| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-6409 | Openssh: possible remote code execution due to a race condition in signal handling affecting red hat enterprise linux 9 | - | - | High | 7.0 | 2024-07-08 17:57:11 | Deep Dive |
| CVE-2024-6505 | Qemu-kvm: virtio-net: queue index out-of-bounds access in software rss | - | - | Medium | 6.8 | 2024-07-05 13:51:38 | Deep Dive |
| CVE-2024-6126 | Cockpit: authenticated user can kill any process when enabling pam_env's user_readenv option | - | - | Low | 3.2 | 2024-07-03 14:51:18 | Deep Dive |
| CVE-2024-4467 | Qemu-kvm: 'qemu-img info' leads to host file read/write | - | - | High | 7.8 | 2024-07-02 15:57:24 | Deep Dive |
| CVE-2024-6387 | Openssh: regresshion - race condition in ssh allows rce/dos | - | - | High | 8.1 | 2024-07-01 12:37:25 | Deep Dive |
| CVE-2024-6239 | Poppler: pdfinfo: crash in broken documents when using -dests parameter | - | - | High | 7.5 | 2024-06-21 13:28:24 | Deep Dive |
| CVE-2024-5953 | 389-ds-base: malformed userpassword hash may cause denial of service | - | - | Medium | 5.7 | 2024-06-18 10:01:57 | Deep Dive |
| CVE-2024-5742 | Nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file | - | - | Medium | 6.7 | 2024-06-12 08:53:02 | Deep Dive |
| CVE-2024-5154 | Cri-o: malicious container can create symlink on host | - | - | High | 8.1 | 2024-06-12 08:51:44 | Deep Dive |
| CVE-2024-3183 | Freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force | - | - | High | 8.1 | 2024-06-12 08:18:52 | Deep Dive |
| CVE-2024-2698 | Freeipa: delegation rules allow a proxy service to impersonate any user to access another target service | - | - | High | 8.8 | 2024-06-12 08:03:49 | Deep Dive |
| CVE-2023-4727 | Ca: token authentication bypass vulnerability | - | - | High | 7.5 | 2024-06-11 19:30:26 | Deep Dive |
| CVE-2024-3049 | Booth: specially crafted hash can lead to invalid hmac being accepted by booth server | - | - | Medium | 5.9 | 2024-06-06 05:30:04 | Deep Dive |
| CVE-2024-5564 | Libndp: buffer overflow in route information length field | - | - | High | 8.1 | 2024-05-31 18:31:47 | Deep Dive |
| CVE-2024-3657 | 389-ds-base: potential denial of service via specially crafted kerberos as-req request | Red Hat | Red Hat Directory Server 11.5 E4S for RHEL 8 | High | 7.5 | 2024-05-28 12:53:03 | Deep Dive |
| CVE-2024-2199 | 389-ds-base: malformed userpassword may cause crash at do_modify in slapd/modify.c | - | - | Medium | 5.7 | 2024-05-28 12:04:07 | Deep Dive |
| CVE-2024-4693 | Qemu-kvm: virtio-pci: improper release of configure vector leads to guest triggerable crash | - | - | Medium | 5.5 | 2024-05-10 12:57:41 | Deep Dive |
| CVE-2024-3727 | Containers/image: digest type does not guarantee valid type | - | - | High | 8.3 | 2024-05-09 14:57:21 | Deep Dive |
| CVE-2024-4418 | Libvirt: stack use-after-free in virnetclientioeventloop() | - | - | Medium | 6.2 | 2024-05-08 03:03:05 | Deep Dive |
| CVE-2024-2905 | Rpm-ostree: world-readable /etc/shadow file | - | - | Medium | 6.2 | 2024-04-25 17:44:16 | Deep Dive |