Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Red Hat — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting Red Hat. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

CVE IDTitleCVSSSeverityPublished
CVE-2018-10923 Red Hat glusterfs服务器输入验证错误漏洞 — glusterfsCWE-20 8.1 -2018-09-04
CVE-2018-10904 glusterfs server 代码问题漏洞 — glusterfsCWE-426 8.8 -2018-09-04
CVE-2018-10907 Red Hat glusterfs服务器缓冲区错误漏洞 — glusterfsCWE-121 8.8 -2018-09-04
CVE-2017-2627 Red Hat Openstack Enterprise tripleo-common 安全漏洞 — openstack-tripleo-commonCWE-22 7.2 -2018-08-22
CVE-2017-7528 Red Hat CloudForms Management Engine 安全漏洞 — Ansible TowerCWE-113 7.4 -2018-08-22
CVE-2017-7513 Red Hat Satellite 安全漏洞 — Red Hat SatelliteCWE-295 4.2 -2018-08-22
CVE-2018-10884 Ansible Tower 跨站请求伪造漏洞 — ansible-towerCWE-352 8.8 -2018-08-22
CVE-2016-8609 Red Hat keycloak 授权问题漏洞 — keycloakCWE-384 8.8 -2018-08-01
CVE-2018-10894 Red Hat Keycloak 安全漏洞 — keycloakCWE-345 8.1 -2018-08-01
CVE-2016-8651 OpenShift 存在输入验证错误漏洞 — OpenShift EnterpriseCWE-20 4.3 -2018-08-01
CVE-2016-9579 Ceph 输入验证错误漏洞 — cephCWE-20 7.5 -2018-08-01
CVE-2016-8608 Red Hat JBoss BRMS和BPM Suite 跨站脚本漏洞 — BRMSCWE-79 5.4 -2018-08-01
CVE-2016-8653 RedHat Jboss Fuse和Jboss A-MQ 安全漏洞 — FuseCWE-502 5.3 -2018-08-01
CVE-2016-8614 Ansible 安全漏洞 — AnsibleCWE-358 5.9 -2018-07-31
CVE-2016-8628 Ansible 命令注入漏洞 — AnsibleCWE-77 9.1 -2018-07-31
CVE-2016-8631 Red Hat OpenShift Enterprise 输入验证错误漏洞 — Openshift EnterpriseCWE-20 8.5 -2018-07-31
CVE-2016-8626 Red Hat Ceph 输入验证漏洞 — CephCWE-476 6.5 -2018-07-31
CVE-2016-9597 Libxml2 缓冲区错误漏洞 — libxml2CWE-674 7.5 -2018-07-30
CVE-2017-7514 Red Hat Satellite 跨站脚本漏洞 — Red Hat SatelliteCWE-79 5.4 -2018-07-30
CVE-2016-9578 Red Hat SPICE 输入验证漏洞 — spiceCWE-20 7.5 -2018-07-27
CVE-2016-9577 Red Hat SPICE 缓冲区错误漏洞 — spiceCWE-20 8.8 -2018-07-27
CVE-2017-15097 PostgreSQL 后置链接漏洞 — postgresql init scriptCWE-59 7.2 -2018-07-27
CVE-2017-2663 Red Hat Candlepin subscription-manager 权限许可和访问控制漏洞 — subscription-managerCWE-270 7.8 -2018-07-27
CVE-2017-2632 Red Hat CloudForms Management Engine 权限许可和访问控制漏洞 — cfmeCWE-285 7.2 -2018-07-27
CVE-2017-2590 Red Hat FreeIPA 安全漏洞 — ipaCWE-732 8.1 -2018-07-27
CVE-2017-2614 ovirt-aaa-jdbc-tool工具安全漏洞 — ovirt-engine-extension-aaa-jdbcCWE-20 7.8 -2018-07-27
CVE-2017-2621 OpenStack 日志信息泄露漏洞 — openstack-heatCWE-552 5.5 -2018-07-27
CVE-2017-2646 Red Hat keycloak 安全漏洞 — keycloakCWE-835 7.5 -2018-07-27
CVE-2017-2653 Red Hat CloudForms Management App 安全漏洞 — CloudFormsCWE-20 6.5 -2018-07-27
CVE-2017-2658 Red Hat Dashbuilder 安全漏洞 — BPMSCWE-20 6.5 -2018-07-27

This page lists every published CVE security advisory associated with Red Hat. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.