| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2023-39329 | Openjpeg: resource exhaustion will occur in the opj_t1_decode_cblks function in the tcd.c | - | - | Medium | 6.5 | 2024-07-13 03:09:19 | Deep Dive |
| CVE-2023-39327 | Openjpeg: malicious files can cause the program to enter a large loop | - | - | Medium | 4.3 | 2024-07-13 03:08:49 | Deep Dive |
| CVE-2024-6501 | Networkmanager: denial of service | - | - | Low | 3.1 | 2024-07-09 19:27:11 | Deep Dive |
| CVE-2024-6237 | 389-ds-base: unauthenticated user can trigger a dos by sending a specific extended search request | - | - | Medium | 6.5 | 2024-07-09 16:39:59 | Deep Dive |
| CVE-2023-39328 | Openjpeg: denail of service via crafted image file | - | - | Medium | 5.5 | 2024-07-09 13:53:07 | Deep Dive |
| CVE-2024-6409 | Openssh: possible remote code execution due to a race condition in signal handling affecting red hat enterprise linux 9 | - | - | High | 7.0 | 2024-07-08 17:57:11 | Deep Dive |
| CVE-2024-6505 | Qemu-kvm: virtio-net: queue index out-of-bounds access in software rss | - | - | Medium | 6.8 | 2024-07-05 13:51:38 | Deep Dive |
| CVE-2024-6126 | Cockpit: authenticated user can kill any process when enabling pam_env's user_readenv option | - | - | Low | 3.2 | 2024-07-03 14:51:18 | Deep Dive |
| CVE-2024-4467 | Qemu-kvm: 'qemu-img info' leads to host file read/write | - | - | High | 7.8 | 2024-07-02 15:57:24 | Deep Dive |
| CVE-2024-6387 | Openssh: regresshion - race condition in ssh allows rce/dos | - | - | High | 8.1 | 2024-07-01 12:37:25 | Deep Dive |
| CVE-2024-6239 | Poppler: pdfinfo: crash in broken documents when using -dests parameter | - | - | High | 7.5 | 2024-06-21 13:28:24 | Deep Dive |
| CVE-2024-5953 | 389-ds-base: malformed userpassword hash may cause denial of service | - | - | Medium | 5.7 | 2024-06-18 10:01:57 | Deep Dive |
| CVE-2024-5742 | Nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file | - | - | Medium | 6.7 | 2024-06-12 08:53:02 | Deep Dive |
| CVE-2024-5154 | Cri-o: malicious container can create symlink on host | - | - | High | 8.1 | 2024-06-12 08:51:44 | Deep Dive |
| CVE-2024-3183 | Freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force | - | - | High | 8.1 | 2024-06-12 08:18:52 | Deep Dive |
| CVE-2024-2698 | Freeipa: delegation rules allow a proxy service to impersonate any user to access another target service | - | - | High | 8.8 | 2024-06-12 08:03:49 | Deep Dive |
| CVE-2023-4727 | Ca: token authentication bypass vulnerability | - | - | High | 7.5 | 2024-06-11 19:30:26 | Deep Dive |
| CVE-2024-3049 | Booth: specially crafted hash can lead to invalid hmac being accepted by booth server | - | - | Medium | 5.9 | 2024-06-06 05:30:04 | Deep Dive |
| CVE-2024-5564 | Libndp: buffer overflow in route information length field | - | - | High | 8.1 | 2024-05-31 18:31:47 | Deep Dive |
| CVE-2024-3657 | 389-ds-base: potential denial of service via specially crafted kerberos as-req request | Red Hat | Red Hat Directory Server 11.5 E4S for RHEL 8 | High | 7.5 | 2024-05-28 12:53:03 | Deep Dive |