Redhat Security Vulnerabilities (CVEs)

Track 320 security vulnerabilities affecting Redhat products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

39 Critical
236 High
45 Medium
🔔 Get Alerts for Redhat
CVE-2021-3344 8.8

This vulnerability allows authenticated OpenShift users who can execute code during container build time to access credentials that are automatically ...

Mar 16, 2021
CVE-2021-20218 7.4

This vulnerability in fabric8 kubernetes-client allows malicious pods/containers to exploit the copy command to extract files outside the intended wor...

Mar 16, 2021
CVE-2021-20231 9.8

This CVE-2021-20231 is a critical use-after-free vulnerability in GnuTLS that occurs when a client sends a key_share extension, potentially leading to...

Mar 12, 2021
CVE-2020-35523 7.8

An integer overflow vulnerability in libtiff's tif_getimage.c allows attackers to execute arbitrary code when a user opens a malicious TIFF file. This...

Mar 9, 2021
CVE-2021-3403 7.8

CVE-2021-3403 is a double-free vulnerability in ytnef's TNEFSubjectHandler function that allows remote attackers to cause denial-of-service or potenti...

Mar 4, 2021
CVE-2021-20233 8.2

This GRUB2 vulnerability allows attackers to corrupt memory by one byte for each quote in menu input due to an incorrect length calculation. It affect...

Mar 3, 2021
CVE-2020-25632 8.2

This CVE-2020-25632 vulnerability in GRUB2 allows attackers to unload kernel modules that other modules depend on, creating a use-after-free condition...

Mar 3, 2021
CVE-2020-27779 7.5

This vulnerability in GRUB2 allows privileged attackers to bypass Secure Boot protections by using the cutmem command to remove memory address ranges....

Mar 3, 2021
CVE-2021-20182 8.8

This CVE describes a privilege escalation vulnerability in OpenShift's docker-builder container where the build container runs with high privileges us...

Feb 23, 2021
CVE-2021-20198 8.1

This vulnerability allows remote attackers to execute arbitrary commands within running containers on OpenShift bootstrap nodes during cluster install...

Feb 23, 2021
CVE-2020-14359 7.3

CVE-2020-14359 is an authentication bypass vulnerability in Keycloak Gatekeeper where attackers can bypass security protections by using lowercase HTT...

Feb 23, 2021
CVE-2021-20188 7.0

A privilege escalation vulnerability in Podman allows non-root users inside privileged containers to access any file, including root-owned files. This...

Feb 11, 2021
CVE-2020-27846 9.8

CVE-2020-27846 is a signature verification vulnerability in the crewjam/saml library that allows attackers to bypass SAML authentication. This affects...

Dec 21, 2020
CVE-2020-27778 7.5

CVE-2020-27778 is a vulnerability in Poppler's pdftohtml utility that allows remote attackers to cause denial of service through a malicious PDF file....

Dec 3, 2020
CVE-2020-14351 7.8

CVE-2020-14351 is a use-after-free vulnerability in the Linux kernel's perf subsystem that allows local attackers with permission to monitor performan...

Dec 3, 2020
CVE-2020-1045 7.5

This vulnerability allows attackers to bypass ASP.NET Core's cookie security by setting a second cookie with a percent-encoded name. The parser incorr...

Sep 11, 2020
CVE-2020-14324 9.1

This CVE-2020-14324 is an authenticated OS command injection vulnerability in Red Hat CloudForms that allows attackers to execute arbitrary commands o...

Aug 11, 2020
CVE-2020-14325 9.1

CVE-2020-14325 is an authorization bypass vulnerability in Red Hat CloudForms that allows attackers to impersonate users and create accounts with supe...

Aug 11, 2020
CVE-2019-11253 7.5

This CVE-2019-11253 vulnerability in Kubernetes allows authorized users to send malicious YAML or JSON payloads to the API server, causing excessive C...

Oct 17, 2019
CVE-2019-1125 5.6

CVE-2019-1125 is a Spectre Variant 1 speculative execution side-channel vulnerability in AMD, ARM, and Intel CPUs that allows attackers to read privil...

Sep 3, 2019

Why Monitor Redhat Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 320+ known vulnerabilities affecting Redhat products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Redhat packages in under 60 seconds. No agents required - completely agentless scanning that works across Redhat deployments.

Free vulnerability database: Access detailed information about every Redhat CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Redhat CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Redhat CVEs Free