Red Hat Latest High & Critical Vulnerabilities
Latest High & Critical vulnerabilities published by red hat
Vulnerability Published:
🗓️ Published
- Anytime
Sort By:
🗓️ Published Date
- Descending
GnuTLS Vulnerability in DTLS Handshake Parsing Affects Red Hat
CVE-2026-33845Red HatRed Hat Enterprise Lin...7.5HIGHOut-of-Bounds Read Vulnerability in Open Virtual Network
CVE-2026-5367Red HatFast Datapath For Red ...8.6HIGHOut-of-Bounds Memory Access in X.Org X Server Affects Red Hat Products
CVE-2026-34003Red HatRed Hat Enterprise Lin...7.8HIGHUse-After-Free Vulnerability in X.Org X Server by Red Hat
CVE-2026-34001Red HatRed Hat Enterprise Lin...7.8HIGHInteger Underflow Vulnerability in X.Org X Server Affecting Red Hat
CVE-2026-33999Red HatRed Hat Enterprise Lin...7.8HIGHRemote Code Execution Vulnerability in InstructLab by Red Hat
CVE-2026-6859Red HatRed Hat Enterprise Lin...8.8HIGHUnsafe Deserialization in Camel Infinispan Product by Red Hat
CVE-2026-6857Red HatRed Hat Build Of Apach...7.5HIGHPath Traversal Vulnerability in InstructLab Affects Red Hat
CVE-2026-6855Red HatRed Hat Enterprise Lin...7.1HIGHHeap Buffer Overflow Vulnerability in Binutils Affects Local Users
CVE-2026-6846Red HatRed Hat Enterprise Lin...7.8HIGHOut-of-Bounds Write Vulnerability in dnsmasq Affects Remote Server Operations
CVE-2026-6507Red HatRed Hat Enterprise Lin...7.5HIGHCross-Namespace Privilege Escalation in ArgoCD Image Updater
CVE-2026-6388Red HatRed Hat Openshift Gitops9.1CRITICALBuffer Overflow Vulnerability in GIMP GIF Image Loader by Red Hat
CVE-2026-6384Red HatRed Hat Enterprise Lin...7.3HIGHVulnerability in Red Hat OpenShift AI's ODH Dashboard Exposes Service Account Tokens
CVE-2026-5483Red HatRed Hat Openshift Ai 2.168.5HIGHRemote Denial of Service Vulnerability in GnuTLS Affecting Red Hat Products
CVE-2026-1584Red HatRed Hat Enterprise Lin...7.5HIGHArbitrary Code Execution Risk in Red Hat Quay Due to Flawed Image Layer Upload Handling
CVE-2026-32590Red HatMirror Registry For Re...7.1HIGHContainer Image Upload Vulnerability in Red Hat Quay
CVE-2026-32589Red HatMirror Registry For Re...7.4HIGHMan-in-the-Middle Vulnerability in Libssh on Windows Systems
CVE-2025-14821Red HatRed Hat Hardened Images7.8HIGHRemote Code Execution Vulnerability in Cockpit Web Service by Red Hat
CVE-2026-4631Red HatRed Hat Enterprise Lin...👾🟡9.8CRITICALCross-Cluster Privilege Escalation Vulnerability in Open Cluster Management by Red Hat
CVE-2026-4740Red HatMulticluster Engine Fo...8.2HIGHUser-Managed Access Bypass in Keycloak by Red Hat
CVE-2026-4636Red HatRed Hat Build Of Keycl...8.1HIGHDenial of Service Vulnerability in Keycloak Server by Red Hat
CVE-2026-4634Red HatRed Hat Build Of Keycl...7.5HIGHKeycloak Vulnerability Allows Unauthorized Access and Privilege Escalation
CVE-2026-4282Red HatRed Hat Build Of Keycl...7.4HIGHPath Traversal Vulnerability in Keycloak by Red Hat
CVE-2026-3872Red HatRed Hat Build Of Keycl...7.3HIGHLibinput Vulnerability in Configuration Directories Exposes User Permissions
CVE-2026-35093Red HatRed Hat Enterprise Lin...8.8HIGHInteger Overflow Vulnerability in Corosync Affects Service Stability
CVE-2026-35092Red HatRed Hat Enterprise Lin...7.5HIGH