Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
single_sign-on Vendor: redhat

About This Product

single_sign-on is a software product offered by redhat. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 103 known vulnerabilities affecting redhat single_sign-on. This includes 6 critical-severity issues and 44 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2026, indicating a sustained research interest and ongoing security attention. 47 medium-severity issues and 6 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-10912 2018-07-23 2024-11-21 4.9 4.0 Likely
CVE-2018-10894 2018-08-01 2024-11-21 5.4 5.5 Likely
CVE-2018-14655 2018-11-13 2024-11-21 4.6 3.5 Unknown
CVE-2018-14657 2018-11-13 2024-11-21 8.1 4.3 Likely
CVE-2018-12022 2019-03-21 2024-11-21 7.5 5.1 Unknown
CVE-2018-12023 2019-03-21 2024-11-21 7.5 5.1 Unknown
CVE-2018-10934 2019-03-27 2024-11-21 5.4 3.5 Unknown
CVE-2019-10157 2019-06-12 2024-11-21 4.7 2.1 Unknown
CVE-2019-3872 2019-06-12 2024-11-21 5.4 3.5 Unknown
CVE-2019-3873 2019-06-12 2024-11-21 6.4 6.0 Unknown
CVE-2019-3875 2019-06-12 2024-11-21 6.5 5.8 Likely
CVE-2019-10184 2019-07-25 2024-11-21 7.5 5.0 Likely
CVE-2019-14379 2019-07-29 2024-11-21 9.8 7.5 Likely
CVE-2019-9514 2019-08-13 2025-01-14 7.5 7.8 Likely
CVE-2019-9515 2019-08-13 2025-01-14 7.5 7.8 Likely
CVE-2019-10201 2019-08-14 2024-11-21 8.1 5.5 Likely
CVE-2019-10212 2019-10-02 2024-11-21 9.8 4.3 Likely
CVE-2019-14838 2019-10-14 2024-11-21 4.9 4.0 Likely
CVE-2019-10219 2019-11-08 2025-07-07 6.1 4.3 Likely
CVE-2019-10174 2019-11-25 2024-11-21 8.8 6.5 Likely
CVE-2019-14837 2020-01-07 2024-11-21 9.1 6.4 Likely
CVE-2019-14843 2020-01-07 2024-11-21 8.8 6.5 Likely
CVE-2019-14820 2020-01-08 2024-11-21 4.3 4.0 Likely
CVE-2019-14888 2020-01-23 2024-11-21 7.5 5.0 Likely
CVE-2019-14885 2020-01-23 2024-11-21 4.3 4.0 Likely
CVE-2020-1697 2020-02-10 2024-11-21 6.1 3.5 Unknown
CVE-2019-14887 2020-03-16 2024-11-21 9.1 6.4 Likely
CVE-2020-1757 2020-04-21 2024-11-21 8.1 5.5 Likely
CVE-2020-1724 2020-05-11 2024-11-21 4.3 4.0 Likely
CVE-2020-1714 2020-05-13 2024-11-21 8.8 6.5 Likely
CVE-2020-10719 2020-05-26 2024-11-21 6.5 6.4 Likely
CVE-2019-14900 2020-07-06 2024-11-21 6.5 4.0 Likely
CVE-2020-14297 2020-07-24 2024-11-21 6.5 4.0 Likely
CVE-2020-14307 2020-07-24 2024-11-21 6.5 4.0 Likely
CVE-2020-1710 2020-09-16 2024-11-21 5.3 5.0 Likely
CVE-2020-10758 2020-09-16 2024-11-21 7.5 5.0 Likely
CVE-2020-10748 2020-09-16 2024-11-21 6.1 4.3 Likely
CVE-2020-10687 2020-09-23 2024-11-21 4.8 5.8 Likely
CVE-2020-25644 2020-10-06 2024-11-21 7.5 5.0 Likely
CVE-2020-14299 2020-10-16 2024-11-21 6.5 6.3 Unknown
CVE-2020-25689 2020-11-02 2024-11-21 5.3 6.8 Likely
CVE-2020-14341 2021-01-12 2024-11-21 2.7 4.0 Likely
CVE-2020-10734 2021-02-11 2024-11-21 3.3 2.1 Unknown
CVE-2020-1717 2021-02-11 2024-11-21 2.7 4.0 Likely
CVE-2020-27838 2021-03-08 2024-11-21 6.5 4.3 Likely
CVE-2021-20262 2021-03-09 2024-11-21 6.8 4.6 Unknown
CVE-2020-10695 2021-05-26 2024-11-21 7.8 4.6 Unknown
CVE-2020-27826 2021-05-28 2024-11-21 4.2 4.9 Unknown
CVE-2021-3424 2021-06-01 2024-11-21 5.3 5.0 Likely
CVE-2021-3637 2021-07-09 2024-11-21 7.5 5.0 Likely
CVE-2021-4104 2021-12-14 2024-11-21 7.5 6.0 Unknown
CVE-2022-0853 2022-03-11 2024-11-21 7.5 5.0 Likely
CVE-2021-3461 2022-04-01 2024-11-21 7.1 3.3 Unknown
CVE-2022-1466 2022-04-26 2024-11-21 6.5 4.0 Likely
CVE-2021-3597 2022-05-24 2024-11-21 5.9 2.6 Unknown
CVE-2021-3629 2022-05-24 2024-11-21 5.9 4.3 Likely
CVE-2021-3717 2022-05-24 2024-11-21 7.8 4.6 Unknown
CVE-2022-2668 2022-08-05 2024-11-21 7.2 - -
CVE-2021-3690 2022-08-23 2024-11-21 7.5 - -
CVE-2021-3827 2022-08-23 2024-11-21 6.8 - -
CVE-2021-3632 2022-08-26 2024-11-21 7.5 - -
CVE-2021-3754 2022-08-26 2024-11-21 5.3 - -
CVE-2021-3859 2022-08-26 2024-11-21 7.5 - -
CVE-2022-0084 2022-08-26 2024-11-21 7.5 - -
CVE-2022-0225 2022-08-26 2024-11-21 5.4 - -
CVE-2022-1259 2022-08-31 2024-11-21 7.5 - -
CVE-2022-1319 2022-08-31 2024-11-21 7.5 - -
CVE-2022-2256 2022-09-01 2024-11-21 3.8 - -
CVE-2022-2764 2022-09-01 2024-11-21 4.9 - -
CVE-2022-1278 2022-09-13 2024-11-21 7.5 - -
CVE-2023-0091 2023-01-13 2025-04-09 3.8 - -
CVE-2023-0105 2023-01-13 2025-04-09 6.5 - -
CVE-2022-4492 2023-02-23 2025-03-12 7.5 - -
CVE-2022-2237 2023-03-27 2025-02-24 6.1 - -
CVE-2022-1274 2023-03-29 2024-11-21 5.4 - -
CVE-2023-1664 2023-05-26 2025-01-15 6.5 - -
CVE-2022-4361 2023-07-07 2024-11-21 10.0 - -
CVE-2023-0264 2023-08-04 2024-11-21 5.0 - -
CVE-2023-1108 2023-09-14 2024-11-21 7.5 - -
CVE-2022-3916 2023-09-20 2024-11-21 6.8 - -
CVE-2022-4039 2023-09-22 2024-11-21 8.0 - -
CVE-2022-4137 2023-09-25 2024-11-21 8.1 - -
CVE-2023-3223 2023-09-27 2024-11-21 7.5 - -
CVE-2023-2422 2023-10-04 2024-11-21 5.5 - -
CVE-2023-44487 2023-10-10 2025-11-07 7.5 - -
CVE-2023-5379 2023-12-12 2025-10-25 7.5 - -
CVE-2023-6563 2023-12-14 2024-11-21 7.7 - -
CVE-2023-6134 2023-12-14 2024-11-21 4.6 - -
CVE-2023-48795 2023-12-18 2025-11-04 5.9 - -
CVE-2023-6927 2023-12-18 2024-11-21 4.6 - -
CVE-2023-2585 2023-12-21 2024-11-21 3.5 - -
CVE-2023-6291 2024-01-26 2024-11-21 7.1 - -
CVE-2024-1635 2024-02-19 2025-06-25 7.5 - -
CVE-2024-1132 2024-04-17 2025-06-30 8.1 - -
CVE-2024-7885 2024-08-21 2026-01-19 7.5 - -
CVE-2024-4629 2024-09-03 2024-11-21 6.5 - -
CVE-2024-7341 2024-09-09 2024-10-04 7.1 - -
CVE-2023-6841 2024-09-10 2024-10-01 7.5 - -
CVE-2024-8883 2024-09-19 2024-11-26 6.1 - -
CVE-2023-1932 2024-11-07 2025-06-24 6.1 - -
CVE-2025-9784 2025-09-02 2026-03-18 7.5 - -
CVE-2025-12543 2026-01-07 2026-03-18 9.6 - -
CVE-2026-3009 2026-03-05 2026-03-10 8.1 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for redhat single_sign-on by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.