| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-9675 | Buildah: buildah allows arbitrary directory mount | - | - | High | 7.8 | 2024-10-09 14:32:12 | Deep Dive |
| CVE-2024-9407 | Buildah: podman: improper input validation in bind-propagation option of dockerfile run --mount instruction | - | - | Medium | 4.7 | 2024-10-01 20:13:30 | Deep Dive |
| CVE-2024-9341 | Podman: buildah: cri-o: fips crypto-policy directory mounting issue in containers/common go library | - | - | Medium | 5.4 | 2024-10-01 18:52:01 | Deep Dive |
| CVE-2024-9355 | Golang-fips: golang fips zeroed buffer | - | - | Medium | 6.5 | 2024-10-01 18:17:29 | Deep Dive |
| CVE-2024-45496 | Openshift-controller-manager: elevated build pods can lead to node compromise in openshift | - | - | Critical | 9.9 | 2024-09-16 23:58:59 | Deep Dive |
| CVE-2024-7387 | Openshift/builder: path traversal allows command injection in privileged buildcontainer using docker build strategy | - | - | Critical | 9.1 | 2024-09-16 23:58:35 | Deep Dive |
| CVE-2024-8418 | Containers/aardvark-dns: tcp query handling flaw in aardvark-dns leading to denial of service | - | - | High | 7.5 | 2024-09-04 14:24:03 | Deep Dive |
| CVE-2024-6508 | Openshift-console: oauth2 insufficient state parameter entropy | - | - | High | 8.0 | 2024-08-21 05:45:28 | Deep Dive |
| CVE-2024-43168 | Unbound: heap-buffer-overflow in unbound | Red Hat | Red Hat Enterprise Linux 6 | Medium | 4.8 | 2024-08-08 20:25:25 | Deep Dive |
| CVE-2024-43167 | Unbound: null pointer dereference in unbound | Red Hat | Red Hat Enterprise Linux 6 | Low | 2.8 | 2024-08-08 20:24:50 | Deep Dive |
| CVE-2024-7409 | Qemu: denial of service via improper synchronization in qemu nbd server during socket closure | - | - | - | - | 2024-08-05 13:19:27 | Deep Dive |
| CVE-2024-3056 | Podman: kernel: containers in shared ipc namespace are vulnerable to denial of service attack | - | - | High | 7.7 | 2024-08-02 20:37:59 | Deep Dive |
| CVE-2024-7128 | Openshift-console: unauthenticated data exposure | - | - | Medium | 5.3 | 2024-07-26 13:34:20 | Deep Dive |
| CVE-2024-7079 | Openshift-console: unauthenticated installation of helm charts | - | - | Medium | 6.5 | 2024-07-24 15:51:36 | Deep Dive |
| CVE-2024-6501 | Networkmanager: denial of service | - | - | Low | 3.1 | 2024-07-09 19:27:11 | Deep Dive |
| CVE-2024-6409 | Openssh: possible remote code execution due to a race condition in signal handling affecting red hat enterprise linux 9 | - | - | High | 7.0 | 2024-07-08 17:57:11 | Deep Dive |
| CVE-2024-6387 | Openssh: regresshion - race condition in ssh allows rce/dos | - | - | High | 8.1 | 2024-07-01 12:37:25 | Deep Dive |
| CVE-2024-5154 | Cri-o: malicious container can create symlink on host | - | - | High | 8.1 | 2024-06-12 08:51:44 | Deep Dive |
| CVE-2024-5037 | Openshift/telemeter: iss check during jwt authentication can be bypassed | - | - | High | 7.5 | 2024-06-05 18:03:23 | Deep Dive |
| CVE-2024-3727 | Containers/image: digest type does not guarantee valid type | - | - | High | 8.3 | 2024-05-09 14:57:21 | Deep Dive |