Redhat Vulnerabilities
Comprehensive security vulnerability database for Redhat products
1
0
5
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-12150 | 3.1 | An attacker can register fake or untrusted authentication devices in Keycloak, even if the system is set to require secure verification, by submitting a specific type of data that bypasses security checks. This vulnerability weakens the overall security of user authentication, but it requires the attacker to have access to the registration process. | redhatbuild of keycloak | Exploit Available | about 1 month agoFeb 27, 2026 |
About Redhat Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Redhat products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.