Known Vulnerabilities for Network Proxy by Redhat
Listed below are 2 of the newest known vulnerabilities associated with "Network Proxy" by "Redhat".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2026-40303 json | zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, endpoints.GetSessionCookie p... | Not Provided | 2026-04-17 | 2026-04-20 |
| CVE-2026-33469 json | Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, an authenti... | Not Provided | 2026-03-26 | 2026-03-26 |
| CVE-2026-32591 json | A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstre... | Not Provided | 2026-04-08 | 2026-04-10 |
| CVE-2026-6297 json | Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to pote... | Not Provided | 2026-04-15 | 2026-04-16 |
| CVE-2026-5119 json | A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensitive session cookies are t... | Not Provided | 2026-03-30 | 2026-04-01 |
| CVE-2012-0059 json | Not Provided | 2014-02-05 | 2026-04-03 | |
| CVE-2010-2236 json | The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5... | 6 - MEDIUM | 2014-04-15 | 2022-02-03 |
Known Affected Configurations (CPE V2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Redhat | Network Proxy | 5.4 | |||
| Application | Redhat | Network Proxy | 5.3 | |||
| Application | Redhat | Network Proxy | 5.0 | |||
| Application | Redhat | Network Proxy | 4.2 | |||
| Application | Redhat | Network Proxy | 4.1 | |||
| Application | Redhat | Network Proxy | 4.0 | |||
| Application | Redhat | Network Proxy | 3.7 | |||
| Application | Redhat | Network Proxy | - |