Known Vulnerabilities for products from Redhat

Listed below are 20 of the newest known vulnerabilities associated with the vendor "Redhat".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Additional devices specifications by Redhat can be found at device.report : Redhat

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-42010 json A flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched... Not Provided 2026-05-07 2026-05-14
CVE-2026-40919 json A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-seattle-filmworks` plugin, can be exploited when... Not Provided 2026-04-15 2026-04-28
CVE-2026-40918 json A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can lead to a denial of service... Not Provided 2026-04-15 2026-04-28
CVE-2026-40917 json A flaw was found in GIMP. This vulnerability, a heap buffer over-read in the `icns_slurp()` function, occurs when processing ... Not Provided 2026-04-15 2026-04-28
CVE-2026-40916 json A flaw was found in GIMP. A stack buffer overflow vulnerability in the TIM image loader's 4BPP decoding path allows a local u... Not Provided 2026-04-15 2026-04-28
CVE-2026-40915 json A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability in the FITS image loader by provi... Not Provided 2026-04-15 2026-04-28
CVE-2026-37977 json A flaw was found in Keycloak. A remote attacker can exploit a Cross-Origin Resource Sharing (CORS) header injection vulnerabi... Not Provided 2026-04-06 2026-04-24
CVE-2026-35092 json A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote,... Not Provided 2026-04-01 2026-05-06
CVE-2026-35091 json A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosyn... Not Provided 2026-04-01 2026-05-06
CVE-2026-34002 json A flaw was found in the X.Org X server. This vulnerability, an out-of-bounds read, affects the XKB (X Keyboard Extension) mod... Not Provided 2026-05-05 2026-05-07
CVE-2026-34000 json A flaw was found in the X.Org X server. This out-of-bounds read vulnerability in the XKB geometry processing, specifically wi... Not Provided 2026-05-05 2026-05-07
CVE-2026-33845 json A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an intege... Not Provided 2026-04-30 2026-05-05
CVE-2026-32591 json A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstre... Not Provided 2026-04-08 2026-04-21
CVE-2026-32590 json A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediat... Not Provided 2026-04-08 2026-04-21
CVE-2026-32589 json A flaw was found in Red Hat Quay's container image upload process. An authenticated user with push access to any repository o... Not Provided 2026-04-08 2026-04-28
CVE-2026-28369 json A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one or more spac... Not Provided 2026-03-27 2026-03-31
CVE-2026-28368 json A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where heade... Not Provided 2026-03-27 2026-03-31
CVE-2026-28367 json A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminat... Not Provided 2026-03-27 2026-04-10
CVE-2026-23414 json Not Provided 2026-04-02 2026-04-27
CVE-2026-23270 json Not Provided 2026-03-18 2026-04-18

Known software with vulnerabilities from Redhat

Type Vendor Product Version
Operating
System
Redhat389 Directory Server-
ApplicationRedhat3scale-
ApplicationRedhatAdvanced Cluster Management For Kubernetes2.0
ApplicationRedhatAeolus Conductor-
ApplicationRedhatAmq2.0
ApplicationRedhatAmq Online-
ApplicationRedhatAnalog Real-time Synthesizer-
ApplicationRedhatAnsible0.0.1
ApplicationRedhatAnsible Engine0.0.1
ApplicationRedhatAnsible Tower-
ApplicationRedhatApicast2.0.0
ApplicationRedhatApplication Server-
ApplicationRedhatAutomatic Bug Reporting Tool0.0.10
ApplicationRedhatAutomation Manager7.3.1
ApplicationRedhatBeaker0.10.0
ApplicationRedhatBigmem Kernel-
ApplicationRedhatBodhi0.2.0
ApplicationRedhatCairo-
ApplicationRedhatCeph0.1
ApplicationRedhatCeph-iscsi-cli-