Certificate System Red Hat Certificate System

Do you want an email whenever new security vulnerabilities are reported in Red Hat Certificate System?

By the Year

In 2022 there have been 0 vulnerabilities in Red Hat Certificate System . Last year Certificate System had 1 security vulnerability published. Right now, Certificate System is on track to have less security vulnerabilities in 2022 than it did last year.

Year Vulnerabilities Average Score
2022 0 0.00
2021 1 8.10
2020 2 5.10
2019 0 0.00
2018 0 0.00

It may take a day or so for new Certificate System vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Certificate System Security Vulnerabilities

A flaw was found in pki-core

CVE-2021-20179 8.1 - High - March 15, 2021

A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity.


A vulnerability was found in all pki-core 10.x.x version

CVE-2019-10180 4.8 - Medium - March 31, 2020

A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code.


A flaw was found in the all pki-core 10.x.x versions

CVE-2020-1696 5.4 - Medium - March 20, 2020

A flaw was found in the all pki-core 10.x.x versions, where Token Processing Service (TPS) where it did not properly sanitize Profile IDs, enabling a Stored Cross-Site Scripting (XSS) vulnerability when the profile ID is printed. An attacker with sufficient permissions could trick an authenticated victim into executing a specially crafted Javascript code.


Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat Certificate System or by Red Hat? Click the Watch button to subscribe.

Red Hat