Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Red Hat — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting Red Hat. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

Found 22 results / 691Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2020-14366 Red Hat Keycloak 路径遍历漏洞 — keycloakCWE-22 6.8 Medium2020-11-09
CVE-2020-1758 Red Hat Keycloak 信任管理问题漏洞 — keycloakCWE-297 5.3 Medium2020-05-15
CVE-2020-1714 Red Hat Keycloak 输入验证错误漏洞 — keycloakCWE-20 8.8 -2020-05-13
CVE-2020-1718 Red Hat Keycloak 授权问题漏洞 — keycloakCWE-287 7.1 High2020-05-12
CVE-2020-1724 Red Hat Keycloak 代码问题漏洞 — keycloakCWE-613 4.3 Medium2020-05-11
CVE-2020-1698 Red Hat Keycloak 日志信息泄露漏洞 — keycloakCWE-200 5.0 Medium2020-05-11
CVE-2020-1744 Red Hat Keycloak 信息泄露漏洞 — keycloakCWE-755 5.6 Medium2020-03-24
CVE-2020-1731 Red Hat Keycloak operator 安全漏洞 — keycloakCWE-341 9.1 Critical2020-03-02
CVE-2020-1697 Red Hat Keycloak 跨站脚本漏洞 — keycloakCWE-79 6.1 Medium2020-02-10
CVE-2019-14837 Red Hat Keycloak 安全漏洞 — keycloakCWE-547 8.1 -2020-01-07
CVE-2019-10201 Red Hat Keycloak 授权问题漏洞 — keycloakCWE-592 8.1 -2019-08-14
CVE-2019-10199 红帽 Red Hat Keycloak 跨站请求伪造漏洞 — keycloakCWE-352 8.8 -2019-08-14
CVE-2019-3875 Red Hat Keycloak 信任管理问题漏洞 — keycloakCWE-345 6.5 -2019-06-12
CVE-2019-10157 Red Hat Keycloak Node.js adapter 授权问题漏洞 — keycloakCWE-345 5.5 -2019-06-12
CVE-2019-3868 Red Hat Keycloak 信息泄露漏洞 — keycloakCWE-200 3.8 -2019-04-24
CVE-2018-14658 Red Hat JBoss KeyCloak 安全漏洞 — keycloakCWE-601 6.1 -2018-11-13
CVE-2018-14657 Red Hat Keycloak 安全特征问题漏洞 — keycloakCWE-307 9.4 -2018-11-13
CVE-2018-14655 Red Hat Keycloak 跨站脚本漏洞 — keycloakCWE-79 5.4 -2018-11-13
CVE-2016-8609 Red Hat keycloak 授权问题漏洞 — keycloakCWE-384 8.8 -2018-08-01
CVE-2018-10894 Red Hat Keycloak 安全漏洞 — keycloakCWE-345 8.1 -2018-08-01
CVE-2017-2646 Red Hat keycloak 安全漏洞 — keycloakCWE-835 7.5 -2018-07-27
CVE-2017-2582 Red Hat Picketlink和KeyCloak 信息泄露漏洞 — keycloakCWE-201 7.5 -2018-07-26

This page lists every published CVE security advisory associated with Red Hat. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.