Redhat Vulnerabilities
Comprehensive security vulnerability database for Redhat products
3
0
5
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-0871 | 4.9 | An attacker with the `manage-users` permission can change user profile information that should be restricted, bypassing security settings meant to protect unmanaged attributes. This means that if someone has this admin role, they can make unauthorized modifications to user data, even when the system is supposed to prevent it. | redhatbuild of keycloak | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-3118 | 6.5 | An attacker can crash the Red Hat Developer Hub application by sending specially crafted input through API requests, causing a Denial of Service that temporarily locks out all legitimate users. This vulnerability requires the attacker to be an authenticated user, meaning they already have access to the system. | redhatdeveloper hub | Exploit Available | about 1 month agoFeb 25, 2026 |
| CVE-2026-26104 | 5.5 | An attacker can exploit a flaw in the udisks storage management system to access and back up sensitive encryption information from LUKS-encrypted drives without proper authorization. This vulnerability requires the attacker to have access to the system as an unprivileged user, allowing them to potentially compromise the confidentiality of encrypted data. | redhatenterprise linux | Theoretical | about 1 month agoFeb 25, 2026 |
About Redhat Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Redhat products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.