Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/resource-agents@4.9.0-54.el8_10?arch=4
Typerpm
Namespaceredhat
Nameresource-agents
Version4.9.0-54.el8_10
Qualifiers
arch 4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-5tkp-pxz9-h7c2
vulnerability_id VCID-5tkp-pxz9-h7c2
summary
urllib3's Proxy-Authorization request header isn't stripped during cross-origin redirects
When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected.

However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects.

Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident.

Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach.

## Affected usages

We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited:

* Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support.
* Not disabling HTTP redirects.
* Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin.

## Remediation

* Using the `Proxy-Authorization` header with urllib3's `ProxyManager`.
* Disabling HTTP redirects using `redirects=False` when sending requests.
* Not using the `Proxy-Authorization` header.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37891.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37891
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.49016
published_at 2026-04-18T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.4902
published_at 2026-04-16T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48973
published_at 2026-04-13T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48966
published_at 2026-04-12T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48992
published_at 2026-04-11T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48975
published_at 2026-04-09T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48978
published_at 2026-04-08T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48924
published_at 2026-04-07T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.4971
published_at 2026-04-21T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49674
published_at 2026-04-02T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49702
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37891
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/urllib3/urllib3
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/urllib3/urllib3
5
reference_url https://github.com/urllib3/urllib3/commit/40b6d1605814dd1db0a46e202d6e56f2e4c9a468
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/urllib3/urllib3/commit/40b6d1605814dd1db0a46e202d6e56f2e4c9a468
6
reference_url https://github.com/urllib3/urllib3/commit/accff72ecc2f6cf5a76d9570198a93ac7c90270e
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:49:45Z/
url https://github.com/urllib3/urllib3/commit/accff72ecc2f6cf5a76d9570198a93ac7c90270e
7
reference_url https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:49:45Z/
url https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf
8
reference_url https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-37891
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-37891
10
reference_url https://security.netapp.com/advisory/ntap-20240822-0003
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240822-0003
11
reference_url https://www.vicarius.io/vsociety/posts/proxy-authorization-header-handling-vulnerability-in-urllib3-cve-2024-37891
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.vicarius.io/vsociety/posts/proxy-authorization-header-handling-vulnerability-in-urllib3-cve-2024-37891
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074149
reference_id 1074149
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074149
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292788
reference_id 2292788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292788
14
reference_url https://github.com/advisories/GHSA-34jh-p97f-mpxf
reference_id GHSA-34jh-p97f-mpxf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-34jh-p97f-mpxf
15
reference_url https://access.redhat.com/errata/RHSA-2024:4422
reference_id RHSA-2024:4422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4422
16
reference_url https://access.redhat.com/errata/RHSA-2024:4730
reference_id RHSA-2024:4730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4730
17
reference_url https://access.redhat.com/errata/RHSA-2024:4744
reference_id RHSA-2024:4744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4744
18
reference_url https://access.redhat.com/errata/RHSA-2024:4746
reference_id RHSA-2024:4746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4746
19
reference_url https://access.redhat.com/errata/RHSA-2024:5041
reference_id RHSA-2024:5041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5041
20
reference_url https://access.redhat.com/errata/RHSA-2024:5309
reference_id RHSA-2024:5309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5309
21
reference_url https://access.redhat.com/errata/RHSA-2024:5526
reference_id RHSA-2024:5526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5526
22
reference_url https://access.redhat.com/errata/RHSA-2024:5622
reference_id RHSA-2024:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5622
23
reference_url https://access.redhat.com/errata/RHSA-2024:5627
reference_id RHSA-2024:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5627
24
reference_url https://access.redhat.com/errata/RHSA-2024:5633
reference_id RHSA-2024:5633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5633
25
reference_url https://access.redhat.com/errata/RHSA-2024:6162
reference_id RHSA-2024:6162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6162
26
reference_url https://access.redhat.com/errata/RHSA-2024:6239
reference_id RHSA-2024:6239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6239
27
reference_url https://access.redhat.com/errata/RHSA-2024:6240
reference_id RHSA-2024:6240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6240
28
reference_url https://access.redhat.com/errata/RHSA-2024:6309
reference_id RHSA-2024:6309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6309
29
reference_url https://access.redhat.com/errata/RHSA-2024:6310
reference_id RHSA-2024:6310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6310
30
reference_url https://access.redhat.com/errata/RHSA-2024:6311
reference_id RHSA-2024:6311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6311
31
reference_url https://access.redhat.com/errata/RHSA-2024:6358
reference_id RHSA-2024:6358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6358
32
reference_url https://access.redhat.com/errata/RHSA-2024:7312
reference_id RHSA-2024:7312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7312
33
reference_url https://access.redhat.com/errata/RHSA-2024:8035
reference_id RHSA-2024:8035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8035
34
reference_url https://access.redhat.com/errata/RHSA-2024:8842
reference_id RHSA-2024:8842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8842
35
reference_url https://access.redhat.com/errata/RHSA-2024:8843
reference_id RHSA-2024:8843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8843
36
reference_url https://access.redhat.com/errata/RHSA-2024:8906
reference_id RHSA-2024:8906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8906
37
reference_url https://access.redhat.com/errata/RHSA-2024:9457
reference_id RHSA-2024:9457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9457
38
reference_url https://access.redhat.com/errata/RHSA-2024:9458
reference_id RHSA-2024:9458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9458
39
reference_url https://access.redhat.com/errata/RHSA-2024:9922
reference_id RHSA-2024:9922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9922
40
reference_url https://access.redhat.com/errata/RHSA-2024:9923
reference_id RHSA-2024:9923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9923
41
reference_url https://access.redhat.com/errata/RHSA-2024:9985
reference_id RHSA-2024:9985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9985
42
reference_url https://usn.ubuntu.com/7084-1/
reference_id USN-7084-1
reference_type
scores
url https://usn.ubuntu.com/7084-1/
43
reference_url https://usn.ubuntu.com/7084-2/
reference_id USN-7084-2
reference_type
scores
url https://usn.ubuntu.com/7084-2/
fixed_packages
aliases CVE-2024-37891, GHSA-34jh-p97f-mpxf
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5tkp-pxz9-h7c2
1
url VCID-qt3x-msd9-tyct
vulnerability_id VCID-qt3x-msd9-tyct
summary
setuptools vulnerable to Command Injection via package URL
A vulnerability in the `package_index` module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6345.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6345.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6345
reference_id
reference_type
scores
0
value 0.05553
scoring_system epss
scoring_elements 0.90291
published_at 2026-04-16T12:55:00Z
1
value 0.05553
scoring_system epss
scoring_elements 0.90275
published_at 2026-04-13T12:55:00Z
2
value 0.05553
scoring_system epss
scoring_elements 0.90281
published_at 2026-04-12T12:55:00Z
3
value 0.05553
scoring_system epss
scoring_elements 0.90282
published_at 2026-04-11T12:55:00Z
4
value 0.05553
scoring_system epss
scoring_elements 0.90273
published_at 2026-04-09T12:55:00Z
5
value 0.05553
scoring_system epss
scoring_elements 0.90267
published_at 2026-04-08T12:55:00Z
6
value 0.05553
scoring_system epss
scoring_elements 0.90251
published_at 2026-04-07T12:55:00Z
7
value 0.05697
scoring_system epss
scoring_elements 0.90425
published_at 2026-04-21T12:55:00Z
8
value 0.05697
scoring_system epss
scoring_elements 0.90427
published_at 2026-04-18T12:55:00Z
9
value 0.07336
scoring_system epss
scoring_elements 0.9167
published_at 2026-04-04T12:55:00Z
10
value 0.07336
scoring_system epss
scoring_elements 0.91665
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/pypa/setuptools
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 7.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/setuptools
5
reference_url https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value 7.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-15T13:33:16Z/
url https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0
6
reference_url https://github.com/pypa/setuptools/pull/4332
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 7.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/setuptools/pull/4332
7
reference_url https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value 7.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-15T13:33:16Z/
url https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5
8
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 7.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-6345
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 7.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-6345
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297771
reference_id 2297771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297771
11
reference_url https://github.com/advisories/GHSA-cx63-2mw6-8hw5
reference_id GHSA-cx63-2mw6-8hw5
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cx63-2mw6-8hw5
12
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
13
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
14
reference_url https://access.redhat.com/errata/RHSA-2024:5000
reference_id RHSA-2024:5000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5000
15
reference_url https://access.redhat.com/errata/RHSA-2024:5002
reference_id RHSA-2024:5002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5002
16
reference_url https://access.redhat.com/errata/RHSA-2024:5040
reference_id RHSA-2024:5040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5040
17
reference_url https://access.redhat.com/errata/RHSA-2024:5078
reference_id RHSA-2024:5078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5078
18
reference_url https://access.redhat.com/errata/RHSA-2024:5084
reference_id RHSA-2024:5084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5084
19
reference_url https://access.redhat.com/errata/RHSA-2024:5137
reference_id RHSA-2024:5137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5137
20
reference_url https://access.redhat.com/errata/RHSA-2024:5279
reference_id RHSA-2024:5279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5279
21
reference_url https://access.redhat.com/errata/RHSA-2024:5389
reference_id RHSA-2024:5389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5389
22
reference_url https://access.redhat.com/errata/RHSA-2024:5530
reference_id RHSA-2024:5530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5530
23
reference_url https://access.redhat.com/errata/RHSA-2024:5531
reference_id RHSA-2024:5531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5531
24
reference_url https://access.redhat.com/errata/RHSA-2024:5532
reference_id RHSA-2024:5532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5532
25
reference_url https://access.redhat.com/errata/RHSA-2024:5533
reference_id RHSA-2024:5533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5533
26
reference_url https://access.redhat.com/errata/RHSA-2024:5534
reference_id RHSA-2024:5534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5534
27
reference_url https://access.redhat.com/errata/RHSA-2024:5962
reference_id RHSA-2024:5962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5962
28
reference_url https://access.redhat.com/errata/RHSA-2024:6220
reference_id RHSA-2024:6220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6220
29
reference_url https://access.redhat.com/errata/RHSA-2024:6309
reference_id RHSA-2024:6309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6309
30
reference_url https://access.redhat.com/errata/RHSA-2024:6311
reference_id RHSA-2024:6311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6311
31
reference_url https://access.redhat.com/errata/RHSA-2024:6312
reference_id RHSA-2024:6312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6312
32
reference_url https://access.redhat.com/errata/RHSA-2024:6488
reference_id RHSA-2024:6488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6488
33
reference_url https://access.redhat.com/errata/RHSA-2024:6611
reference_id RHSA-2024:6611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6611
34
reference_url https://access.redhat.com/errata/RHSA-2024:6612
reference_id RHSA-2024:6612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6612
35
reference_url https://access.redhat.com/errata/RHSA-2024:6661
reference_id RHSA-2024:6661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6661
36
reference_url https://access.redhat.com/errata/RHSA-2024:6662
reference_id RHSA-2024:6662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6662
37
reference_url https://access.redhat.com/errata/RHSA-2024:6667
reference_id RHSA-2024:6667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6667
38
reference_url https://access.redhat.com/errata/RHSA-2024:6726
reference_id RHSA-2024:6726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6726
39
reference_url https://access.redhat.com/errata/RHSA-2024:6907
reference_id RHSA-2024:6907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6907
40
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
41
reference_url https://access.redhat.com/errata/RHSA-2024:7374
reference_id RHSA-2024:7374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7374
42
reference_url https://access.redhat.com/errata/RHSA-2024:8168
reference_id RHSA-2024:8168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8168
43
reference_url https://access.redhat.com/errata/RHSA-2024:8170
reference_id RHSA-2024:8170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8170
44
reference_url https://access.redhat.com/errata/RHSA-2024:8171
reference_id RHSA-2024:8171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8171
45
reference_url https://access.redhat.com/errata/RHSA-2024:8172
reference_id RHSA-2024:8172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8172
46
reference_url https://access.redhat.com/errata/RHSA-2024:8173
reference_id RHSA-2024:8173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8173
47
reference_url https://access.redhat.com/errata/RHSA-2024:8179
reference_id RHSA-2024:8179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8179
48
reference_url https://usn.ubuntu.com/7002-1/
reference_id USN-7002-1
reference_type
scores
url https://usn.ubuntu.com/7002-1/
fixed_packages
aliases CVE-2024-6345, GHSA-cx63-2mw6-8hw5
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qt3x-msd9-tyct
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/resource-agents@4.9.0-54.el8_10%3Farch=4