| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-7128 | Openshift-console: unauthenticated data exposure | - | - | Medium | 5.3 | 2024-07-26 13:34:20 | Deep Dive |
| CVE-2024-7079 | Openshift-console: unauthenticated installation of helm charts | - | - | Medium | 6.5 | 2024-07-24 15:51:36 | Deep Dive |
| CVE-2024-6501 | Networkmanager: denial of service | - | - | Low | 3.1 | 2024-07-09 19:27:11 | Deep Dive |
| CVE-2024-3653 | Undertow: learningpushhandler can lead to remote memory dos attacks | - | - | Medium | 5.3 | 2024-07-08 21:21:21 | Deep Dive |
| CVE-2024-6409 | Openssh: possible remote code execution due to a race condition in signal handling affecting red hat enterprise linux 9 | - | - | High | 7.0 | 2024-07-08 17:57:11 | Deep Dive |
| CVE-2024-4467 | Qemu-kvm: 'qemu-img info' leads to host file read/write | - | - | High | 7.8 | 2024-07-02 15:57:24 | Deep Dive |
| CVE-2024-6387 | Openssh: regresshion - race condition in ssh allows rce/dos | - | - | High | 8.1 | 2024-07-01 12:37:25 | Deep Dive |
| CVE-2024-5154 | Cri-o: malicious container can create symlink on host | - | - | High | 8.1 | 2024-06-12 08:51:44 | Deep Dive |
| CVE-2024-5037 | Openshift/telemeter: iss check during jwt authentication can be bypassed | - | - | High | 7.5 | 2024-06-05 18:03:23 | Deep Dive |
| CVE-2024-5042 | Submariner-operator: rbac permissions can allow for the spread of node compromises | - | - | Medium | 6.6 | 2024-05-17 13:12:01 | Deep Dive |
| CVE-2024-3727 | Containers/image: digest type does not guarantee valid type | - | - | High | 8.3 | 2024-05-09 14:57:21 | Deep Dive |
| CVE-2024-4369 | Cluster-image-registry-operator: exposes a secret via env variable in pod definition on azure | - | - | Medium | 6.8 | 2024-04-30 23:49:02 | Deep Dive |
| CVE-2024-3154 | Cri-o: arbitrary command injection via pod annotation | - | - | High | 7.2 | 2024-04-26 03:12:38 | Deep Dive |
| CVE-2024-3624 | Mirror-registry: database user and password stored in plain-text | - | - | High | 7.3 | 2024-04-25 17:46:52 | Deep Dive |
| CVE-2024-3625 | Mirror-registry: redis password stored in plain-text | - | - | High | 7.3 | 2024-04-25 17:46:52 | Deep Dive |
| CVE-2024-3623 | Mirror-registry: default database secret key stored in plain-text on initial configuration file | - | - | Medium | 6.5 | 2024-04-25 17:46:47 | Deep Dive |
| CVE-2024-3622 | Mirror-registry: plain-text default csrf secret key | - | - | High | 8.8 | 2024-04-25 17:46:29 | Deep Dive |
| CVE-2024-2905 | Rpm-ostree: world-readable /etc/shadow file | - | - | Medium | 6.2 | 2024-04-25 17:44:16 | Deep Dive |
| CVE-2024-1139 | Cluster-monitoring-operator: credentials leak | - | - | High | 7.7 | 2024-04-25 16:25:01 | Deep Dive |
| CVE-2024-0874 | Coredns: cd bit response is cached and served later | - | - | Medium | 5.3 | 2024-04-25 16:22:44 | Deep Dive |