| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-11217 | Oauth-server-container: oauth-server-container logs client secret in debug level | - | - | Medium | 4.9 | 2024-11-15 20:48:46 | Deep Dive |
| CVE-2022-2232 | Keycloak: ldap injection on username input | Red Hat | Red Hat Single Sign-On 7 | High | 7.5 | 2024-11-14 14:51:15 | Deep Dive |
| CVE-2024-7730 | Qemu-kvm: virtio-snd: heap buffer overflow in virtio_snd_pcm_in_cb() | - | - | High | 7.4 | 2024-11-14 12:11:50 | Deep Dive |
| CVE-2024-3447 | Qemu: sdhci: heap buffer overflow in sdhci_write_dataport() | - | - | Medium | 6.0 | 2024-11-14 12:10:37 | Deep Dive |
| CVE-2023-4458 | Kernel: ksmbd: smb2_open out-of-bounds read information disclosure vulnerability | - | - | Medium | 4.0 | 2024-11-14 12:09:13 | Deep Dive |
| CVE-2023-4134 | Kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work() | - | - | Medium | 5.5 | 2024-11-14 10:44:43 | Deep Dive |
| CVE-2024-49395 | Mutt: neomutt: bcc email header field is indirectly leaked by cryptographic info block | - | - | Medium | 5.3 | 2024-11-12 02:08:04 | Deep Dive |
| CVE-2024-49394 | Mutt: neomutt: in-reply-to email header field it not protected by cryptograpic signing | - | - | Medium | 5.3 | 2024-11-12 02:07:20 | Deep Dive |
| CVE-2024-49393 | Mutt: neomutt: to and cc email header fields are not protected by cryptographic signing | - | - | Medium | 6.5 | 2024-11-12 01:55:41 | Deep Dive |
| CVE-2024-11079 | Ansible-core: unsafe tagging bypass via hostvars object in ansible-core | - | - | Medium | 5.5 | 2024-11-11 23:32:56 | Deep Dive |
| CVE-2024-10963 | Pam: improper hostname interpretation in pam_access leads to access control bypass | - | - | High | 7.4 | 2024-11-07 16:02:35 | Deep Dive |
| CVE-2023-1973 | Undertow: unrestricted request storage leads to memory exhaustion | Red Hat | Red Hat JBoss Enterprise Application Platform 7 | High | 7.5 | 2024-11-07 10:01:58 | Deep Dive |
| CVE-2023-1932 | Hibernate-validator: rendering of invalid html with safehtml leads to html injection and xss | Red Hat | A-MQ Clients 2 | Medium | 6.1 | 2024-11-07 10:00:52 | Deep Dive |
| CVE-2024-6861 | Foreman: foreman: oauth secret exposure via unauthenticated access to the graphql api | - | - | High | 7.5 | 2024-11-06 14:54:51 | Deep Dive |
| CVE-2024-9902 | Ansible-core: ansible-core user may read/write unauthorized content | - | - | Medium | 6.3 | 2024-11-06 09:56:55 | Deep Dive |
| CVE-2024-10573 | Mpg123: buffer overflow when writing decoded pcm samples | - | - | Medium | 6.7 | 2024-10-31 18:31:56 | Deep Dive |
| CVE-2024-8553 | Foreman: read-only access to entire db from templates | - | - | Medium | 6.3 | 2024-10-31 15:01:16 | Deep Dive |
| CVE-2024-9632 | Xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | - | - | High | 7.8 | 2024-10-30 07:42:35 | Deep Dive |
| CVE-2024-10295 | Gateway: apicast basic auth bypass via malformed base64 headerssending non-base64 'basic' auth with special characters causes apicast to incorrectly authenticate a request | - | - | High | 7.5 | 2024-10-24 17:55:10 | Deep Dive |
| CVE-2024-10041 | Pam: libpam: libpam vulnerable to read hashed password | - | - | Medium | 4.7 | 2024-10-23 13:46:28 | Deep Dive |