Red Hat Exploited Vulnerabilities
Red hat vulnerabilities known to be exploited. Over the past 365 days, sorted by exploit discovery date.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Authentication Bypass Flaw Affects GRUB on UEFI Systems
CVE-2023-4001Red HatRed Hat Enterprise Lin...πΎπ‘π°6.8MEDIUMRemote Code Execution Vulnerability in Shim Boot Support
CVE-2023-40547Red HatRed Hat Enterprise Lin...ππΎπ‘π°8.3HIGHLow-Privilege Users Can Access Administrative Functionalities, Risking Data Breaches or System Compromise
CVE-2024-3656Red HatππΎπ‘8.1HIGHFlaw in SAML Signature Validation Method Allows Privilege Escalation or Impersonation Attacks
CVE-2024-8698Red HatRed Hat Build Of KeycloakπΎπ‘π°7.7HIGHFreeIPA Vulnerability Allows Brute Force Attacks on Principal Passwords
CVE-2024-3183Red HatRed Hat Enterprise Lin...πΎπ‘8.1HIGHSignal Handler Race Condition Vulnerability in OpenSSH sshd
CVE-2024-6409Red HatRed Hat Enterprise Lin...ππΎπ‘π°7HIGHSignal Handler Race Condition in OpenSSH's Server
CVE-2024-6387Red HatRed Hat Enterprise Lin...π₯ππΎπ‘π°8.1HIGHArbitrary Systemd Property Injection Vulnerability in cri-o
CVE-2024-3154Red HatRed Hat Openshift Cont...πΎπ‘7.2HIGHHeap-Based Buffer Overflow Vulnerability in glibc Library
CVE-2023-6246Red HatGlibcππ°πΎπ‘π°8.4HIGHMalicious Code Discovered in xz Upstream Tarballs, Affecting liblzma and Other Dependent Packages
CVE-2024-3094Red HatXzπ₯ππΎπ‘EPSS 63%π°10CRITICALMemory Leak Flaw in Linux Kernel's io_uring Could Lead to Privilege Escalation
CVE-2024-0582Red HatkernelππΎπ‘π°7.8HIGH
No more vulnerabilities to load.