Redhat Security Vulnerabilities (CVEs)
Track 312 security vulnerabilities affecting Redhat products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability allows attackers to bypass Hibernate Validator's SafeHtml validation by omitting tag endings with less-than characters. This enable...
Nov 7, 2024CVE-2024-10295 is an authentication bypass vulnerability in APICast (Red Hat 3scale API Gateway) where malformed Basic Authentication headers with spe...
Oct 24, 2024This CVE describes a denial-of-service vulnerability in OpenShift's GraphQL batching functionality. Attackers can send requests containing thousands o...
Oct 22, 2024A cross-site scripting (XSS) vulnerability exists in aap-gateway that allows attackers to inject malicious scripts via the '?next=' URL parameter. Thi...
Oct 16, 2024A symlink traversal vulnerability in the containers/storage library used by Podman, Buildah, and CRI-O allows malicious container images to cause deni...
Oct 15, 2024This CVE describes an authentication bypass vulnerability in 3Scale where unauthorized users can access PDF invoices of Developer users by knowing or ...
Oct 9, 2024This vulnerability in Buildah allows attackers to bypass path validation in cache mounts, enabling arbitrary host directory access during container bu...
Oct 9, 2024This vulnerability in Go's containers/common library allows attackers to exploit symbolic links when FIPS mode is enabled, potentially mounting sensit...
Oct 1, 2024A vulnerability in QEMU's USB endpoint handling allows unprivileged guest users to trigger an assertion failure, crashing the QEMU process on the host...
Sep 19, 2024This CVE describes a denial-of-service vulnerability in Keycloak where attackers can send repeated HTTP requests with excessive attributes, causing re...
Sep 10, 2024CVE-2024-7260 is an open redirect vulnerability in Keycloak that allows attackers to craft malicious URLs that appear to be legitimate Keycloak pages ...
Sep 9, 2024This CVE describes a session fixation vulnerability in Keycloak's SAML adapters where session IDs aren't regenerated during login, even when configure...
Sep 9, 2024An authentication bypass vulnerability in Foreman with External Authentication allows attackers to gain administrative access by exploiting Apache mod...
Sep 4, 2024A buffer handling vulnerability in OpenSC and related components allows attackers to access uninitialized memory via crafted USB devices or smart card...
Sep 3, 2024CVE-2024-8285 is a TLS hostname verification bypass vulnerability in Kroxylicious that allows man-in-the-middle attackers to intercept and manipulate ...
Aug 30, 2024This vulnerability in Red Hat OpenStack Platform director allows attackers to deploy compromised container images by disabling TLS certificate verific...
Aug 21, 2024A buffer overflow vulnerability exists in FRRouting (FRR) BGP daemon where bgp_attr_encap function fails to validate stream length before processing T...
Aug 19, 2024This vulnerability in OpenShift AI allows attackers to bypass authentication and escalate privileges across AI models within the same namespace. By us...
Aug 12, 2024This vulnerability in Podman allows attackers to create malicious containers that exhaust system memory through IPC resource exhaustion. When containe...
Aug 2, 2024CVE-2024-6535 is an authentication bypass vulnerability in Skupper's console when configured with OpenShift OAuth. Attackers can craft malicious cooki...
Jul 17, 2024CVE-2024-6237 is a denial-of-service vulnerability in 389 Directory Server where an unauthenticated attacker can crash the server by sending a specifi...
Jul 9, 2024A heap overflow vulnerability in QEMU's virtio-net device allows privileged guest users to crash the host QEMU process by manipulating RSS indirection...
Jul 5, 2024A vulnerability in Poppler's Pdfinfo utility allows attackers to cause denial of service by crashing the application when using the -dests parameter w...
Jun 21, 2024This vulnerability in Quay allows attackers who obtain an application's client ID to use OAuth tokens for authentication, potentially accessing applic...
Jun 12, 2024This vulnerability in GNU Nano allows local privilege escalation through insecure temporary file handling. When Nano is killed during editing, it crea...
Jun 12, 2024This FreeIPA vulnerability allows attackers who compromise a principal to obtain encrypted Kerberos tickets and salts, enabling offline brute-force at...
Jun 12, 2024This vulnerability in Booth cluster ticket manager allows an attacker to bypass HMAC validation by providing a specially-crafted hash to gcry_md_get_a...
Jun 6, 2024This vulnerability in OpenShift's Telemeter allows attackers to bypass JWT authentication by using forged tokens that evade issuer validation checks. ...
Jun 5, 2024This vulnerability allows stored cross-site scripting (XSS) attacks in the Katello plugin for Foreman. Attackers can inject malicious JavaScript into ...
Jun 5, 2024CVE-2024-3622 is a vulnerability in mirror-registry for Quay installations where a default secret is stored in plain text in configuration files. This...
Apr 25, 2024A race condition in SSSD (System Security Services Daemon) causes inconsistent application of Group Policy Object (GPO) policies for authenticated use...
Apr 18, 2024This vulnerability in Keycloak allows attackers to bypass URL validation in redirects when clients use wildcards in Valid Redirect URIs. Attackers can...
Apr 17, 2024A double-free vulnerability in libdwarf allows memory corruption when processing specially crafted DWARF debugging information files. This could lead ...
Mar 18, 2024This CVE allows any local process to modify Unbound DNS resolver's runtime configuration via port 8953 due to incorrect default permissions. Attackers...
Feb 15, 2024CVE-2023-50387 (KeyTrap) is a DNSSEC protocol vulnerability that allows remote attackers to cause denial of service by exhausting CPU resources throug...
Feb 14, 2024This vulnerability in the X.Org server allows out-of-bounds memory access when a frozen device is reattached to a different master device. It can lead...
Feb 9, 2024This vulnerability in m2crypto allows attackers to decrypt TLS communications that use RSA key exchanges, potentially exposing sensitive data transmit...
Feb 5, 2024This vulnerability in Keycloak's redirect_uri validation logic allows attackers to bypass host restrictions and steal access tokens. Attackers can the...
Jan 26, 2024A use-after-free vulnerability in the Linux kernel's Unix domain socket garbage collector allows local attackers to potentially escalate privileges or...
Jan 21, 2024This vulnerability in X.Org server's cursor code allows memory corruption by using incorrect private types in Xephyr and Xwayland, potentially leading...
Jan 18, 2024This vulnerability in X.Org server allows heap overflow when button mapping exceeds allocated memory space. Attackers could exploit this to execute ar...
Jan 18, 2024This CVE describes an out-of-bounds memory write vulnerability in the Linux kernel's TLS implementation when using splice() with ktls sockets. A local...
Jan 17, 2024A use-after-free vulnerability in the Linux kernel's writeback subsystem allows attackers to potentially crash the system or execute arbitrary code wi...
Jan 15, 2024A use-after-free vulnerability in the Linux kernel's netfilter subsystem allows local unprivileged users with CAP_NET_ADMIN capability to escalate pri...
Jan 2, 2024This CVE describes a potential row hammer attack vulnerability in OpenSSH that could allow authentication bypass. An attacker with physical access to ...
Dec 24, 2023This CVE describes a race condition vulnerability in the Linux kernel's GSM 0710 tty multiplexor. It allows a local unprivileged user to trigger a use...
Dec 21, 2023This vulnerability in Infinispan exposes credentials in clear text when cache configurations containing sensitive data (like JDBC or remote store cred...
Dec 18, 2023This vulnerability in Perl allows an attacker to trigger a heap buffer overflow by providing a malicious regular expression. Systems running affected ...
Dec 18, 2023An unconstrained memory consumption vulnerability in Keycloak allows attackers to cause denial of service by triggering excessive resource usage when ...
Dec 14, 2023This vulnerability in xorg-server allows out-of-bounds memory reads and writes when querying or changing XKB button actions, such as switching from to...
Dec 13, 2023Why Monitor Redhat Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 312+ known vulnerabilities affecting Redhat products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Redhat packages in under 60 seconds. No agents required - completely agentless scanning that works across Redhat deployments.
Free vulnerability database: Access detailed information about every Redhat CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Redhat CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions