Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Red Hat Developer Hub

Source -

CNA

CNA CVEs -

5

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
5Vulnerabilities found

CVE-2025-8556
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-3.7||LOW
EPSS-0.02% / 4.13%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 08:48
Updated-06 Aug, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Github.com/cloudflare/circl: circl-fourq: missing and wrong validation can lead to incorrect results

A flaw was found in CIRCL's implementation of the FourQ elliptic curve. This vulnerability allows an attacker to compromise session security via low-order point injection and incorrect point validation during Diffie-Hellman key exchange.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 4Red Hat OpenStack Platform 16.2Multicluster Global HubRed Hat Advanced Cluster Management for Kubernetes 2OpenShift PipelinesRed Hat Ceph Storage 8Red Hat OpenShift for Windows ContainersCustom Metric Autoscaler operator for Red Hat OpenshiftOpenShift ServerlessRed Hat Enterprise Linux AI (RHEL AI)Red Hat Trusted Artifact SignerRed Hat OpenStack Platform 17.1Red Hat OpenShift AI (RHOAI)Red Hat Ceph Storage 5Red Hat Enterprise Linux 10Builds for Red Hat OpenShiftRed Hat Trusted Application PipelineRed Hat OpenShift GitOpsOpenShift Service Mesh 3Red Hat Enterprise Linux 9Red Hat OpenShift Virtualization 4Red Hat Ceph Storage 6Red Hat Advanced Cluster Security 4Red Hat OpenShift Dev Workspaces OperatorRed Hat Trusted Profile AnalyzerRed Hat Developer Hub
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-11831
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.52% / 65.87%
||
7 Day CHG~0.00%
Published-10 Feb, 2025 | 15:27
Updated-20 Aug, 2025 | 22:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Npm-serialize-javascript: cross-site scripting (xss) in serialize-javascript

A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 3.11Red Hat Advanced Cluster Security 4.4RHODF-4.18-RHEL-9Logging Subsystem for Red Hat OpenShiftRed Hat Ceph Storage 8Red Hat Process Automation 7RHODF-4.16-RHEL-9Red Hat JBoss Enterprise Application Platform 7OpenShift Service Mesh 2Migration Toolkit for VirtualizationRed Hat Fuse 7OpenShift LightspeedRed Hat Enterprise Linux 10Red Hat Trusted Profile AnalyzerRed Hat Discovery 1Red Hat Quay 3Red Hat Satellite 6Cryostat 3Red Hat OpenShift Dev SpacesRed Hat JBoss Enterprise Application Platform 8RHODF-4.14-RHEL-9Red Hat Ansible Automation Platform 2Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat Data Grid 8Red Hat Enterprise Linux 8RHODF-4.15-RHEL-9Red Hat Enterprise Linux 9Red Hat 3scale API Management Platform 2RHODF-4.17-RHEL-9Red Hat Advanced Cluster Security 4.5Red Hat build of OptaPlanner 8Red Hat Developer Hub.NET 6.0 on Red Hat Enterprise LinuxRed Hat OpenShift distributed tracing 3Red Hat Single Sign-On 7Red Hat OpenShift AI (RHOAI)Red Hat Advanced Cluster Management for Kubernetes 2Red Hat OpenShift Container Platform 4Red Hat Ceph Storage 7OpenShift ServerlessRed Hat build of Apicurio Registry 2Red Hat build of Apache Camel - HawtIO 4Red Hat Advanced Cluster Security 4OpenShift PipelinesRed Hat Integration Camel K 1
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6717
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 20.46%
||
7 Day CHG~0.00%
Published-25 Apr, 2024 | 16:02
Updated-26 Aug, 2025 | 06:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: xss via assertion consumer service url in saml post-binding flow

A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Migration Toolkit for Applications 6Red Hat OpenShift GitOpsRHPAM 7.13.5 asyncRed Hat build of Keycloak 22.0.10Red Hat build of QuarkusRed Hat JBoss Enterprise Application Platform 6Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 7Red Hat Process Automation 7Red Hat Decision Manager 7Red Hat Data Grid 8Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat AMQ Broker 7Red Hat build of Apicurio Registry 2RHOSS-1.33-RHEL-8Red Hat Fuse 7Red Hat Developer HubRed Hat JBoss Enterprise Application Platform 8Red Hat JBoss Data Grid 7Migration Toolkit for Applications 7Red Hat build of Keycloak 22
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-1249
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-0.13% / 33.32%
||
7 Day CHG~0.00%
Published-17 Apr, 2024 | 13:22
Updated-07 Aug, 2025 | 12:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkloginiframe leads to ddos

A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Process Automation 7RHSSO 7.6.8Red Hat JBoss Data Grid 7Red Hat build of Apicurio Registry 2Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 8Migration Toolkit for Applications 6Red Hat Data Grid 8Red Hat AMQ Broker 7Red Hat build of Keycloak 22.0.10Red Hat Fuse 7streams for Apache KafkaRed Hat Single Sign-On 7.6 for RHEL 9RHOSS-1.33-RHEL-8Red Hat Developer HubRed Hat Single Sign-On 7.6 for RHEL 7Red Hat Single Sign-On 7.6 for RHEL 8Red Hat Decision Manager 7Migration Toolkit for Applications 7RHEL-8 based Middleware ContainersRed Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 6Red Hat build of Keycloak 22
CWE ID-CWE-346
Origin Validation Error
CVE-2023-6944
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.15% / 35.99%
||
7 Day CHG~0.00%
Published-04 Jan, 2024 | 10:02
Updated-17 Jun, 2025 | 20:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rhdh: catalog-import function leaks credentials to frontend

A flaw was found in the Red Hat Developer Hub (RHDH). The catalog-import function leaks GitLab access tokens on the frontend when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error can display on the frontend, including the raw access token. Upon gaining access to this token and depending on permissions, an attacker could push malicious code to repositories, delete resources in Git, revoke or generate new keys, and sign code illegitimately.

Action-Not Available
Vendor-Red Hat, Inc.The Linux Foundation
Product-backstagered_hat_developer_hubRed Hat Developer Hub
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information