Redhat Vulnerabilities

Comprehensive security vulnerability database for Redhat products

Last updated: Feb 27, 2026
Total CVEs

1

Critical

0

With Exploits

5

Last 30 Days

0

Severity Distribution

Critical0
0%
High2
200%
Medium3
300%
Low1
100%
DescriptionVendor / ProductExploit Status
CVE-2025-121503.1

An attacker can register fake or untrusted authentication devices in Keycloak, even if the system is set to require secure verification, by submitting a specific type of data that bypasses security checks. This vulnerability weakens the overall security of user authentication, but it requires the attacker to have access to the registration process.

redhatbuild of keycloak
Exploit Available
about 1 month agoFeb 27, 2026

About Redhat Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Redhat products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.