Redhat Security Vulnerabilities (CVEs)
Track 320 security vulnerabilities affecting Redhat products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability allows authenticated OpenShift users who can execute code during container build time to access credentials that are automatically ...
Mar 16, 2021This vulnerability in fabric8 kubernetes-client allows malicious pods/containers to exploit the copy command to extract files outside the intended wor...
Mar 16, 2021This CVE-2021-20231 is a critical use-after-free vulnerability in GnuTLS that occurs when a client sends a key_share extension, potentially leading to...
Mar 12, 2021An integer overflow vulnerability in libtiff's tif_getimage.c allows attackers to execute arbitrary code when a user opens a malicious TIFF file. This...
Mar 9, 2021CVE-2021-3403 is a double-free vulnerability in ytnef's TNEFSubjectHandler function that allows remote attackers to cause denial-of-service or potenti...
Mar 4, 2021This GRUB2 vulnerability allows attackers to corrupt memory by one byte for each quote in menu input due to an incorrect length calculation. It affect...
Mar 3, 2021This CVE-2020-25632 vulnerability in GRUB2 allows attackers to unload kernel modules that other modules depend on, creating a use-after-free condition...
Mar 3, 2021This vulnerability in GRUB2 allows privileged attackers to bypass Secure Boot protections by using the cutmem command to remove memory address ranges....
Mar 3, 2021This CVE describes a privilege escalation vulnerability in OpenShift's docker-builder container where the build container runs with high privileges us...
Feb 23, 2021This vulnerability allows remote attackers to execute arbitrary commands within running containers on OpenShift bootstrap nodes during cluster install...
Feb 23, 2021CVE-2020-14359 is an authentication bypass vulnerability in Keycloak Gatekeeper where attackers can bypass security protections by using lowercase HTT...
Feb 23, 2021A privilege escalation vulnerability in Podman allows non-root users inside privileged containers to access any file, including root-owned files. This...
Feb 11, 2021CVE-2020-27846 is a signature verification vulnerability in the crewjam/saml library that allows attackers to bypass SAML authentication. This affects...
Dec 21, 2020CVE-2020-27778 is a vulnerability in Poppler's pdftohtml utility that allows remote attackers to cause denial of service through a malicious PDF file....
Dec 3, 2020CVE-2020-14351 is a use-after-free vulnerability in the Linux kernel's perf subsystem that allows local attackers with permission to monitor performan...
Dec 3, 2020This vulnerability allows attackers to bypass ASP.NET Core's cookie security by setting a second cookie with a percent-encoded name. The parser incorr...
Sep 11, 2020This CVE-2020-14324 is an authenticated OS command injection vulnerability in Red Hat CloudForms that allows attackers to execute arbitrary commands o...
Aug 11, 2020CVE-2020-14325 is an authorization bypass vulnerability in Red Hat CloudForms that allows attackers to impersonate users and create accounts with supe...
Aug 11, 2020This CVE-2019-11253 vulnerability in Kubernetes allows authorized users to send malicious YAML or JSON payloads to the API server, causing excessive C...
Oct 17, 2019CVE-2019-1125 is a Spectre Variant 1 speculative execution side-channel vulnerability in AMD, ARM, and Intel CPUs that allows attackers to read privil...
Sep 3, 2019Why Monitor Redhat Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 320+ known vulnerabilities affecting Redhat products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Redhat packages in under 60 seconds. No agents required - completely agentless scanning that works across Redhat deployments.
Free vulnerability database: Access detailed information about every Redhat CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Redhat CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions