Redhat Security Vulnerabilities (CVEs)

Track 320 security vulnerabilities affecting Redhat products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

39 Critical
236 High
45 Medium
🔔 Get Alerts for Redhat
CVE-2021-40153 8.1

This vulnerability in Squashfs-Tools allows directory traversal attacks during archive extraction. Attackers can craft malicious squashfs archives tha...

Aug 27, 2021
CVE-2021-20314 9.8

A stack buffer overflow vulnerability in libspf2 versions below 1.2.11 allows attackers to cause denial of service or potentially execute arbitrary co...

Aug 12, 2021
CVE-2021-38160 7.8

This vulnerability in the Linux kernel's virtio_console driver allows an untrusted virtual device to supply a buffer length value exceeding the actual...

Aug 7, 2021
CVE-2021-3580 7.5

CVE-2021-3580 is a vulnerability in nettle's RSA decryption functions where specially crafted ciphertext can cause application crashes and denial of s...

Aug 5, 2021
CVE-2021-3682 8.5

This vulnerability in QEMU's USB redirector device emulation allows a malicious SPICE client to trigger a heap corruption when packet queues fill duri...

Aug 5, 2021
CVE-2021-3612 7.8

A local privilege escalation vulnerability in Linux kernel versions before 5.9-rc1 allows attackers with local access to crash systems or gain root pr...

Jul 9, 2021
CVE-2021-3570 8.8

A buffer overflow vulnerability in the ptp4l program of the linuxptp package allows remote attackers to leak information, crash systems, or potentiall...

Jul 9, 2021
CVE-2020-25716 8.1

CVE-2020-25716 is a privilege escalation vulnerability in CloudForms where users with specific group permissions can perform administrator-only action...

Jun 7, 2021
CVE-2020-1742 7.0

This vulnerability allows attackers with access to containers using nmstate/kubernetes-nmstate-handler to modify the /etc/passwd file and escalate pri...

Jun 7, 2021
CVE-2020-35514 7.0

This vulnerability allows attackers with access to a container mounting /etc/kubernetes or local node access to copy the kubeconfig file and potential...

Jun 2, 2021
CVE-2020-14380 7.5

This vulnerability allows attackers with valid external authentication (SSO or OpenID) to impersonate existing local users in Red Hat Satellite, gaini...

Jun 2, 2021
CVE-2020-14326 7.5

CVE-2020-14326 is a denial-of-service vulnerability in RESTEasy's RootNode caching mechanism that allows attackers to cause hash flooding, resulting i...

Jun 2, 2021
CVE-2020-10771 7.1

CVE-2020-10771 is a CSRF vulnerability in Infinispan 10 that allows attackers to perform unauthorized actions via GET requests. This affects systems r...

Jun 2, 2021
CVE-2021-3412 7.3

CVE-2021-3412 is a brute force vulnerability in all versions of 3Scale developer portal that lacks login attempt protections. Attackers can exploit th...

Jun 1, 2021
CVE-2021-3516 7.8

CVE-2021-3516 is a use-after-free vulnerability in libxml2's xmllint tool that allows attackers to execute arbitrary code or cause denial of service b...

Jun 1, 2021
CVE-2020-25710 7.5

CVE-2020-25710 is an assertion failure vulnerability in OpenLDAP's csnNormalize23() function that allows remote attackers to crash the LDAP service by...

May 28, 2021
CVE-2021-20195 9.6

This vulnerability in Keycloak allows attackers to execute cross-site scripting (XSS) attacks that can lead to complete account takeover. The flaw exi...

May 28, 2021
CVE-2021-20236 9.8

A stack buffer overflow vulnerability in ZeroMQ servers before version 4.3.3 allows malicious clients to execute arbitrary code or crash the server by...

May 28, 2021
CVE-2020-10709 7.1

This vulnerability in Ansible Tower allows attackers to obtain non-expiring OAuth2 refresh tokens when requesting authentication tokens. Any user who ...

May 27, 2021
CVE-2020-27832 9.0

CVE-2020-27832 is a persistent cross-site scripting (XSS) vulnerability in Red Hat Quay that allows attackers to inject malicious scripts into reposit...

May 27, 2021
CVE-2018-10865 7.5

CVE-2018-10865 is an authorization bypass vulnerability in Red Hat Certification 7 that allows unauthenticated users to trigger restart operations on ...

May 26, 2021
CVE-2018-10866 9.1

CVE-2018-10866 is an authorization bypass vulnerability in Red Hat Certification 7 that allows unauthenticated attackers to delete system XML files co...

May 26, 2021
CVE-2018-10867 9.1

This vulnerability in the redhat-certification 7 package allows unrestricted file access via the /update/results page, enabling attackers to delete an...

May 26, 2021
CVE-2019-14836 8.8

CVE-2019-14836 is a Cross-Site Request Forgery (CSRF) vulnerability in the 3scale developer portal login mechanism. This allows attackers to trick aut...

May 26, 2021
CVE-2018-25009 9.1

A heap-based buffer overflow vulnerability in libwebp's GetLE16() function allows attackers to execute arbitrary code or cause denial of service. This...

May 21, 2021
CVE-2018-25011 9.8

A heap-based buffer overflow vulnerability in libwebp's PutLE16() function allows attackers to execute arbitrary code or cause denial of service. This...

May 21, 2021
CVE-2018-25012 9.1

A heap-based buffer overflow vulnerability in libwebp's GetLE24() function allows attackers to execute arbitrary code or cause denial of service by pr...

May 21, 2021
CVE-2018-25014 9.8

CVE-2018-25014 is a use-after-free vulnerability in libwebp's ReadSymbol() function that allows attackers to execute arbitrary code or cause denial of...

May 21, 2021
CVE-2020-36329 9.8

CVE-2020-36329 is a use-after-free vulnerability in libwebp that allows attackers to execute arbitrary code or cause denial of service. This affects a...

May 21, 2021
CVE-2020-36330 9.1

CVE-2020-36330 is an out-of-bounds read vulnerability in libwebp versions before 1.0.1, allowing attackers to read sensitive memory data or cause deni...

May 21, 2021
CVE-2020-36332 7.5

CVE-2020-36332 is a memory exhaustion vulnerability in libwebp library versions before 1.0.1. When processing specially crafted WebP images, libwebp a...

May 21, 2021
CVE-2021-3445 7.5

This vulnerability in libdnf allows attackers to execute arbitrary code by modifying RPM package headers and tricking users into installing them. It a...

May 19, 2021
CVE-2021-3518 8.8

A use-after-free vulnerability in libxml2 versions before 2.9.11 allows attackers to submit crafted XML files to applications using this library, pote...

May 18, 2021
CVE-2020-25709 7.5

CVE-2020-25709 is an assertion failure vulnerability in OpenLDAP's slapd server that allows remote attackers to crash the service by sending specially...

May 18, 2021
CVE-2021-3528 8.8

This vulnerability allows attackers with access to log files to steal internal authentication tokens used between the noobaa operator and core compone...

May 13, 2021
CVE-2021-31918 7.5

This vulnerability exposes Ansible log files to all users during OpenStack stack operations, potentially revealing sensitive configuration data and cr...

May 6, 2021
CVE-2021-3501 7.1

This vulnerability in the Linux kernel's KVM API allows a user process to trigger an out-of-bounds write by manipulating the internal.ndata value. It ...

May 6, 2021
CVE-2021-3472 7.8

CVE-2021-3472 is an integer underflow vulnerability in xorg-x11-server that allows local attackers to escalate privileges on affected systems. This fl...

Apr 26, 2021
CVE-2021-3497 7.8

This vulnerability in GStreamer's Matroska demuxer allows attackers to trigger use-after-free conditions by processing specially crafted media files. ...

Apr 19, 2021
CVE-2021-20288 7.2

This CVE-2021-20288 vulnerability in Ceph allows attackers to reuse authentication keys by exploiting improper sanitization of other_keys during CEPHX...

Apr 15, 2021
CVE-2021-20305 8.1

This vulnerability in Nettle cryptographic library allows attackers to forge digital signatures by exploiting incorrect elliptic curve multiplication ...

Apr 5, 2021
CVE-2021-20271 7.0

A vulnerability in RPM's signature verification allows attackers to craft malicious packages that appear valid but corrupt the RPM database upon insta...

Mar 26, 2021
CVE-2021-3466 9.8

CVE-2021-3466 is a buffer overflow vulnerability in libmicrohttpd's post_process_urlencoded function due to missing bounds checking. This allows remot...

Mar 25, 2021
CVE-2019-19352 7.0

This vulnerability allows an attacker with access to a container running the vulnerable operator-framework/presto component in Red Hat OpenShift 4 to ...

Mar 24, 2021
CVE-2019-19354 7.8

This vulnerability allows attackers with access to a container running the operator-framework/hadoop in Red Hat OpenShift 4 to modify the /etc/passwd ...

Mar 24, 2021
CVE-2019-19349 7.8

This vulnerability allows an attacker with access to the operator-metering container in Red Hat OpenShift 4 to modify the /etc/passwd file, potentiall...

Mar 24, 2021
CVE-2019-19343 7.5

CVE-2019-19343 is a memory leak vulnerability in Undertow's HttpOpenListener when using Remoting in Red Hat JBoss EAP. This flaw allows attackers to c...

Mar 23, 2021
CVE-2021-20222 7.5

This vulnerability in Keycloak's new account console allows attackers to execute malicious code via manipulated referrer URLs. It affects Keycloak dep...

Mar 23, 2021
CVE-2021-20270 7.5

This vulnerability in Pygments' SMLLexer causes an infinite loop when processing Standard ML source files containing only the 'exception' keyword, lea...

Mar 23, 2021
CVE-2019-14852 7.5

CVE-2019-14852 is a cryptographic vulnerability in 3scale's APIcast gateway that allows TLS 1.0 protocol usage, enabling attackers to potentially decr...

Mar 18, 2021

Why Monitor Redhat Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 320+ known vulnerabilities affecting Redhat products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Redhat packages in under 60 seconds. No agents required - completely agentless scanning that works across Redhat deployments.

Free vulnerability database: Access detailed information about every Redhat CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Redhat CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Redhat CVEs Free