Red Hat Exploited Vulnerabilities
Red hat vulnerabilities known to be exploited. Over the past 365 days, sorted by exploit discovery date.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Arbitrary Script Execution Vulnerability in Yelp Gnome User Help Application
CVE-2025-3155Red HatRed Hat Enterprise Lin...πΎπ°6.5MEDIUMOpenSSH Vulnerability Allows Man-in-the-Middle Attack via Host Key Verification Flaw
CVE-2025-26465Red HatRed Hat Enterprise Lin...ππΎπ‘EPSS 35%π°6.8MEDIUMFlaw in SAML Signature Validation Method Allows Privilege Escalation or Impersonation Attacks
CVE-2024-8698Red HatRed Hat Build Of KeycloakπΎπ‘EPSS 29%π°7.7HIGHFreeIPA Vulnerability Allows Brute Force Attacks on Principal Passwords
CVE-2024-3183Red HatRed Hat Enterprise Lin...πΎπ‘EPSS 10%8.1HIGHSignal Handler Race Condition Vulnerability in OpenSSH sshd
CVE-2024-6409Red HatRed Hat Enterprise Lin...ππΎEPSS 74%π°7HIGHSignal Handler Race Condition in OpenSSH's Server
CVE-2024-6387Red HatRed Hat Enterprise Lin...π₯ππΎπ‘EPSS 83%π°8.1HIGHArbitrary Systemd Property Injection Vulnerability in cri-o
CVE-2024-3154Red HatRed Hat Openshift Cont...πΎπ‘7.2HIGH
No more vulnerabilities to load.