's bezier_spline function allows local attackers to execute arbitrary code by manipulating input. This affects ...

Apr 23, 2025
CVE-2025-3155 7.4

CVE-2025-3155 is a vulnerability in Yelp (the GNOME help application) that allows malicious help documents to execute arbitrary scripts. This could en...

Apr 3, 2025
CVE-2025-2784 7.0

CVE-2025-2784 is a heap buffer over-read vulnerability in libsoup's skip_insight_whitespace() function. When processing a malicious HTTP response, lib...

Apr 3, 2025
CVE-2025-23368 8.1

This vulnerability in WildFly Elytron integration allows attackers to perform brute force attacks against CLI authentication due to insufficient rate ...

Mar 4, 2025
CVE-2025-0678 7.8

A heap-based buffer overflow vulnerability in grub2's squash4 filesystem module allows attackers to execute arbitrary code by crafting malicious files...

Mar 3, 2025
CVE-2024-45778 4.1

A stack overflow vulnerability in GRUB2's BFS filesystem parser allows an attacker to crash the bootloader by providing a specially crafted BFS filesy...

Mar 3, 2025
CVE-2024-45782 7.8

This vulnerability in the HFS filesystem driver allows attackers to trigger a heap-based buffer overflow by providing a specially crafted volume name....

Mar 3, 2025
CVE-2025-1755 7.5

MongoDB Compass versions before 1.42.1 are vulnerable to local privilege escalation when a malicious file is placed in the C:\node_modules\ directory....

Feb 27, 2025
CVE-2025-1756 7.5

MongoDB Shell (mongosh) versions before 2.3.0 are vulnerable to local privilege escalation when a malicious file is placed in C:\node_modules\. This a...

Feb 27, 2025
CVE-2025-26599 7.8

This CVE describes an uninitialized pointer vulnerability in X.Org and Xwayland display servers. When compCheckRedirect() fails to allocate a backing ...

Feb 25, 2025
CVE-2025-26600 7.8

A use-after-free vulnerability in X.Org and Xwayland allows attackers to potentially execute arbitrary code or cause denial of service when a device i...

Feb 25, 2025
CVE-2025-26601 7.8

A use-after-free vulnerability in X.Org and Xwayland allows attackers to potentially execute arbitrary code or cause denial of service. This affects s...

Feb 25, 2025
CVE-2025-26594 7.8

A use-after-free vulnerability in X.Org and Xwayland allows attackers to potentially crash the X server or execute arbitrary code by freeing the root ...

Feb 25, 2025
CVE-2025-26595 7.8

A stack-based buffer overflow vulnerability in X.Org and Xwayland allows attackers to execute arbitrary code or cause denial of service. This affects ...

Feb 25, 2025
CVE-2025-26596 7.8

A heap buffer overflow vulnerability in X.Org and Xwayland allows attackers to write beyond allocated memory boundaries. This affects systems using X1...

Feb 25, 2025
CVE-2025-26597 7.8

A buffer overflow vulnerability in X.Org and Xwayland allows attackers to execute arbitrary code or cause denial of service by exploiting improper mem...

Feb 25, 2025
CVE-2025-26598 7.8

This CVE describes an out-of-bounds write vulnerability in X.Org and Xwayland where the GetBarrierDevice() function incorrectly returns the last eleme...

Feb 25, 2025
CVE-2024-45777 6.7

This vulnerability in grub2 allows attackers to trigger an out-of-bounds write when processing language files, potentially overwriting sensitive heap ...

Feb 19, 2025
CVE-2025-26465 6.8

This OpenSSH vulnerability allows machine-in-the-middle attacks when VerifyHostKeyDNS is enabled. Attackers can impersonate legitimate servers by expl...

Feb 18, 2025
CVE-2025-23367 6.5

This vulnerability allows users with Monitor or Auditor roles in Wildfly Server to suspend or resume the server despite having only read permissions. ...

Jan 30, 2025
CVE-2025-23366 6.5

This CVE describes a cross-site scripting (XSS) vulnerability in the HAL Console of Wildfly's management interface. Authenticated users with SuperUser...

Jan 14, 2025
CVE-2024-12085 7.5

This vulnerability in rsync allows attackers to leak uninitialized stack memory one byte at a time by manipulating checksum length during file compari...

Jan 14, 2025
CVE-2024-12086 6.1

This rsync vulnerability allows a malicious server to read arbitrary files from a client's machine during file transfer operations. Attackers can reco...

Jan 14, 2025
CVE-2024-12088 6.5

A path traversal vulnerability in rsync's --safe-links option allows attackers to write files outside intended directories when the client fails to pr...

Jan 14, 2025
CVE-2024-49394 5.3

This vulnerability in mutt and neomutt email clients allows attackers to reuse signed but unencrypted email messages by manipulating the In-Reply-To h...

Nov 12, 2024

Why Monitor Redhat Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 308+ known vulnerabilities affecting Redhat products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Redhat packages in under 60 seconds. No agents required - completely agentless scanning that works across Redhat deployments.

Free vulnerability database: Access detailed information about every Redhat CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Redhat CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Redhat CVEs Free