Red Hat Latest Vulnerabilities
Latest vulnerabilities published by red hat
Vulnerability Published:
🗓️ Published
- Anytime
Sort By:
🗓️ Published Date
- Descending
Heap Buffer Overflow in libsolv Affects Open Source Package Management Tools
CVE-2026-9149Red HatRed Hat Enterprise Lin...6.5MEDIUMStack-Based Buffer Overflow in libsolv Debian Metadata Parser
CVE-2026-9150Red HatRed Hat Enterprise Lin...6.5MEDIUMCross-Session Flaw in Keycloak Affects Identity Management Solution
CVE-2026-9087Red HatRed Hat Build Of Keycloak6.4MEDIUMDenial of Service Vulnerability in 389-ds-base LDAP Server by Red Hat
CVE-2026-9064Red HatRed Hat Directory Serv...7.5HIGHOpenID Connect Token Bypass Vulnerability in Keycloak by Red Hat
CVE-2026-7571Red HatRed Hat Build Of Keycl...7.1HIGHSession Fixation Vulnerability in Keycloak by Red Hat
CVE-2026-7507Red HatRed Hat Build Of Keycl...7.5HIGHURL Validation Flaw in Keycloak Affected by Malicious Redirects
CVE-2026-7504Red HatRed Hat Build Of Keycl...8.1HIGHAuthentication Flaw in Keycloak Allows Remote Account Takeover
CVE-2026-37982Red HatRed Hat Build Of Keycl...6.8MEDIUMAccess Control Flaw in Keycloak's OpenID Connect Token Introspection Endpoint
CVE-2026-37979Red HatRed Hat Build Of Keycl...6.5MEDIUMCross-role Information Exposure in Keycloak by Red Hat
CVE-2026-37978Red HatRed Hat Build Of Keycl...4.9MEDIUMDenial of Service Flaw in Keycloak by Red Hat
CVE-2026-7307Red HatRed Hat Build Of Keycl...7.5HIGHBroken Access Control Vulnerability in Keycloak by Red Hat
CVE-2026-37981Red HatRed Hat Build Of Keycl...4.3MEDIUMInsecure Direct Object Reference Vulnerability in Keycloak by Red Hat
CVE-2026-4630Red HatRed Hat Build Of Keycl...6.8MEDIUMFlaw in Keycloak's OIDC Introspection Feature Allows Unauthorized Access
CVE-2026-8922Red HatRed Hat Build Of Keycloak5.4MEDIUMFlaw in Keycloak Allows Bypassing WebAuthn Policies
CVE-2026-8830Red HatRed Hat Build Of Keycloak4.3MEDIUMVulnerability in Datagram Transport Layer Security Implemented in GnuTLS
CVE-2026-42009Red HatRed Hat Enterprise Lin...7.5HIGHCommand Execution Vulnerability in Cockpit by Red Hat
CVE-2026-4802Red HatRed Hat Enterprise Lin...👾🟡8HIGHName Constraint Bypass in GnuTLS Allows Spoofing in Certificate Validation
CVE-2026-42011Red HatRed Hat Hardened Images7.4HIGHAuthentication Bypass Vulnerability in GnuTLS Affects Remote Access Security
CVE-2026-42010Red HatRed Hat Hardened Images7.1HIGHVulnerability in Keylime Verifier Affects Red Hat's Trusted Platform Module
CVE-2026-6420Red HatRed Hat Enterprise Lin...6.3MEDIUMDenial of Service Vulnerability in Open vSwitch Affected by FTP Command
CVE-2026-34956Red HatFast Datapath For Rhel 75.9MEDIUMOut-of-Bounds Read Vulnerability in X.Org X Server Affecting Red Hat
CVE-2026-34002Red HatRed Hat Enterprise Lin...6.1MEDIUMOut-of-Bounds Read Vulnerability in X.Org X Server by Red Hat
CVE-2026-34000Red HatRed Hat Enterprise Lin...6.1MEDIUMUser Auto-Link Flaw in AAP Gateway by Red Hat
CVE-2026-6266Red HatRed Hat Ansible Automa...8.3HIGHHeap Buffer Overflow Vulnerability in GnuTLS DTLS Handshake Process
CVE-2026-33846Red HatRed Hat Hardened Images7.5HIGH