Lookup for vulnerable packages by Package URL.

Purlpkg:gem/katello@3.2.0.rc1
Typegem
Namespace
Namekatello
Version3.2.0.rc1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.19.1
Latest_non_vulnerable_version4.19.1
Affected_by_vulnerabilities
0
url VCID-asqu-5r9h-9yav
vulnerability_id VCID-asqu-5r9h-9yav
summary
SQL Injection
An SQL injection was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:0336
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0336
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14623.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14623.json
2
reference_url https://access.redhat.com/security/cve/CVE-2018-14623
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2018-14623
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14623
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33567
published_at 2026-04-08T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.3354
published_at 2026-04-18T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33564
published_at 2026-04-16T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33529
published_at 2026-04-13T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33553
published_at 2026-04-12T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33594
published_at 2026-04-11T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33601
published_at 2026-04-09T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33496
published_at 2026-04-01T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.3365
published_at 2026-04-02T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33684
published_at 2026-04-04T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33523
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14623
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1623719
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1623719
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14623
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14623
6
reference_url https://github.com/Katello/katello
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/katello/CVE-2018-14623.yml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/katello/CVE-2018-14623.yml
8
reference_url https://web.archive.org/web/20200227100255/http://www.securityfocus.com/bid/106224
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200227100255/http://www.securityfocus.com/bid/106224
9
reference_url http://www.securityfocus.com/bid/106224
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106224
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14623
reference_id CVE-2018-14623
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-14623
11
reference_url https://github.com/advisories/GHSA-527r-mfmj-prqf
reference_id GHSA-527r-mfmj-prqf
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-527r-mfmj-prqf
12
reference_url https://github.com/advisories/GHSA-jx5v-788g-qw58
reference_id GHSA-jx5v-788g-qw58
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jx5v-788g-qw58
fixed_packages
0
url pkg:gem/katello@3.10.1
purl pkg:gem/katello@3.10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bsbd-bsbq-7qdk
1
vulnerability VCID-zqkc-zwfa-1qfx
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/katello@3.10.1
aliases CVE-2018-14623, GHSA-jx5v-788g-qw58
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-asqu-5r9h-9yav
1
url VCID-bsbd-bsbq-7qdk
vulnerability_id VCID-bsbd-bsbq-7qdk
summary
Katello cleartext password storage issue
A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.2. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users.
references
0
reference_url https://access.redhat.com/errata/RHSA-2019:3172
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3172
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14825.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14825.json
2
reference_url https://access.redhat.com/security/cve/CVE-2019-14825
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2019-14825
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14825
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35986
published_at 2026-04-11T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.36042
published_at 2026-04-02T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.36073
published_at 2026-04-04T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35906
published_at 2026-04-07T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35956
published_at 2026-04-08T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35948
published_at 2026-04-18T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35962
published_at 2026-04-16T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35922
published_at 2026-04-13T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35947
published_at 2026-04-12T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35979
published_at 2026-04-09T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35851
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14825
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1730668
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1730668
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1739485
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1739485
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14825
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements
1
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14825
7
reference_url https://github.com/Katello/katello
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello
8
reference_url https://github.com/Katello/katello/commit/332484232b66b7907a8104a19ea97eb697b75c79
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello/commit/332484232b66b7907a8104a19ea97eb697b75c79
9
reference_url https://github.com/Katello/katello/commit/4eefa678a905140620ca8b390d48fe318d36e4ea
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello/commit/4eefa678a905140620ca8b390d48fe318d36e4ea
10
reference_url https://github.com/Katello/katello/commits/3.12.2
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello/commits/3.12.2
11
reference_url https://github.com/Katello/katello/pull/8244
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello/pull/8244
12
reference_url https://github.com/Katello/katello/pull/8253
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello/pull/8253
13
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/katello/CVE-2019-14825.yml
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/katello/CVE-2019-14825.yml
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14825
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
2
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
3
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-14825
15
reference_url https://projects.theforeman.org/issues/27485
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://projects.theforeman.org/issues/27485
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:*
17
reference_url https://github.com/advisories/GHSA-m4wh-848j-9w2r
reference_id GHSA-m4wh-848j-9w2r
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-m4wh-848j-9w2r
fixed_packages
0
url pkg:gem/katello@3.12.2
purl pkg:gem/katello@3.12.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zqkc-zwfa-1qfx
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/katello@3.12.2
aliases CVE-2019-14825, GHSA-m4wh-848j-9w2r
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsbd-bsbq-7qdk
2
url VCID-ftzy-9uny-byfb
vulnerability_id VCID-ftzy-9uny-byfb
summary
Cross-site Scripting
A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before `3.9.0` are vulnerable.
references
0
reference_url https://access.redhat.com/errata/RHSA-2019:1222
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:1222
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16887.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16887.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16887
reference_id
reference_type
scores
0
value 0.00346
scoring_system epss
scoring_elements 0.57126
published_at 2026-04-07T12:55:00Z
1
value 0.00346
scoring_system epss
scoring_elements 0.57174
published_at 2026-04-18T12:55:00Z
2
value 0.00346
scoring_system epss
scoring_elements 0.57178
published_at 2026-04-16T12:55:00Z
3
value 0.00346
scoring_system epss
scoring_elements 0.5718
published_at 2026-04-09T12:55:00Z
4
value 0.00346
scoring_system epss
scoring_elements 0.57127
published_at 2026-04-02T12:55:00Z
5
value 0.00346
scoring_system epss
scoring_elements 0.57149
published_at 2026-04-04T12:55:00Z
6
value 0.00346
scoring_system epss
scoring_elements 0.57177
published_at 2026-04-08T12:55:00Z
7
value 0.00346
scoring_system epss
scoring_elements 0.5715
published_at 2026-04-13T12:55:00Z
8
value 0.00346
scoring_system epss
scoring_elements 0.5717
published_at 2026-04-12T12:55:00Z
9
value 0.00346
scoring_system epss
scoring_elements 0.57033
published_at 2026-04-01T12:55:00Z
10
value 0.00346
scoring_system epss
scoring_elements 0.57191
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16887
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16887
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16887
4
reference_url https://github.com/Katello/katello
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello
5
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/katello/CVE-2018-16887.yml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/katello/CVE-2018-16887.yml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1645190
reference_id 1645190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1645190
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:katello:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-16887
reference_id CVE-2018-16887
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
2
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-16887
10
reference_url https://github.com/advisories/GHSA-mhhc-r88h-2qrm
reference_id GHSA-mhhc-r88h-2qrm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mhhc-r88h-2qrm
fixed_packages
0
url pkg:gem/katello@3.9.0
purl pkg:gem/katello@3.9.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-asqu-5r9h-9yav
1
vulnerability VCID-bsbd-bsbq-7qdk
2
vulnerability VCID-zqkc-zwfa-1qfx
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/katello@3.9.0
aliases CVE-2018-16887, GHSA-mhhc-r88h-2qrm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftzy-9uny-byfb
3
url VCID-zqkc-zwfa-1qfx
vulnerability_id VCID-zqkc-zwfa-1qfx
summary
Katello: Denial of Service and potential information disclosure via SQL injection
A flaw was found in the Katello plugin for Red Hat Satellite. This vulnerability, caused by improper sanitization of user-provided input, allows a remote attacker to inject arbitrary SQL commands into the sort_by parameter of the /api/hosts/bootc_images API endpoint. This can lead to a Denial of Service (DoS) by triggering database errors, and potentially enable Boolean-based Blind SQL injection, which could allow an attacker to extract sensitive information from the database.
references
0
reference_url https://access.redhat.com/errata/RHSA-2026:5968
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T14:26:51Z/
url https://access.redhat.com/errata/RHSA-2026:5968
1
reference_url https://access.redhat.com/errata/RHSA-2026:5970
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T14:26:51Z/
url https://access.redhat.com/errata/RHSA-2026:5970
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4324.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4324.json
3
reference_url https://access.redhat.com/security/cve/CVE-2026-4324
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T14:26:51Z/
url https://access.redhat.com/security/cve/CVE-2026-4324
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4324
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23777
published_at 2026-04-09T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23731
published_at 2026-04-08T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23661
published_at 2026-04-07T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23793
published_at 2026-04-11T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23749
published_at 2026-04-12T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23874
published_at 2026-04-04T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23833
published_at 2026-04-02T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23692
published_at 2026-04-13T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23704
published_at 2026-04-16T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.25919
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4324
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448349
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T14:26:51Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2448349
6
reference_url https://github.com/Katello/katello
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello
7
reference_url https://github.com/Katello/katello/commit/a0a793b08d4f0a897ee985d79a687ad043f99e57
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/Katello/katello/commit/a0a793b08d4f0a897ee985d79a687ad043f99e57
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-4324
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-4324
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite:6
reference_id cpe:/a:redhat:satellite:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite:6.17::el9
reference_id cpe:/a:redhat:satellite:6.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite:6.17::el9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite:6.18::el9
reference_id cpe:/a:redhat:satellite:6.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite:6.18::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_capsule:6.17::el9
reference_id cpe:/a:redhat:satellite_capsule:6.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_capsule:6.17::el9
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_capsule:6.18::el9
reference_id cpe:/a:redhat:satellite_capsule:6.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_capsule:6.18::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_maintenance:6.17::el9
reference_id cpe:/a:redhat:satellite_maintenance:6.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_maintenance:6.17::el9
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_utils:6.17::el9
reference_id cpe:/a:redhat:satellite_utils:6.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_utils:6.17::el9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_utils:6.18::el9
reference_id cpe:/a:redhat:satellite_utils:6.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:satellite_utils:6.18::el9
17
reference_url https://github.com/advisories/GHSA-fwj4-6wgp-mpxm
reference_id GHSA-fwj4-6wgp-mpxm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fwj4-6wgp-mpxm
fixed_packages
0
url pkg:gem/katello@4.19.1
purl pkg:gem/katello@4.19.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/katello@4.19.1
aliases CVE-2026-4324, GHSA-fwj4-6wgp-mpxm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zqkc-zwfa-1qfx
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/katello@3.2.0.rc1