cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-0677,https://securityvulnerability.io/vulnerability/CVE-2025-0677,Symlink Lookup Vulnerability in GRUB2 by Red Hat,"A flaw in GRUB2 arises during symlink lookups in its UFS module, where the system fails to correctly check for symlink data size overflow. This oversight can result in grub_malloc() being invoked with insufficient allocated memory. Consequently, the grub_ufs_lookup_symlink() function may overwrite memory bounds, resulting in heap corruption. Attackers could exploit this vulnerability by crafting malicious filesystems, enabling arbitrary code execution and potentially circumventing secure boot protections.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T18:23:53.496Z,0 CVE-2025-0624,https://securityvulnerability.io/vulnerability/CVE-2025-0624,Out-of-Bounds Write Vulnerability in GRUB2 Network Boot Process,"A vulnerability in the GRUB2 bootloader allows an attacker on the same network segment to execute arbitrary code by exploiting a flaw in the network boot process. When GRUB2 attempts to find a configuration file, it copies data from a user-controlled environment variable into an internal buffer without adequately checking the variable's length. This oversight can lead to an out-of-bounds write, potentially allowing for remote code execution that bypasses secure boot protections, posing serious security risks.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",7.6,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T18:23:21.463Z,0 CVE-2025-1118,https://securityvulnerability.io/vulnerability/CVE-2025-1118,Memory Information Exposure in Grub2 by Red Hat,"A flaw exists in Grub2's functionality where the dump command can be executed even in lockdown mode. This oversight allows attackers to access sensitive memory contents, such as cryptographic signatures and salts. By exploiting this vulnerability, users with the necessary privileges could extract confidential information, which poses a significant threat to the integrity and security of systems that rely on Grub2 for boot management.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",4.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T17:54:27.651Z,0 CVE-2024-45777,https://securityvulnerability.io/vulnerability/CVE-2024-45777,Out-of-Bound Write Vulnerability in Grub2 by Red Hat,"A flaw in Grub2 affects the calculation of the translation buffer when processing language .mo files. Specifically, the issue arises in the grub_gettext_getstr_from_position() function, which may lead to an out-of-bound write scenario. This vulnerability allows attackers to manipulate Grub2’s sensitive heap data, posing a risk of circumventing secure boot protections. The potential exploitation of this vulnerability necessitates immediate attention from users to safeguard against unauthorized access and system compromise.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-19T17:54:01.926Z,0 CVE-2025-0622,https://securityvulnerability.io/vulnerability/CVE-2025-0622,Use-After-Free Vulnerability in GRUB2 Affecting Red Hat Products,"A flaw has been identified in the GRUB2 bootloader's command/gpg functionality. When modules are unloaded, any hooks they created may not be removed properly. This can lead to a use-after-free condition, which, if successfully exploited, may allow an attacker to execute arbitrary code. This capability can potentially enable the attacker to bypass secure boot safeguards, thereby undermining system integrity.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-18T19:26:13.082Z,0 CVE-2024-45783,https://securityvulnerability.io/vulnerability/CVE-2024-45783,HFS+ Filesystem Driver Flaw in GRUB2 Affects Red Hat Linux,"A vulnerability has been identified in the HFS+ filesystem driver of GRUB2, where the failure to mount an HFS+ filesystem does not correctly handle the ERRNO value. This oversight can lead to a NULL pointer access, potentially resulting in unexpected behavior or crashes in systems that rely on this driver. Affected users should evaluate their systems for updates and consider the implications of this flaw on their operations.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",4.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-18T19:26:07.767Z,0 CVE-2024-45781,https://securityvulnerability.io/vulnerability/CVE-2024-45781,Heap Out-of-Bounds Write Vulnerability in Grub2 by Red Hat,"A significant vulnerability exists in Grub2 where the software improperly validates the length of symbolic link names sourced from a UFS filesystem. This failure to validate input string lengths can lead to a heap out-of-bounds write. As a result, this flaw may cause data integrity issues and allow attackers to bypass secure boot mechanisms, posing serious security risks to affected systems.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-18T19:25:57.168Z,0 CVE-2024-45776,https://securityvulnerability.io/vulnerability/CVE-2024-45776,Integer Overflow Vulnerability in GRUB2 Affecting Red Hat Products,"In the GRUB2 bootloader, a flaw exists within the grub_mofile_open() function, which does not properly validate the integer size when processing .mo language files. This oversight can result in an overflow during the allocation of internal buffers. An attacker could exploit this vulnerability by crafting a malicious .mo file, potentially allowing for out-of-bound read and write operations. Such exploitation could lead to the leakage of sensitive data or the corruption of critical data, putting secure boot mechanisms at risk.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-18T19:25:45.929Z,0 CVE-2024-45775,https://securityvulnerability.io/vulnerability/CVE-2024-45775,Memory Allocation Flaw in Grub2 Affects Red Hat Products,"A memory allocation flaw has been identified in Grub2, specifically in the grub_extcmd_dispatcher() function. This flaw arises when grub_arg_list_alloc() is invoked for memory allocation without adequate checks for allocation failure. In instances where memory allocation does not succeed, the resulting NULL pointer is processed by the parse_option() function, potentially leading to system crashes or, in rare cases, corruption of the Interrupt Vector Table (IVT) data. This vulnerability emphasizes the necessity for proper memory management and error handling in critical system components.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",5.2,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-18T19:25:40.364Z,0 CVE-2025-26465,https://securityvulnerability.io/vulnerability/CVE-2025-26465,OpenSSH Vulnerability Allows Man-in-the-Middle Attack via Host Key Verification Flaw,"A significant vulnerability has been identified in OpenSSH when the VerifyHostKeyDNS option is activated. This flaw allows a malicious actor to conduct a man-in-the-middle attack by impersonating a legitimate server. The crux of the issue lies in the mishandling of error codes by OpenSSH during the host key verification process under certain conditions. For the attack to be successful, the attacker must first exhaust the client’s memory resources, which adds considerable complexity to the execution of the attack. It is crucial for users and administrators to be aware of this flaw and apply necessary mitigations to safeguard their systems.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.8,MEDIUM,0.0004299999854993075,false,,true,false,true,2025-02-19T01:53:27.000Z,true,true,false,,2025-02-18T18:27:16.843Z,5361 CVE-2024-45774,https://securityvulnerability.io/vulnerability/CVE-2024-45774,Out-of-Bounds Write Vulnerability in Grub2 Affects Red Hat Products,"A vulnerability exists in the Grub2 bootloader, where a specially crafted JPEG file can exploit the JPEG parser, leading to improper boundary checks on internal buffers. This flaw can allow for out-of-bounds write actions, potentially enabling an attacker to overwrite sensitive data. While the direct impact on secure boot protections requires further analysis, the risk of unauthorized access to critical information poses a significant concern for users relying on Grub2 in their systems.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-18T18:25:09.511Z,0 CVE-2024-12243,https://securityvulnerability.io/vulnerability/CVE-2024-12243,Denial-of-Service Vulnerability in GnuTLS Affecting libtasn1,"A vulnerability has been identified in GnuTLS due to an inefficient algorithm within libtasn1 responsible for ASN.1 data processing. This flaw permits a remote attacker to craft specific DER-encoded certificates that can compel GnuTLS to consume excessive resources, leading to potential unresponsiveness or slow performance. Consequently, this may result in a denial-of-service condition, disrupting normal operations.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",5.3,MEDIUM,0.0005200000014156103,false,,false,false,false,,false,false,false,,2025-02-10T15:28:10.328Z,0 CVE-2024-12133,https://securityvulnerability.io/vulnerability/CVE-2024-12133,Denial of Service Vulnerability in libtasn1 Affects Red Hat Products,"A vulnerability in libtasn1 leads to inefficient processing of certain certificate data, particularly when handling a large number of elements. This inefficiency can result in excessive delays or system crashes. Attackers could exploit this flaw by sending a specially crafted certificate, which may disrupt service availability and lead to denial of service conditions in affected systems.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",5.3,MEDIUM,0.0005200000014156103,false,,false,false,false,,false,false,false,,2025-02-10T15:28:03.193Z,0 CVE-2024-11831,https://securityvulnerability.io/vulnerability/CVE-2024-11831,Cross-site Scripting Vulnerability in Serialize-Javascript by Yahoo,"A vulnerability exists in the serialize-javascript module due to inadequate sanitization of inputs, particularly JavaScript object types and regex expressions. This flaw allows attackers to inject malicious code that may be executed in a web browser context when the serialized data is deserialized. This poses significant risks in scenarios where the serialized outputs are shared with web clients, rendering the web applications reliant on this package susceptible to XSS attacks.",Red Hat,"Red Hat Advanced Cluster Security 4.4,Red Hat Advanced Cluster Security 4.5,Cryostat 3,Logging Subsystem For Red Hat Openshift,Migration Toolkit For Applications 7,Migration Toolkit For Virtualization,.net 6.0 On Red Hat Enterprise Linux,Openshift Lightspeed,Openshift Pipelines,Openshift Serverless,Openshift Service Mesh 2,Red Hat 3scale Api Management Platform 2,Red Hat Advanced Cluster Management For Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Build Of Apache Camel - Hawtio,Red Hat Build Of Apicurio Registry,Red Hat Build Of Keycloak,Red Hat Build Of Optaplanner 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Discovery,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Fuse 7,Red Hat Integration Camel K,Red Hat Jboss Enterprise Application Platform 7,Red Hat Jboss Enterprise Application Platform 8,Red Hat Jboss Enterprise Application Platform Expansion Pack,Red Hat Openshift Ai (rhoai),Red Hat Openshift Container Platform 3.11,Red Hat Openshift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Dev Spaces,Red Hat Openshift Distributed Tracing 3,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Single Sign-on 7,Red Hat Trusted Profile Analyzer",5.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,false,,2025-02-10T15:27:46.732Z,0 CVE-2025-0650,https://securityvulnerability.io/vulnerability/CVE-2025-0650,Access Control Flaw in Open Virtual Network by Red Hat,"A flaw exists in the Open Virtual Network (OVN) where specially crafted UDP packets can bypass egress access control lists (ACLs). This vulnerability is present when a logical switch with DNS records configured and associated egress ACLs is utilized. Attackers could potentially exploit this flaw to gain unauthorized access to virtual machines and containers, leading to security breaches in OVN networks.",Red Hat,"Fast Datapath For Red Hat Enterprise Linux 8,Fast Datapath For Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",8.1,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-01-23T16:34:31.390Z,0 CVE-2024-11218,https://securityvulnerability.io/vulnerability/CVE-2024-11218,Container Breakout Vulnerability in Podman and Buildah,"A vulnerability exists in Podman and Buildah that allows for a container breakout, particularly when using the '--jobs=2' option during the build process of a malicious Containerfile. This vulnerability exploits a race condition that may lead to the exposure of files and directories on the host system. Though using SELinux can provide some degree of mitigation, it does not completely prevent the enumeration of sensitive host file systems, posing a risk for affected users.",Red Hat,"Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.6 Telecommunications Update Service,Red Hat Enterprise Linux 8.6 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 9.4 Extended Update Support,Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.16,Red Hat Openshift Container Platform 4.17,Red Hat Openshift Container Platform 4",8.6,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-01-22T04:55:30.649Z,359 CVE-2024-12084,https://securityvulnerability.io/vulnerability/CVE-2024-12084,Heap-based Buffer Overflow Vulnerability in Rsync Daemon by Red Hat,"A heap-based buffer overflow vulnerability has been identified in the rsync daemon, attributable to improper management of attacker-controlled checksum lengths (s2length). This weakness arises when the maximum digest length exceeds the designated fixed length of 16 bytes, allowing an attacker to exploit the flaw and write outside the allocated memory in the sum2 buffer. Such exploitation could potentially compromise system integrity and lead to unauthorized access or data manipulation.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",9.8,CRITICAL,0.0006300000241026282,false,,true,false,true,2025-01-15T17:00:18.000Z,false,true,true,2025-01-23T10:52:02.325Z,2025-01-15T14:16:35.363Z,6131 CVE-2024-12085,https://securityvulnerability.io/vulnerability/CVE-2024-12085,Rsync Daemon Memory Leak Vulnerability in Red Hat Products,"A vulnerability exists in the rsync daemon which can be exploited during the comparison of file checksums. An attacker can manipulate the checksum length, leading to potential leaks of one byte of uninitialized stack data at a time. This weakness could allow unauthorized access to sensitive information in memory, posing a security risk to affected systems.",Red Hat,"Red Hat Enterprise Linux 6 Extended Lifecycle Support - Extension,Red Hat Enterprise Linux 7 Extended Lifecycle Support,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.2 Advanced Update Support,Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.4 Telecommunications Update Service,Red Hat Enterprise Linux 8.4 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.6 Telecommunications Update Service,Red Hat Enterprise Linux 8.6 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 9.4 Extended Update Support,Red Hat Openshift Container Platform 4.12,Red Hat Openshift Container Platform 4.15,Red Hat Openshift Container Platform 4.16,Red Hat Openshift Container Platform 4.17,Rhol-5.8-rhel-9,Rhol-5.9-rhel-9",7.5,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-01-14T18:15:00.000Z,242 CVE-2024-12087,https://securityvulnerability.io/vulnerability/CVE-2024-12087,Path Traversal Vulnerability in rsync Affects Red Hat,"A path traversal vulnerability in rsync allows a malicious server to exploit the `--inc-recursive` option, which is often enabled by default. This vulnerability arises from insufficient symlink verification and deduplication checks that occur on a per-file-list basis. An attacker could leverage this flaw to write files outside of the client's intended destination directory, potentially placing harmful files in arbitrary locations that mimic valid directories and paths on the client system.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.5,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-01-14T18:15:00.000Z,0 CVE-2024-12088,https://securityvulnerability.io/vulnerability/CVE-2024-12088,Path Traversal Vulnerability in Rsync Affects Multiple Platforms,"A vulnerability exists in Rsync when utilizing the `--safe-links` option. The software fails to properly validate symbolic link destinations, allowing the potential for a path traversal attack. This flaw may permit unauthorized file writes to locations outside the intended directory, posing a significant risk to systems using affected Rsync versions. It is crucial for users to evaluate their use of Rsync and apply any necessary patches to mitigate this risk.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.5,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-01-14T18:15:00.000Z,0 CVE-2024-12086,https://securityvulnerability.io/vulnerability/CVE-2024-12086,File Enumeration Vulnerability in rsync by Red Hat,"A vulnerability in rsync has been identified that allows a server to expose the contents of files located on a client's machine. This issue arises during the process of file synchronization, where the rsync server transmits checksums of its local files to a client for comparison, determining which files need to be transferred. By exploiting this vulnerability, an attacker can craft specific checksum values to coax the rsync server into divulging sensitive information about arbitrary files. This enables a potential attacker to reconstruct the data from these files byte by byte, posing a significant risk to the integrity and confidentiality of sensitive information.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.1,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-01-14T17:37:54.960Z,0 CVE-2024-9676,https://securityvulnerability.io/vulnerability/CVE-2024-9676,Podman Vulnerable to Symlink Traversal Attack,"A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.",Red Hat,",Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.4 Extended Update Support,Red Hat Openshift Container Platform 4.12,Red Hat Openshift Container Platform 4.13,Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15,Red Hat Openshift Container Platform 4.16,Red Hat Openshift Container Platform 4.17,Openshift Developer Tools And Services,Red Hat Openshift Container Platform 4,Red Hat Quay 3",6.5,MEDIUM,0.001120000029914081,false,,false,false,false,,,false,false,,2024-10-15T15:27:33.665Z,0 CVE-2024-8418,https://securityvulnerability.io/vulnerability/CVE-2024-8418,Containers/aardvark-dns: tcp query handling flaw in aardvark-dns leading to denial of service,"Aardvark-dns has a vulnerability that allows attackers to conduct Denial of Service (DoS) attacks through improper handling of TCP DNS queries. The flaw arises from the serial processing of these queries, which permits an attacker to maintain a TCP connection indefinitely. This behavior can lead to the DNS server becoming unresponsive as legitimate queries time out, greatly affecting DNS service availability and disrupting normal operations for users.",Red Hat,"Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",7.5,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-04T15:15:00.000Z,0 CVE-2024-43167,https://securityvulnerability.io/vulnerability/CVE-2024-43167,Segmentation Fault Vulnerability in Unbound's ub_ctx_set_fwd Function,"A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4,Red Hat Openstack Platform 16.2,Red Hat Openstack Platform 17.1,Red Hat Openstack Platform 18.0",2.8,LOW,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-08-12T13:38:00.000Z,0 CVE-2024-43168,https://securityvulnerability.io/vulnerability/CVE-2024-43168,Unbound: heap-buffer-overflow in unbound,"A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4,Red Hat Openstack Platform 16.2,Red Hat Openstack Platform 17.1,Red Hat Openstack Platform 18.0",4.8,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-08-12T13:38:00.000Z,0