| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-12801 | Nfs-utils: rpc.mountd in the nfs-utils privilege escalation | Red Hat | Red Hat Enterprise Linux 10 | Medium | 6.5 | 2026-03-04 15:25:53 | Deep Dive |
| CVE-2025-14831 | Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification | Red Hat | Red Hat Enterprise Linux 10 | Medium | 5.3 | 2026-02-09 14:51:32 | Deep Dive |
| CVE-2025-9820 | Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function | Red Hat | Red Hat Enterprise Linux 10 | Medium | 4.0 | 2026-01-26 19:58:33 | Deep Dive |
| CVE-2025-14874 | Nodemailer: nodemailer: denial of service via crafted email address header | nodemailer | nodemailer | High | 7.5 | 2025-12-18 08:40:32 | Deep Dive |
| CVE-2025-14104 | Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames | util-linux | util-linux | Medium | 6.1 | 2025-12-05 16:22:09 | Deep Dive |
| CVE-2025-14010 | Ansible-collection-community-general: ansible-collection-community-general: keycloak user module leaks credentials in verbose output | ansible-collections | Ansible Community General Collection | Medium | 5.5 | 2025-12-04 09:51:56 | Deep Dive |
| CVE-2025-13601 | Glib: integer overflow in in g_escape_uri_string() | - | - | High | 7.7 | 2025-11-26 14:44:23 | Deep Dive |
| CVE-2025-13033 | Nodemailer: nodemailer: email to an unintended domain can occur due to interpretation conflict | nodemailer | nodemailer | High | 7.5 | 2025-11-14 19:37:08 | Deep Dive |
| CVE-2024-47866 | RGW DoS attack with empty HTTP header in S3 object copy | ceph | ceph | High | 7.5 | 2025-11-12 18:28:19 | Deep Dive |
| CVE-2025-11561 | Sssd: sssd default kerberos configuration allows privilege escalation on ad-joined linux systems | - | - | High | 8.8 | 2025-10-09 13:37:53 | Deep Dive |
| CVE-2025-8556 | Github.com/cloudflare/circl: circl-fourq: missing and wrong validation can lead to incorrect results | - | - | Low | 3.7 | 2025-08-06 08:48:18 | Deep Dive |
| CVE-2024-48916 | Ceph is vulnerable to authentication bypass through RadosGW | ceph | ceph | High | 8.1 | 2025-07-30 19:45:00 | Deep Dive |
| CVE-2025-6395 | Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite() | - | - | Medium | 6.5 | 2025-07-10 15:20:46 | Deep Dive |
| CVE-2025-32990 | Gnutls: vulnerability in gnutls certtool template parsing | - | - | Medium | 6.5 | 2025-07-10 09:41:46 | Deep Dive |
| CVE-2025-32989 | Gnutls: vulnerability in gnutls sct extension parsing | - | - | Medium | 5.3 | 2025-07-10 08:05:26 | Deep Dive |
| CVE-2025-32988 | Gnutls: vulnerability in gnutls othername san export | - | - | Medium | 6.5 | 2025-07-10 08:04:58 | Deep Dive |
| CVE-2025-52555 | CephFS Permission Escalation Vulnerability in Ceph Fuse mounted FS | ceph | ceph | Medium | 6.5 | 2025-06-26 20:21:06 | Deep Dive |
| CVE-2025-4598 | Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump | - | - | Medium | 4.7 | 2025-05-30 13:13:26 | Deep Dive |
| CVE-2024-11831 | Npm-serialize-javascript: cross-site scripting (xss) in serialize-javascript | - | - | Medium | 5.4 | 2025-02-10 15:27:47 | Deep Dive |
| CVE-2024-6387 | Openssh: regresshion - race condition in ssh allows rce/dos | - | - | High | 8.1 | 2024-07-01 12:37:25 | Deep Dive |