Red Hat Popular Vulnerabilities
Popular vulnerabilities are those that have been exploited or trending within the past 365 days.
Malicious Code Discovered in xz Upstream Tarballs, Affecting liblzma and Other Dependent Packages
CVE-2024-3094
Red HatXz๐ฅ๐๐พ10CRITICAL
Signal Handler Race Condition in OpenSSH's Server
CVE-2024-6387
Red HatRed Hat Enterprise Lin...๐ฅ๐๐พ8.1HIGH
Low-Privilege Users Can Access Administrative Functionalities, Risking Data Breaches or System Compromise
CVE-2024-3656
Red HatRed Hat Build Of Keycloak๐๐พ8.1HIGH
Signal Handler Race Condition Vulnerability in OpenSSH sshd
CVE-2024-6409
Red HatRed Hat Enterprise Lin...๐๐พ7HIGH
Heap-Based Buffer Overflow Vulnerability in glibc Library
CVE-2023-6246
Red HatGlibc๐๐พ8.4HIGH
Remote Code Execution Vulnerability in Shim Boot Support
CVE-2023-40547
Red HatRed Hat Enterprise Lin...๐๐พ8.3HIGH
Memory Leak Flaw in Linux Kernel's io_uring Could Lead to Privilege Escalation
CVE-2024-0582
Red Hatkernel๐๐พ7.8HIGH
Flaw in SAML Signature Validation Method Allows Privilege Escalation or Impersonation Attacks
CVE-2024-8698
Red HatRed Hat Build Of Keycloak๐พ7.7HIGH
FreeIPA Vulnerability Allows Brute Force Attacks on Principal Passwords
CVE-2024-3183
Red HatRed Hat Enterprise Lin...๐พ8.1HIGH
Arbitrary Systemd Property Injection Vulnerability in cri-o
CVE-2024-3154
Red HatRed Hat Openshift Cont...๐พ7.2HIGH
Authentication Bypass Flaw Affects GRUB on UEFI Systems
CVE-2023-4001
Red HatRed Hat Enterprise Lin...๐พ6.8MEDIUM
Use-After-Free Vulnerability in Linux Kernel's Netfilter Subsystem
CVE-2024-0193
Red HatKernel๐พ6.7MEDIUM