| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-8676 | Cri-o: checkpoint restore can be triggered from different namespaces | - | - | High | 7.4 | 2024-11-26 19:15:48 | Deep Dive |
| CVE-2024-52337 | Tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method | - | - | Medium | 5.5 | 2024-11-26 15:21:18 | Deep Dive |
| CVE-2024-52336 | Tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root | - | - | High | 7.8 | 2024-11-26 15:21:14 | Deep Dive |
| CVE-2024-52616 | Avahi: avahi wide-area dns predictable transaction ids | - | - | Medium | 5.3 | 2024-11-21 20:41:12 | Deep Dive |
| CVE-2024-52615 | Avahi: avahi wide-area dns uses constant source port | - | - | Medium | 5.3 | 2024-11-21 20:34:01 | Deep Dive |
| CVE-2023-39180 | Kernel: ksmbd: read request memory leak denial-of-service vulnerability | - | - | Medium | 4.0 | 2024-11-18 09:53:20 | Deep Dive |
| CVE-2023-39179 | Kernel: ksmbd: read request out-of-bounds read information disclosure vulnerability | - | - | High | 7.5 | 2024-11-18 09:51:10 | Deep Dive |
| CVE-2023-39176 | Kernel: ksmbd: transform header out-of-bounds read information disclosure vulnerability | - | - | Medium | 5.8 | 2024-11-18 09:50:46 | Deep Dive |
| CVE-2020-25720 | Samba: check attribute access rights for ldap adds of computers | - | - | High | 7.5 | 2024-11-17 10:17:08 | Deep Dive |
| CVE-2024-7730 | Qemu-kvm: virtio-snd: heap buffer overflow in virtio_snd_pcm_in_cb() | - | - | High | 7.4 | 2024-11-14 12:11:50 | Deep Dive |
| CVE-2024-3447 | Qemu: sdhci: heap buffer overflow in sdhci_write_dataport() | - | - | Medium | 6.0 | 2024-11-14 12:10:37 | Deep Dive |
| CVE-2023-4458 | Kernel: ksmbd: smb2_open out-of-bounds read information disclosure vulnerability | - | - | Medium | 4.0 | 2024-11-14 12:09:13 | Deep Dive |
| CVE-2023-4134 | Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() | - | - | Medium | 5.5 | 2024-11-14 10:44:43 | Deep Dive |
| CVE-2024-49395 | Mutt: neomutt: bcc email header field is indirectly leaked by cryptographic info block | - | - | Medium | 5.3 | 2024-11-12 02:08:04 | Deep Dive |
| CVE-2024-49394 | Mutt: neomutt: in-reply-to email header field it not protected by cryptograpic signing | - | - | Medium | 5.3 | 2024-11-12 02:07:20 | Deep Dive |
| CVE-2024-49393 | Mutt: neomutt: to and cc email header fields are not protected by cryptographic signing | - | - | Medium | 6.5 | 2024-11-12 01:55:41 | Deep Dive |
| CVE-2024-11079 | Ansible-core: unsafe tagging bypass via hostvars object in ansible-core | - | - | Medium | 5.5 | 2024-11-11 23:32:56 | Deep Dive |
| CVE-2024-10963 | Pam: improper hostname interpretation in pam_access leads to access control bypass | - | - | High | 7.4 | 2024-11-07 16:02:35 | Deep Dive |
| CVE-2024-9902 | Ansible-core: ansible-core user may read/write unauthorized content | - | - | Medium | 6.3 | 2024-11-06 09:56:55 | Deep Dive |
| CVE-2024-10573 | Mpg123: buffer overflow when writing decoded pcm samples | - | - | Medium | 6.7 | 2024-10-31 18:31:56 | Deep Dive |