Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-1657
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 month, 1 week ago
Ansible automation platform: insecure websocket used when interacting with eda server

A flaw was found in the ansible automation platform. An insecure WebSocket connection was being used in installation from the Ansible rulebook EDA server. An attacker that has access to any machine in the CIDR block could download all rulebook data from the WebSocket, resulting in loss of confidentiality and integrity of the system.

ansible
<2.4
ansible-rulebook
*
automation-eda-controller
*
ansible-automation-platform-installer
*

pkgs.ansible-cmdb

Generate host overview from ansible fact gathering output

pkgs.ansible-lint

Best practices checker for Ansible

pkgs.ansible_2_16

Radically simple IT automation

pkgs.ansible_2_17

Radically simple IT automation

pkgs.ansible_2_18

Radically simple IT automation

pkgs.ansible_2_19

Radically simple IT automation

pkgs.ansible-doctor

Annotation based documentation for your Ansible roles

pkgs.ansible-builder

Ansible execution environment builder

pkgs.ansible-navigator

Text-based user interface (TUI) for Ansible

pkgs.ansible-language-server

Ansible Language Server

pkgs.python312Packages.ansible

Radically simple IT automation

pkgs.python313Packages.ansible

Radically simple IT automation

pkgs.terraform-providers.ansible

pkgs.python312Packages.ansible-core

Radically simple IT automation

pkgs.python313Packages.ansible-core

Radically simple IT automation

pkgs.python312Packages.ansible-compat

Function collection that help interacting with various versions of Ansible

pkgs.python312Packages.ansible-kernel

Ansible kernel for Jupyter

pkgs.python312Packages.ansible-runner

Helps when interfacing with Ansible

pkgs.python312Packages.pytest-ansible

Plugin for pytest to simplify calling ansible modules from tests or fixtures

pkgs.python313Packages.ansible-compat

Function collection that help interacting with various versions of Ansible

pkgs.python313Packages.ansible-kernel

Ansible kernel for Jupyter

pkgs.python313Packages.ansible-runner

Helps when interfacing with Ansible

pkgs.python313Packages.pytest-ansible

Plugin for pytest to simplify calling ansible modules from tests or fixtures

pkgs.vscode-extensions.redhat.ansible

Ansible language support

pkgs.python312Packages.ansible-builder

Ansible execution environment builder

pkgs.python313Packages.ansible-builder

Ansible execution environment builder

pkgs.python312Packages.ansible-pylibssh

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python312Packages.ansible-vault-rw

This project aim to R/W an ansible-vault yaml file

pkgs.python313Packages.ansible-pylibssh

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python313Packages.ansible-vault-rw

This project aim to R/W an ansible-vault yaml file
Package maintainers: 13
CVE-2024-44056
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 1 month, 1 week ago
WordPress Mantra theme <= 3.3.2 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Mantra allows Stored XSS.This issue affects Mantra: from n/a through 3.3.2.

mantra
=<3.3.2

pkgs.mantra

Tool used to hunt down API key leaks in JS files and pages
Package maintainers: 1
CVE-2024-8775
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 month, 1 week ago
Ansible: exposure of sensitive information in ansible vault files due to improper logging

A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.

ansible
ansible-core
=<2.17.4
*
ee-29-container
*
ee-minimal-container
*
ansible-builder-container
*
discovery-server-container
rhelai1/bootc-nvidia-rhel9
discovery/discovery-ui-rhel9
*
discovery/discovery-server-rhel9
*
ansible-automation-platform/ee-29-rhel8
*
ansible-automation-platform/ee-minimal-rhel8
*
ansible-automation-platform/ee-minimal-rhel9
*
ansible-automation-platform/ansible-builder-rhel8
*
ansible-automation-platform/ansible-builder-rhel9
*

pkgs.ansible-cmdb

Generate host overview from ansible fact gathering output

pkgs.ansible-lint

Best practices checker for Ansible

pkgs.ansible_2_16

Radically simple IT automation

pkgs.ansible_2_17

Radically simple IT automation

pkgs.ansible_2_18

Radically simple IT automation

pkgs.ansible_2_19

Radically simple IT automation

pkgs.ansible-doctor

Annotation based documentation for your Ansible roles

pkgs.ansible-builder

Ansible execution environment builder

pkgs.ansible-navigator

Text-based user interface (TUI) for Ansible

pkgs.ansible-language-server

Ansible Language Server

pkgs.python312Packages.ansible

Radically simple IT automation

pkgs.python313Packages.ansible

Radically simple IT automation

pkgs.terraform-providers.ansible

pkgs.python312Packages.ansible-core

Radically simple IT automation

pkgs.python313Packages.ansible-core

Radically simple IT automation

pkgs.python312Packages.ansible-compat

Function collection that help interacting with various versions of Ansible

pkgs.python312Packages.ansible-kernel

Ansible kernel for Jupyter

pkgs.python312Packages.ansible-runner

Helps when interfacing with Ansible

pkgs.python312Packages.pytest-ansible

Plugin for pytest to simplify calling ansible modules from tests or fixtures

pkgs.python313Packages.ansible-compat

Function collection that help interacting with various versions of Ansible

pkgs.python313Packages.ansible-kernel

Ansible kernel for Jupyter

pkgs.python313Packages.ansible-runner

Helps when interfacing with Ansible

pkgs.python313Packages.pytest-ansible

Plugin for pytest to simplify calling ansible modules from tests or fixtures

pkgs.vscode-extensions.redhat.ansible

Ansible language support

pkgs.python312Packages.ansible-builder

Ansible execution environment builder

pkgs.python313Packages.ansible-builder

Ansible execution environment builder

pkgs.python312Packages.ansible-pylibssh

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python312Packages.ansible-vault-rw

This project aim to R/W an ansible-vault yaml file

pkgs.python313Packages.ansible-pylibssh

Python bindings to client functionality of libssh specific to Ansible use case

pkgs.python313Packages.ansible-vault-rw

This project aim to R/W an ansible-vault yaml file
Package maintainers: 13
CVE-2024-0874
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 1 month, 1 week ago
Coredns: cd bit response is cached and served later

A flaw was found in coredns. This issue could lead to invalid cache entries returning due to incorrectly implemented caching.

coredns
<1.11.2
openshift4/ose-coredns
*
openshift4/ose-coredns-rhel9
*
rhacm2/lighthouse-agent-rhel8
rhacm2/lighthouse-agent-rhel9
openshift-logging/logging-loki-rhel8
openshift-logging/logging-loki-rhel9
rhacm2-tech-preview/lighthouse-agent-rhel8

pkgs.coredns

DNS server that runs middleware
Package maintainers: 4
CVE-2024-8443
3.4 LOW
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 1 month, 1 week ago
Libopensc: heap buffer overflow in openpgp driver when generating key

A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.

opensc
<0.26.0

pkgs.opensc

Set of libraries and utilities to access smart cards

pkgs.openscad

3D parametric model compiler

pkgs.openscap

NIST Certified SCAP 1.2 toolkit

pkgs.openscad-lsp

LSP (Language Server Protocol) server for OpenSCAD

pkgs.openscenegraph

3D graphics toolkit

pkgs.openscad-unstable

3D parametric model compiler (unstable)

pkgs.vscode-extensions.antyos.openscad

OpenSCAD highlighting, snippets, and more for VSCode
Package maintainers: 8
CVE-2023-6841
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month, 1 week ago
Keycloak: amount of attributes per object is not limited and it may lead to dos

A denial of service vulnerability was found in keycloak where the amount of attributes per object is not limited,an attacker by sending repeated HTTP requests could cause a resource exhaustion when the application send back rows with long attribute values.

keycloak
<24.0.0
rh-sso7-keycloak

pkgs.keycloak

Identity and access management for modern applications and services

pkgs.terraform-providers.keycloak

pkgs.python312Packages.python-keycloak

Provides access to the Keycloak API

pkgs.python313Packages.python-keycloak

Provides access to the Keycloak API
Package maintainers: 4
CVE-2024-45034
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 1 week ago
Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes

Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author. Users are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.

apache-airflow
<2.10.1

pkgs.apache-airflow

Programmatically author, schedule and monitor data pipelines
Package maintainers: 3
CVE-2024-45498
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 1 week ago
Apache Airflow: Command Injection in an example DAG

Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873  for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.

apache-airflow
==2.10.0

pkgs.apache-airflow

Programmatically author, schedule and monitor data pipelines
Package maintainers: 3
CVE-2024-8445
5.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month, 1 week ago
389-ds-base: server crash while modifying `userpassword` using malformed input (incomplete fix for cve-2024-2199)

The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenarios. In certain product versions, an authenticated user may cause a server crash while modifying `userPassword` using malformed input.

389-ds-base
==3.1.1
*
389-ds:1.4/389-ds-base
redhat-ds:11/389-ds-base
redhat-ds:12/389-ds-base

pkgs._389-ds-base

Enterprise-class Open Source LDAP server for Linux
Package maintainers: 1
CVE-2024-8418
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month, 1 week ago
Containers/aardvark-dns: tcp query handling flaw in aardvark-dns leading to denial of service

A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns.

rhcos
aardvark-dns
*
containers-common
containers/aardvark-dns
==1.12.1
==1.12.0
container-tools:rhel8/aardvark-dns
container-tools:rhel8/containers-common

pkgs.aardvark-dns

Authoritative dns server for A/AAAA container records
Package maintainers: 2