Report Name: Linux Patch Wednesday March 2026Generated: 2026-03-30 16:18:58
| Product Name | Prevalence | U | C | H | M | L | A | Comment |
|---|---|---|---|---|---|---|---|---|
| Angular | 0.95 | 1 | 1 | 2 | Angular is a development platform for building mobile and desktop web applications using TypeScript, JavaScript, and other languages. It provides a component-based architecture, declarative templates, dependency injection, powerful tooling, and extensive ecosystem support for creating scalable, high-performance web apps. | |||
| Django | 0.9 | 1 | 1 | 2 | Django is a high-level Python web framework that encourages rapid development and clean, pragmatic design. It provides built-in tools for database models, authentication, URL routing, templates, and security features, making it one of the most widely used frameworks for building scalable and maintainable web applications. | |||
| GNU Inetutils | 0.9 | 2 | 1 | 3 | GNU Inetutils is a collection of common network utilities for GNU/Linux systems. | |||
| Linux Kernel | 0.9 | 1 | 68 | 24 | 93 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | ||
| Rust | 0.9 | 2 | 2 | 4 | Rust is a modern, high-performance systems programming language focused on safety, concurrency, and memory management. | |||
| .NET Core | 0.8 | 1 | 1 | .NET Core | ||||
| Binutils | 0.8 | 1 | 3 | 1 | 5 | The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code | ||
| Chromium | 0.8 | 2 | 10 | 35 | 47 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | ||
| GNU C Library | 0.8 | 1 | 1 | 2 | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library | |||
| Keycloak | 0.8 | 5 | 4 | 2 | 11 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | ||
| Mozilla Firefox | 0.8 | 9 | 41 | 1 | 51 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | ||
| OpenSSH | 0.8 | 2 | 2 | OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture | ||||
| OpenSSL | 0.8 | 1 | 2 | 3 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |||
| PHP | 0.8 | 1 | 1 | PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. | ||||
| Zabbix | 0.8 | 1 | 1 | Zabbix is an open-source software tool to monitor IT infrastructure such as networks, servers, virtual machines, and cloud services | ||||
| .NET | 0.7 | 1 | 1 | .NET | ||||
| Calibre | 0.7 | 2 | 3 | 5 | Calibre is a cross-platform free and open-source suite of e-book software | |||
| Envoy | 0.7 | 1 | 1 | Envoy is a cloud-native, open-source edge and service proxy | ||||
| Kubernetes | 0.7 | 4 | 1 | 1 | 6 | Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management | ||
| QEMU | 0.7 | 1 | 1 | QEMU is a generic and open source machine & userspace emulator and virtualizer | ||||
| SQLite | 0.7 | 1 | 1 | SQLite is a database engine written in the C programming language | ||||
| cpp-httplib | 0.7 | 5 | 5 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library | ||||
| Apache ActiveMQ | 0.6 | 1 | 1 | Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service (JMS) client | ||||
| Canonical LXD | 0.6 | 1 | 1 | Canonical LXD is a system container and VM manager for Linux. LXD-UI is the web UI component of LXD that provides a browser-based interface for creating, managing and starting containers and instances. | ||||
| Exim | 0.6 | 1 | 1 | Exim is a mail transfer agent (MTA) used on Unix-like operating systems | ||||
| FreeRDP | 0.6 | 22 | 1 | 23 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |||
| ImageMagick | 0.6 | 46 | 6 | 52 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |||
| Jetty | 0.6 | 2 | 2 | Jetty is a Java based web server and servlet engine | ||||
| Libsoup | 0.6 | 2 | 3 | 1 | 6 | libsoup is an HTTP client/server library for GNOME. It uses GObjects and the glib main loop to integrate well with GNOME applications and also has a synchronous API for use in CLI tools. | ||
| MongoDB | 0.6 | 2 | 2 | MongoDB is a source-available, cross-platform, document-oriented database program | ||||
| Python | 0.6 | 1 | 1 | Python is a high-level, general-purpose programming language | ||||
| Redis | 0.6 | 1 | 1 | Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability | ||||
| Snapd | 0.6 | 1 | 1 | snapd is the background service that manages Snap packages on Linux, providing installation, updates, confinement, and runtime environment for snaps. | ||||
| TuneD | 0.6 | 1 | 1 | Tuned is a daemon that uses udev to monitor connected devices and statically and dynamically tunes system settings according to a selected profile | ||||
| UDisks | 0.6 | 1 | 1 | 2 | UDisks is a system service daemon that provides interfaces to enumerate, query, and manage storage devices such as hard drives, SSDs, removable media, and loop devices. It exposes functionality over the D-Bus system bus, allowing unprivileged applications to perform safe disk operations while privileged actions are mediated by PolicyKit. | |||
| Wireshark | 0.6 | 2 | 1 | 3 | Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education | |||
| 389 Directory Server | 0.5 | 1 | 1 | 389 Directory Server is a highly usable, fully featured, reliable and secure LDAP server implementation | ||||
| Admesh | 0.5 | 2 | 2 | Product detected by a:admesh_project:admesh (exists in CPE dict) | ||||
| Alinto SOGo | 0.5 | 3 | 3 | SOGo is an open source groupware and webmail server developed by Alinto, providing email, calendar, and contact management through a web-based interface and standard protocols. | ||||
| Apache Commons Text | 0.5 | 1 | 1 | The Commons Text library provides additions to the standard JDK text handling | ||||
| Authlib | 0.5 | 4 | 4 | Authlib is a Python library for building OAuth and OpenID Connect clients and servers, providing tools for secure authentication, token management, and authorization flows. | ||||
| Caddy | 0.5 | 1 | 5 | 6 | Product detected by a:caddyserver:caddy (exists in CPE dict) | |||
| Command Line Interface | 0.5 | 1 | 1 | Product detected by a:docker:command_line_interface (exists in CPE dict) | ||||
| CommonMark | 0.5 | 1 | 1 | Product detected by a:thephpleague:commonmark (exists in CPE dict) | ||||
| CoreDNS | 0.5 | 1 | 1 | Product detected by a:coredns.io:coredns (exists in CPE dict) | ||||
| Cosign | 0.5 | 1 | 1 | Product detected by a:sigstore:cosign (exists in CPE dict) | ||||
| Curl | 0.5 | 2 | 1 | 3 | Product detected by a:haxx:curl (exists in CPE dict) | |||
| DOMPurify | 0.5 | 2 | 2 | DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG | ||||
| Dottie | 0.5 | 1 | 1 | Product detected by a:dottie_project:dottie (exists in CPE dict) | ||||
| Filebeat | 0.5 | 1 | 1 | Product detected by a:elastic:filebeat (exists in CPE dict) | ||||
| Flask | 0.5 | 1 | 1 | Flask is a lightweight WSGI web application framework | ||||
| GIMP | 0.5 | 1 | 4 | 5 | GIMP is an open-source image manipulation program used for photo editing, graphic design, and digital art creation. | |||
| Libarchive | 0.5 | 1 | 1 | Multi-format archive and compression library | ||||
| Open Babel | 0.5 | 3 | 3 | Open Babel is an open-source chemical toolbox for converting, analyzing and working with many molecular file formats. It provides a C/C++ library and command-line tools widely used in cheminformatics and computational chemistry workflows. | ||||
| PDFBox | 0.5 | 1 | 1 | Product detected by a:apache:pdfbox (exists in CPE dict) | ||||
| Packetbeat | 0.5 | 1 | 1 | Product detected by a:elasticsearch:packetbeat (exists in CPE dict) | ||||
| Psd-tools | 0.5 | 1 | 1 | Product detected by a:psd-tools_project:psd-tools (exists in CPE dict) | ||||
| PyJWT | 0.5 | 1 | 1 | Product detected by a:pyjwt_project:pyjwt (exists in CPE dict) | ||||
| Pypdf | 0.5 | 1 | 6 | 1 | 8 | PyPDF is a Python library for reading, manipulating, and writing PDF files, including extraction, splitting, merging, and encryption features. | ||
| QuickJS | 0.5 | 2 | 2 | QuickJS is a lightweight JavaScript engine that supports modern ECMAScript features and can be embedded into applications for scripting purposes. | ||||
| Rebar3 | 0.5 | 1 | 1 | Product detected by a:erlang:rebar3 (exists in CPE dict) | ||||
| SPIP | 0.5 | 1 | 2 | 8 | 1 | 12 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| Squirrel | 0.5 | 4 | 4 | Product detected by a:squirrel-lang:squirrel (exists in CPE dict) | ||||
| Traefik | 0.5 | 3 | 1 | 4 | Product detected by a:traefik:traefik (exists in CPE dict) | |||
| Underscore | 0.5 | 1 | 1 | Product detected by a:underscorejs:underscore (exists in CPE dict) | ||||
| Werkzeug | 0.5 | 1 | 1 | Werkzeug is a comprehensive WSGI web application library | ||||
| ZooKeeper | 0.5 | 1 | 1 | 2 | Product detected by a:apache:zookeeper (exists in CPE dict) | |||
| apache::session::generate::md5 | 0.5 | 1 | 1 | Product detected by a:chorny:apache | ||||
| apache::sessionx | 0.5 | 1 | 1 | Product detected by a:grichter:apache | ||||
| basic-ftp | 0.5 | 1 | 1 | Product detected by a:patrickjuchli:basic-ftp (does NOT exist in CPE dict) | ||||
| black | 0.5 | 1 | 1 | 2 | Product detected by a:python:black (does NOT exist in CPE dict) | |||
| capnproto | 0.5 | 1 | 1 | 2 | Product detected by a:capnproto:capnproto (exists in CPE dict) | |||
| coTURN | 0.5 | 1 | 1 | Product detected by a:coturn_project:coturn (exists in CPE dict) | ||||
| compress::raw::zlib | 0.5 | 1 | 1 | Product detected by a:pmqs:compress | ||||
| ettercap | 0.5 | 1 | 1 | Product detected by a:ettercap-project:ettercap (exists in CPE dict) | ||||
| exiv2 | 0.5 | 1 | 2 | 3 | Product detected by a:exiv2:exiv2 (exists in CPE dict) | |||
| fast-xml-parser | 0.5 | 2 | 1 | 3 | Product detected by a:naturalintelligence:fast-xml-parser (does NOT exist in CPE dict) | |||
| fast_xml_parser | 0.5 | 1 | 1 | Product detected by a:naturalintelligence:fast_xml_parser (exists in CPE dict) | ||||
| flatted | 0.5 | 1 | 1 | Product detected by a:webreflection:flatted (does NOT exist in CPE dict) | ||||
| gSOAP | 0.5 | 1 | 1 | Product detected by a:genivia:gsoap (exists in CPE dict) | ||||
| gitea | 0.5 | 1 | 2 | 3 | Product detected by a:gitea:gitea (exists in CPE dict) | |||
| glances | 0.5 | 2 | 1 | 3 | Product detected by a:nicolargo:glances (does NOT exist in CPE dict) | |||
| gstreamer | 0.5 | 2 | 8 | 10 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |||
| hdf5 | 0.5 | 1 | 1 | Product detected by a:hdfgroup:hdf5 (exists in CPE dict) | ||||
| ldap_account_manager | 0.5 | 2 | 2 | Product detected by a:ldap-account-manager:ldap_account_manager (exists in CPE dict) | ||||
| libbiosig | 0.5 | 1 | 2 | 3 | Product detected by a:libbiosig_project:libbiosig (does NOT exist in CPE dict) | |||
| libde265 | 0.5 | 1 | 1 | Product detected by a:struktur:libde265 (exists in CPE dict) | ||||
| libexpat | 0.5 | 1 | 2 | 3 | Product detected by a:libexpat_project:libexpat (exists in CPE dict) | |||
| libssh | 0.5 | 1 | 1 | Product detected by a:libssh:libssh (exists in CPE dict) | ||||
| libvips | 0.5 | 8 | 8 | Product detected by a:libvips:libvips (exists in CPE dict) | ||||
| lxml_html_clean | 0.5 | 2 | 2 | Product detected by a:fedoralovespython:lxml_html_clean (does NOT exist in CPE dict) | ||||
| markdown | 0.5 | 1 | 1 | Product detected by a:python-markdown:markdown (does NOT exist in CPE dict) | ||||
| miniaudio | 0.5 | 1 | 1 | Product detected by a:mackron:miniaudio (does NOT exist in CPE dict) | ||||
| minimatch | 0.5 | 3 | 3 | Product detected by a:minimatch_project:minimatch (exists in CPE dict) | ||||
| nats-server | 0.5 | 1 | 1 | Product detected by a:linuxfoundation:nats-server (exists in CPE dict) | ||||
| net::cidr | 0.5 | 1 | 1 | Product detected by a:mrsam:net | ||||
| nltk | 0.5 | 1 | 1 | Product detected by a:nltk:nltk (exists in CPE dict) | ||||
| ocaml | 0.5 | 1 | 1 | Product detected by a:ocaml:ocaml (exists in CPE dict) | ||||
| onnx | 0.5 | 1 | 1 | Product detected by a:linuxfoundation:onnx (exists in CPE dict) | ||||
| openexr | 0.5 | 1 | 1 | Product detected by a:openexr:openexr (exists in CPE dict) | ||||
| openshift_container_platform | 0.5 | 1 | 1 | Product detected by a:redhat:openshift_container_platform (exists in CPE dict) | ||||
| ormar | 0.5 | 1 | 1 | Product detected by a:collerek:ormar (does NOT exist in CPE dict) | ||||
| postgresql | 0.5 | 1 | 1 | Product detected by a:postgresql:postgresql (exists in CPE dict) | ||||
| pyasn1 | 0.5 | 1 | 1 | Product detected by a:pyasn1:pyasn1 (does NOT exist in CPE dict) | ||||
| rack | 0.5 | 2 | 2 | Product detected by a:rack:rack (does NOT exist in CPE dict) | ||||
| rollup | 0.5 | 1 | 1 | Product detected by a:rollupjs:rollup (does NOT exist in CPE dict) | ||||
| sail | 0.5 | 1 | 1 | Product detected by a:sail:sail (does NOT exist in CPE dict) | ||||
| simpleeval | 0.5 | 1 | 1 | Product detected by a:danthedeckie:simpleeval (does NOT exist in CPE dict) | ||||
| tar | 0.5 | 2 | 2 | Product detected by a:isaacs:tar (does NOT exist in CPE dict) | ||||
| tornado | 0.5 | 1 | 1 | Product detected by a:tornadoweb:tornado (exists in CPE dict) | ||||
| undici | 0.5 | 5 | 5 | Product detected by a:nodejs:undici (exists in CPE dict) | ||||
| utls | 0.5 | 1 | 1 | Product detected by a:refraction-networking:utls (does NOT exist in CPE dict) | ||||
| valkey | 0.5 | 1 | 1 | 2 | Product detected by a:lfprojects:valkey (does NOT exist in CPE dict) | |||
| vim | 0.5 | 4 | 2 | 6 | Product detected by a:vim:vim (exists in CPE dict) | |||
| vitrage | 0.5 | 1 | 1 | Product detected by a:openstack:vitrage (does NOT exist in CPE dict) | ||||
| yaml::syck | 0.5 | 1 | 1 | Product detected by a:toddr:yaml | ||||
| yamux | 0.5 | 1 | 1 | Product detected by a:protocol:yamux (does NOT exist in CPE dict) | ||||
| youtube-dl | 0.5 | 1 | 1 | youtube-dl is a free and open source software tool for downloading video and audio from YouTube and over 1,000 other video hosting websites | ||||
| zoneminder | 0.5 | 1 | 1 | Product detected by a:zoneminder:zoneminder (exists in CPE dict) | ||||
| Erlang/OTP | 0.4 | 1 | 1 | Erlang/OTP is a set of libraries for the Erlang programming language | ||||
| GPAC | 0.4 | 3 | 3 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | ||||
| GVfs | 0.4 | 1 | 1 | 2 | GVfs (GNOME Virtual File System) is userspace virtual filesystem software for GNOME that provides backends (including FTP) to access different remote and local file systems transparently. | |||
| JOSE | 0.3 | 1 | 1 | JavaScript module for JSON Object Signing and Encryption (JOSE) | ||||
| Wasmtime | 0.25 | 1 | 1 | Standalone WebAssembly runtime written in Rust | ||||
| Cairo | 0.2 | 1 | 1 | 2D graphics library used for rendering vector graphics, including PDF via Poppler | ||||
| GitHub | 0.2 | 1 | 1 | GitHub, Inc. is an Internet hosting service for software development and version control using Git | ||||
| Unknown Product | 0 | 19 | 26 | 45 | Unknown Product |
| Vulnerability Type | Criticality | U | C | H | M | L | A |
|---|---|---|---|---|---|---|---|
| Remote Code Execution | 1.0 | 10 | 21 | 18 | 49 | ||
| Authentication Bypass | 0.98 | 1 | 15 | 7 | 23 | ||
| Code Injection | 0.97 | 4 | 3 | 7 | |||
| Command Injection | 0.97 | 1 | 1 | 2 | 4 | ||
| Security Feature Bypass | 0.9 | 19 | 18 | 37 | |||
| Server-Side Request Forgery | 0.87 | 1 | 2 | 3 | |||
| Elevation of Privilege | 0.85 | 2 | 3 | 5 | |||
| Information Disclosure | 0.83 | 2 | 5 | 7 | 14 | ||
| Cross Site Scripting | 0.8 | 4 | 12 | 16 | |||
| Open Redirect | 0.75 | 2 | 2 | ||||
| Denial of Service | 0.7 | 1 | 28 | 56 | 2 | 87 | |
| Path Traversal | 0.7 | 1 | 5 | 4 | 2 | 12 | |
| Incorrect Calculation | 0.5 | 6 | 14 | 1 | 21 | ||
| Memory Corruption | 0.5 | 42 | 126 | 8 | 176 | ||
| Spoofing | 0.4 | 5 | 5 | ||||
| Tampering | 0.3 | 4 | 4 | ||||
| Unknown Vulnerability Type | 0 | 43 | 67 | 110 |
| Source | U | C | H | M | L | A |
|---|---|---|---|---|---|---|
| almalinux | 9 | 41 | 2 | 52 | ||
| altlinux | 1 | 40 | 143 | 15 | 199 | |
| debian | 16 | 143 | 251 | 45 | 455 | |
| oraclelinux | 1 | 9 | 53 | 5 | 68 | |
| redhat | 9 | 42 | 1 | 52 | ||
| redos | 6 | 6 | 4 | 16 | ||
| ubuntu | 21 | 34 | 25 | 80 |
1.
Remote Code Execution - Chromium (CVE-2026-3909) - Critical [740]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 1.0 | 18 | Exploitation in the wild is mentioned on Vulners (CISA object, cisa_kev object), NVD:CISAKEV websites | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.9 | 10 | EPSS Probability is 0.04443, EPSS Percentile is 0.88993 |
debian: CVE-2026-3909 was patched at 2026-03-16, 2026-03-18
2.
Remote Code Execution - Chromium (CVE-2026-3910) - Critical [728]
Description: Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 1.0 | 18 | Exploitation in the wild is mentioned on Vulners (CISA object, cisa_kev object), NVD:CISAKEV websites | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.8 | 10 | EPSS Probability is 0.01332, EPSS Percentile is 0.79892 |
debian: CVE-2026-3910 was patched at 2026-03-16, 2026-03-18
3.
Remote Code Execution - nltk (CVE-2025-14009) - Critical [666]
Description: A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows attackers to craft malicious zip packages that, when downloaded and extracted by NLTK, can
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:huntr.com website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:nltk:nltk (exists in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 10.0. According to NVD data source | |
| 0.7 | 10 | EPSS Probability is 0.0062, EPSS Percentile is 0.69951 |
debian: CVE-2025-14009 was patched at 2026-03-18
4.
Remote Code Execution - Binutils (CVE-2025-69650) - Critical [645]
Description: GNU
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:sourceware.org website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00101, EPSS Percentile is 0.27864 |
debian: CVE-2025-69650 was patched at 2026-03-18
5.
Remote Code Execution - rollup (CVE-2026-27606) - Critical [642]
Description: Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:rollupjs:rollup (does NOT exist in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.5 | 10 | EPSS Probability is 0.00281, EPSS Percentile is 0.51347 |
debian: CVE-2026-27606 was patched at 2026-03-18
oraclelinux: CVE-2026-27606 was patched at 2026-03-13
6.
Information Disclosure - glances (CVE-2026-30928) - Critical [636]
Description: Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.83 | 15 | Information Disclosure | |
| 0.5 | 14 | Product detected by a:nicolargo:glances (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.9 | 10 | EPSS Probability is 0.03371, EPSS Percentile is 0.87302 |
debian: CVE-2026-30928 was patched at 2026-03-18
7.
Information Disclosure - glances (CVE-2026-32596) - Critical [636]
Description: Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. Version 4.5.2 fixes the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.83 | 15 | Information Disclosure | |
| 0.5 | 14 | Product detected by a:nicolargo:glances (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.9 | 10 | EPSS Probability is 0.04201, EPSS Percentile is 0.88671 |
debian: CVE-2026-32596 was patched at 2026-03-18
8.
Authentication Bypass - Libsoup (CVE-2026-3099) - Critical [632]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:gitlab.gnome.org website | |
| 0.98 | 15 | Authentication Bypass | |
| 0.6 | 14 | libsoup is an HTTP client/server library for GNOME. It uses GObjects and the glib main loop to integrate well with GNOME applications and also has a synchronous API for use in CLI tools. | |
| 0.7 | 10 | CVSS Base Score is 7.3. According to NVD data source | |
| 0.6 | 10 | EPSS Probability is 0.00366, EPSS Percentile is 0.585 |
debian: CVE-2026-3099 was patched at 2026-03-18
9.
Remote Code Execution - Caddy (CVE-2026-27590) - Critical [630]
Description: Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's FastCGI path splitting logic computes the split index on a lowercased copy of the request path and then uses that byte index to slice the original path. This is unsafe for Unicode because `strings.ToLower()` can change UTF-8 byte length for some characters. As a result, Caddy can derive an incorrect `SCRIPT_NAME`/`SCRIPT_FILENAME` and `PATH_INFO`, potentially causing a request that contains `.php` to execute a different on-disk file than intended (path confusion). In setups where an attacker can control file contents (e.g., upload features), this can lead to unintended PHP execution of non-.php files (potential
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:caddyserver:caddy (exists in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.4 | 10 | EPSS Probability is 0.0021, EPSS Percentile is 0.4337 |
altlinux: CVE-2026-27590 was patched at 2026-03-04, 2026-03-05
debian: CVE-2026-27590 was patched at 2026-03-18
10.
Remote Code Execution - Calibre (CVE-2026-26064) - Critical [628]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.7 | 14 | Calibre is a cross-platform free and open-source suite of e-book software | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00067, EPSS Percentile is 0.20626 |
debian: CVE-2026-26064 was patched at 2026-03-18
11.
Remote Code Execution - libbiosig (CVE-2026-22891) - Critical [619]
Description: A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.talosintelligence.com website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:libbiosig_project:libbiosig (does NOT exist in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00122, EPSS Percentile is 0.31317 |
debian: CVE-2026-22891 was patched at 2026-03-18
12.
Denial of Service - Libsoup (CVE-2026-4271) - Critical [617]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:gitlab.gnome.org website | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | libsoup is an HTTP client/server library for GNOME. It uses GObjects and the glib main loop to integrate well with GNOME applications and also has a synchronous API for use in CLI tools. | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.8 | 10 | EPSS Probability is 0.01172, EPSS Percentile is 0.7862 |
debian: CVE-2026-4271 was patched at 2026-03-18
13.
Remote Code Execution - Calibre (CVE-2026-26065) - Critical [616]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.7 | 14 | Calibre is a cross-platform free and open-source suite of e-book software | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00038, EPSS Percentile is 0.11379 |
debian: CVE-2026-26065 was patched at 2026-03-18
14.
Command Injection - youtube-dl (CVE-2026-26331) - Critical [613]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:GitHub:DXLERYT:CVE-2026-26331 websites | |
| 0.97 | 15 | Command Injection | |
| 0.5 | 14 | youtube-dl is a free and open source software tool for downloading video and audio from YouTube and over 1,000 other video hosting websites | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.4 | 10 | EPSS Probability is 0.00165, EPSS Percentile is 0.37519 |
debian: CVE-2026-26331 was patched at 2026-03-18
15.
Remote Code Execution - SPIP (CVE-2026-27475) - Critical [607]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:216086, Vulners:PublicExploit:PACKETSTORM:216154 websites | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.4 | 10 | EPSS Probability is 0.00171, EPSS Percentile is 0.38369 |
debian: CVE-2026-27475 was patched at 2026-03-03, 2026-03-18
16.
Path Traversal - gSOAP (CVE-2019-25355) - Critical [601]
Description: gSOAP 2.8 contains a directory traversal vulnerability that allows unauthenticated attackers to access system files by manipulating HTTP path traversal techniques. Attackers can retrieve sensitive files like /etc/passwd by sending crafted GET requests with multiple '../' directory traversal sequences.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.exploit-db.com website | |
| 0.7 | 15 | Path Traversal | |
| 0.5 | 14 | Product detected by a:genivia:gsoap (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.8 | 10 | EPSS Probability is 0.01588, EPSS Percentile is 0.81544 |
debian: CVE-2019-25355 was patched at 2026-03-18
17.
Elevation of Privilege - GNU Inetutils (CVE-2026-28372) - High [599]
Description: telnetd in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:lists.gnu.org, Vulners:PublicExploit:GitHub:MBANYAMER:CVE-2026-28372-GNU-INETUTILS-TELNETD-PRIVILEGE-ESCALATION, Vulners:PublicExploit:GitHub:ROHITBERIWALA:CVE-2026-28372, Vulners:PublicExploit:GitHub:KALIBB:CVE-2026-28372-GNU-INETUTILS-TELNETD-PRIVILEGE-ESCALATION-MAIN, BDU:PublicExploit websites | |
| 0.85 | 15 | Elevation of Privilege | |
| 0.9 | 14 | GNU Inetutils is a collection of common network utilities for GNU/Linux systems. | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 6e-05, EPSS Percentile is 0.00371 |
debian: CVE-2026-28372 was patched at 2026-02-19, 2026-03-18
18.
Remote Code Execution - Binutils (CVE-2025-69649) - High [597]
Description: GNU
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:sourceware.org website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0003, EPSS Percentile is 0.08693 |
debian: CVE-2025-69649 was patched at 2026-03-18
19.
Denial of Service - Rust (CVE-2026-32314) - High [596]
Description: Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | Rust is a modern, high-performance systems programming language focused on safety, concurrency, and memory management. | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.16768 |
debian: CVE-2026-32314 was patched at 2026-03-18
20.
Remote Code Execution - libbiosig (CVE-2026-20777) - High [595]
Description: A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.talosintelligence.com website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:libbiosig_project:libbiosig (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00122, EPSS Percentile is 0.31317 |
debian: CVE-2026-20777 was patched at 2026-03-18
21.
Security Feature Bypass - FreeRDP (CVE-2026-25941) - High [594]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00101, EPSS Percentile is 0.27933 |
altlinux: CVE-2026-25941 was patched at 2026-02-27
debian: CVE-2026-25941 was patched at 2026-03-18
ubuntu: CVE-2026-25941 was patched at 2026-03-18
22.
Security Feature Bypass - Keycloak (CVE-2026-1529) - High [591]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:NINJAZAN420:CVE-2026-1529-POC-KEYCLOAK-UNAUTHORIZED-REGISTRATION-VIA-IMPROPER-INVITATION-TOKEN-VALIDATION, Vulners:PublicExploit:GitHub:0X240X23ELU:CVE-2026-1529 websites | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00011, EPSS Percentile is 0.01283 |
altlinux: CVE-2026-1529 was patched at 2026-03-10, 2026-03-23
23.
Information Disclosure - markdown (CVE-2025-69534) - High [588]
Description: Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like sequences can cause html.parser.HTMLParser to raise an unhandled AssertionError during Markdown parsing. Because Python-Markdown does not catch this exception, any application that processes attacker-controlled Markdown may crash. This enables remote, unauthenticated Denial of Service in web applications, documentation systems, CI/CD pipelines, and any service that renders untrusted Markdown. The issue was acknowledged by the vendor and fixed in version 3.8.1. This issue causes a remote Denial of Service in any application parsing untrusted Markdown, and can lead to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.83 | 15 | Information Disclosure | |
| 0.5 | 14 | Product detected by a:python-markdown:markdown (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.5 | 10 | EPSS Probability is 0.00249, EPSS Percentile is 0.48081 |
debian: CVE-2025-69534 was patched at 2026-03-18
24.
Security Feature Bypass - cpp-httplib (CVE-2026-32627) - High [586]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.7 | 14 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06124 |
debian: CVE-2026-32627 was patched at 2026-03-18
25.
Remote Code Execution - Binutils (CVE-2025-69652) - High [585]
Description: GNU
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:sourceware.org website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code | |
| 0.6 | 10 | CVSS Base Score is 6.2. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.02926 |
debian: CVE-2025-69652 was patched at 2026-03-18
26.
Remote Code Execution - GNU C Library (CVE-2025-69651) - High [585]
Description: GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:sourceware.org website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00233 |
debian: CVE-2025-69651 was patched at 2026-03-18
27.
Remote Code Execution - vitrage (CVE-2026-28370) - High [583]
Description: In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:storyboard.openstack.org, Vulners:PublicExploit:PACKETSTORM:216686 websites | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:openstack:vitrage (does NOT exist in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00026, EPSS Percentile is 0.07111 |
debian: CVE-2026-28370 was patched at 2026-03-18
28.
Security Feature Bypass - Authlib (CVE-2026-27962) - High [577]
Description: Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Authlib is a Python library for building OAuth and OpenID Connect clients and servers, providing tools for secure authentication, token management, and authorization flows. | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.17116 |
debian: CVE-2026-27962 was patched at 2026-03-18
29.
Security Feature Bypass - Authlib (CVE-2026-28802) - High [577]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Authlib is a Python library for building OAuth and OpenID Connect clients and servers, providing tools for secure authentication, token management, and authorization flows. | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.05806 |
debian: CVE-2026-28802 was patched at 2026-03-18
30.
Memory Corruption - GNU Inetutils (CVE-2026-32746) - High [572]
Description: telnetd in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:JEFFAF:AUTOHACK, Vulners:PublicExploit:GitHub:CHOSENONEHACKS:CVE-2026-32746, Vulners:PublicExploit:GitHub:JEFFAF:CVE-2026-32746, Vulners:PublicExploit:GitHub:EKOMSSAVIOR:TELNET_SCAN, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | GNU Inetutils is a collection of common network utilities for GNU/Linux systems. | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.07486 |
debian: CVE-2026-32746 was patched at 2026-03-18
31.
Remote Code Execution - hdf5 (CVE-2026-26200) - High [571]
Description: HDF5 is software for managing data. Prior to version 1.14.4-2, an attacker who can control an `h5` file parsed by HDF5 can trigger a write-based heap buffer overflow condition. This can lead to a denial-of-service condition, and potentially further issues such as
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:hdfgroup:hdf5 (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00036, EPSS Percentile is 0.10867 |
debian: CVE-2026-26200 was patched at 2026-03-18
32.
Code Injection - zoneminder (CVE-2026-27470) - High [566]
Description: ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:GitHub:KOCAEMRE:CVE-2026-27470 websites | |
| 0.97 | 15 | Code Injection | |
| 0.5 | 14 | Product detected by a:zoneminder:zoneminder (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00011, EPSS Percentile is 0.01284 |
altlinux: CVE-2026-27470 was patched at 2026-03-03
debian: CVE-2026-27470 was patched at 2026-03-18
33.
Path Traversal - basic-ftp (CVE-2026-27699) - High [565]
Description: The `basic-ftp` FTP client library for Node.js contains a path traversal vulnerability (CWE-22) in versions prior to 5.2.0 in the `downloadToDir()` method. A malicious FTP server can send directory listings with filenames containing path traversal sequences (`../`) that cause files to be written outside the intended download directory. Version 5.2.0 patches the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:PACKETSTORM:216667 websites | |
| 0.7 | 15 | Path Traversal | |
| 0.5 | 14 | Product detected by a:patrickjuchli:basic-ftp (does NOT exist in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00095, EPSS Percentile is 0.26503 |
debian: CVE-2026-27699 was patched at 2026-03-18
34.
Security Feature Bypass - Caddy (CVE-2026-27585) - High [565]
Description: Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the path sanitization routine in file matcher doesn't sanitize backslashes which can lead to bypassing path related security protections. It affects users with specific Caddy and environment configurations. Version 2.11.1 fixes the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:caddyserver:caddy (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00105, EPSS Percentile is 0.28526 |
altlinux: CVE-2026-27585 was patched at 2026-03-04, 2026-03-05
debian: CVE-2026-27585 was patched at 2026-03-18
35.
Security Feature Bypass - Caddy (CVE-2026-27587) - High [565]
Description: Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's HTTP `path` request matcher is intended to be case-insensitive, but when the match pattern contains percent-escape sequences (`%xx`) it compares against the request's escaped path without lowercasing. An attacker can bypass path-based routing and any access controls attached to that route by changing the casing of the request path. Version 2.11.1 contains a fix for the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:caddyserver:caddy (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.13543 |
debian: CVE-2026-27587 was patched at 2026-03-18
36.
Security Feature Bypass - Caddy (CVE-2026-27588) - High [565]
Description: Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, Caddy's HTTP `host` request matcher is documented as case-insensitive, but when configured with a large host list (>100 entries) it becomes case-sensitive due to an optimized matching path. An attacker can bypass host-based routing and any access controls attached to that route by changing the casing of the `Host` header. Version 2.11.1 contains a fix for the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:caddyserver:caddy (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.13543 |
debian: CVE-2026-27588 was patched at 2026-03-18
37.
Server-Side Request Forgery - Libsoup (CVE-2026-3632) - High [564]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:gitlab.gnome.org website | |
| 0.87 | 15 | Server-Side Request Forgery | |
| 0.6 | 14 | libsoup is an HTTP client/server library for GNOME. It uses GObjects and the glib main loop to integrate well with GNOME applications and also has a synchronous API for use in CLI tools. | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00096, EPSS Percentile is 0.26743 |
debian: CVE-2026-3632 was patched at 2026-03-18
38.
Denial of Service - cpp-httplib (CVE-2026-28435) - High [563]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.7 | 14 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.17223 |
debian: CVE-2026-28435 was patched at 2026-03-18
39.
Denial of Service - cpp-httplib (CVE-2026-31870) - High [563]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.7 | 14 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00075, EPSS Percentile is 0.22569 |
debian: CVE-2026-31870 was patched at 2026-03-18
40.
Authentication Bypass - coTURN (CVE-2026-27624) - High [555]
Description: Coturn is a free open source implementation of TURN and STUN Server. Coturn is commonly configured to block loopback and internal ranges using "denied-peer-ip" and/or default loopback restrictions. CVE-2020-26262 addressed bypasses involving "0.0.0.0", "[::1]" and "[::]", but IPv4-mapped IPv6 is not covered. When sending a "CreatePermission" or "ChannelBind" request with the "XOR-PEER-ADDRESS" value of "::ffff:127.0.0.1", a successful response is received, even though "127.0.0.0/8" is blocked via "denied-peer-ip". The root cause is that, prior to the updated fix implemented in version 4.9.0, three functions in "src/client/ns_turn_ioaddr.c" do not check "IN6_IS_ADDR_V4MAPPED". "ioa_addr_is_loopback()" checks "127.x.x.x" (AF_INET) and "::1" (AF_INET6), but not "::ffff:127.0.0.1." "ioa_addr_is_zero()" checks "0.0.0.0" and "::", but not "::ffff:0.0.0.0." "addr_less_eq()" used by "ioa_addr_in_range()" for "denied-peer-ip" matching: when the range is AF_INET and the peer is AF_INET6, the comparison returns 0 without extracting the embedded IPv4. Version 4.9.0 contains an updated fix to address the bypass of the fix for CVE-2020-26262.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:1337DAY-ID-35665, Vulners:PublicExploit:PACKETSTORM:160893 websites | |
| 0.98 | 15 | Authentication Bypass | |
| 0.5 | 14 | Product detected by a:coturn_project:coturn (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00038, EPSS Percentile is 0.1132 |
debian: CVE-2026-27624 was patched at 2026-03-18
41.
Code Injection - ormar (CVE-2026-26198) - High [554]
Description: Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into `sqlalchemy.text()` without any validation or sanitization. The `min()` and `max()` methods in the `QuerySet` class accept arbitrary string input as the column parameter. While `sum()` and `avg()` are partially protected by an `is_numeric` type check that rejects non-existent fields, `min()` and `max()` skip this validation entirely. As a result, an attacker-controlled string is embedded as raw SQL inside the aggregate function call. Any unauthorized user can exploit this vulnerability to read the entire database contents, including tables unrelated to the queried model, by injecting a subquery as the column parameter. Version 0.23.0 contains a patch.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:GitHub:BLACKHATLEGEND:CVE-2026-26198 websites | |
| 0.97 | 15 | Code Injection | |
| 0.5 | 14 | Product detected by a:collerek:ormar (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03954 |
debian: CVE-2026-26198 was patched at 2026-03-18
42.
Authentication Bypass - Calibre (CVE-2026-27824) - High [553]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.98 | 15 | Authentication Bypass | |
| 0.7 | 14 | Calibre is a cross-platform free and open-source suite of e-book software | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.04776 |
debian: CVE-2026-27824 was patched at 2026-03-18
43.
Information Disclosure - cpp-httplib (CVE-2026-28434) - High [550]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.83 | 15 | Information Disclosure | |
| 0.7 | 14 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00066, EPSS Percentile is 0.20539 |
debian: CVE-2026-28434 was patched at 2026-03-18
44.
Elevation of Privilege - Snapd (CVE-2026-3888) - High [549]
Description: Local
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:FEVAR54:CVE-2026-3888-POC-ALL-FROM-THE-QUALYS-PLATFORM., Vulners:PublicExploit:GitHub:NETW0RK7:CVE-2026-3888-POC, BDU:PublicExploit websites | |
| 0.85 | 15 | Elevation of Privilege | |
| 0.6 | 14 | snapd is the background service that manages Snap packages on Linux, providing installation, updates, confinement, and runtime environment for snaps. | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00266 |
debian: CVE-2026-3888 was patched at 2026-03-18, 2026-03-19
ubuntu: CVE-2026-3888 was patched at 2026-03-17
45.
Memory Corruption - FreeRDP (CVE-2026-25952) - High [546]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00117, EPSS Percentile is 0.30621 |
altlinux: CVE-2026-25952 was patched at 2026-02-27
debian: CVE-2026-25952 was patched at 2026-03-18
ubuntu: CVE-2026-25952 was patched at 2026-03-18
46.
Memory Corruption - FreeRDP (CVE-2026-25953) - High [546]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00117, EPSS Percentile is 0.30621 |
altlinux: CVE-2026-25953 was patched at 2026-02-27
debian: CVE-2026-25953 was patched at 2026-03-18
ubuntu: CVE-2026-25953 was patched at 2026-03-18
47.
Memory Corruption - FreeRDP (CVE-2026-25959) - High [546]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00111, EPSS Percentile is 0.2962 |
altlinux: CVE-2026-25959 was patched at 2026-02-27
debian: CVE-2026-25959 was patched at 2026-03-18
ubuntu: CVE-2026-25959 was patched at 2026-03-18
48.
Memory Corruption - FreeRDP (CVE-2026-25997) - High [546]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00117, EPSS Percentile is 0.30621 |
altlinux: CVE-2026-25997 was patched at 2026-02-27
debian: CVE-2026-25997 was patched at 2026-03-18
ubuntu: CVE-2026-25997 was patched at 2026-03-18
49.
Denial of Service - Binutils (CVE-2026-3442) - High [544]
Description: A flaw was found in GNU
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:HACKER1337ITME:CVE-2026-3442 website | |
| 0.7 | 15 | Denial of Service | |
| 0.8 | 14 | The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00276 |
debian: CVE-2026-3442 was patched at 2026-03-18
50.
Command Injection - glances (CVE-2026-32608) - High [542]
Description: Glances is an open-source system cross-platform monitoring tool. The Glances action system allows administrators to configure shell commands that execute when monitoring thresholds are exceeded. These commands support Mustache template variables (e.g., `{{name}}`, `{{key}}`) that are populated with runtime monitoring data. The `secure_popen()` function, which executes these commands, implements its own pipe, redirect, and chain operator handling by splitting the command string before passing each segment to `subprocess.Popen(shell=False)`. Prior to 4.5.2, when a Mustache-rendered value (such as a process name, filesystem mount point, or container name) contains pipe, redirect, or chain metacharacters, the rendered command is split in unintended ways, allowing an attacker who controls a process name or container name to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.97 | 15 | Command Injection | |
| 0.5 | 14 | Product detected by a:nicolargo:glances (does NOT exist in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00808 |
debian: CVE-2026-32608 was patched at 2026-03-18
51.
Security Feature Bypass - Authlib (CVE-2026-28498) - High [541]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Authlib is a Python library for building OAuth and OpenID Connect clients and servers, providing tools for secure authentication, token management, and authorization flows. | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03288 |
debian: CVE-2026-28498 was patched at 2026-03-18
52.
Security Feature Bypass - PyJWT (CVE-2026-32597) - High [541]
Description: PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:pyjwt_project:pyjwt (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00921 |
debian: CVE-2026-32597 was patched at 2026-03-18
53.
Path Traversal - Calibre (CVE-2026-30853) - High [539]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Path Traversal | |
| 0.7 | 14 | Calibre is a cross-platform free and open-source suite of e-book software | |
| 0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.02126 |
debian: CVE-2026-30853 was patched at 2026-03-18
54.
Cross Site Scripting - fast-xml-parser (CVE-2026-25896) - High [535]
Description: fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (<, >, &, ", ') with arbitrary values. This bypasses entity encoding and leads to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | Product detected by a:naturalintelligence:fast-xml-parser (does NOT exist in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 9.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02545 |
debian: CVE-2026-25896 was patched at 2026-03-18
55.
Denial of Service - FreeRDP (CVE-2026-31884) - High [534]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.08968 |
debian: CVE-2026-31884 was patched at 2026-03-18
56.
Denial of Service - Wireshark (CVE-2026-3201) - High [534]
Description: USB HID protocol dissector memory exhaustion in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:gitlab.com, Vulners:PublicExploit:PACKETSTORM:216622 websites | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00035, EPSS Percentile is 0.10191 |
altlinux: CVE-2026-3201 was patched at 2026-02-27
debian: CVE-2026-3201 was patched at 2026-03-18
57.
Denial of Service - Wireshark (CVE-2026-3203) - High [534]
Description: RF4CE Profile protocol dissector crash in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:216621 website | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00037, EPSS Percentile is 0.10993 |
altlinux: CVE-2026-3203 was patched at 2026-02-27
debian: CVE-2026-3203 was patched at 2026-03-18
58.
Memory Corruption - FreeRDP (CVE-2026-25955) - High [534]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00074, EPSS Percentile is 0.22241 |
altlinux: CVE-2026-25955 was patched at 2026-02-27
debian: CVE-2026-25955 was patched at 2026-03-18
ubuntu: CVE-2026-25955 was patched at 2026-03-18
59.
Code Injection - lxml_html_clean (CVE-2026-28350) - High [530]
Description: lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the <base> tag passes through the default Cleaner configuration. While page_structure=True removes html, head, and title tags, there is no specific handling for <base>, allowing an attacker to inject it and hijack relative links on the page. This issue has been patched in version 0.4.4.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.97 | 15 | Code Injection | |
| 0.5 | 14 | Product detected by a:fedoralovespython:lxml_html_clean (does NOT exist in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.0001, EPSS Percentile is 0.01031 |
debian: CVE-2026-28350 was patched at 2026-03-18
60.
Denial of Service - pyasn1 (CVE-2026-30922) - High [529]
Description: pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a Denial of Service (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:pyasn1:pyasn1 (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.15354 |
altlinux: CVE-2026-30922 was patched at 2026-03-20
debian: CVE-2026-30922 was patched at 2026-03-18
61.
Path Traversal - rack (CVE-2026-22860) - High [529]
Description: Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match on the expanded path. A request like `/../root_example/` can escape the configured root if the target path starts with the root string, allowing directory listing outside the intended root. Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Path Traversal | |
| 0.5 | 14 | Product detected by a:rack:rack (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00074, EPSS Percentile is 0.22283 |
debian: CVE-2026-22860 was patched at 2026-03-18, 2026-03-23
ubuntu: CVE-2026-22860 was patched at 2026-02-26
62.
Security Feature Bypass - Caddy (CVE-2026-27589) - High [529]
Description: Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, the local caddy admin API (default listen `127.0.0.1:2019`) exposes a state-changing `POST /load` endpoint that replaces the entire running configuration. When origin enforcement is not enabled (`enforce_origin` not configured), the admin endpoint accepts cross-origin requests (e.g., from attacker-controlled web content in a victim browser) and applies an attacker-supplied JSON config. This can change the admin listener settings and alter HTTP server behavior without user intent. Version 2.11.1 contains a fix for the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:caddyserver:caddy (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.04237 |
altlinux: CVE-2026-27589 was patched at 2026-03-04, 2026-03-05
debian: CVE-2026-27589 was patched at 2026-03-18
63.
Denial of Service - Kubernetes (CVE-2026-24514) - High [527]
Description: A security issue was discovered in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:MBANYAMER:CVE-2026-24514-KUBERNETES-DOS website | |
| 0.7 | 15 | Denial of Service | |
| 0.7 | 14 | Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0398 |
redos: CVE-2026-24514 was patched at 2026-03-11
64.
Denial of Service - FreeRDP (CVE-2026-27015) - High [522]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.1298 |
altlinux: CVE-2026-27015 was patched at 2026-02-27
debian: CVE-2026-27015 was patched at 2026-03-18
ubuntu: CVE-2026-27015 was patched at 2026-03-18
65.
Memory Corruption - FreeRDP (CVE-2026-26955) - High [522]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.15407 |
altlinux: CVE-2026-26955 was patched at 2026-02-27
debian: CVE-2026-26955 was patched at 2026-03-18
ubuntu: CVE-2026-26955 was patched at 2026-03-18
66.
Memory Corruption - FreeRDP (CVE-2026-26965) - High [522]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.1911 |
altlinux: CVE-2026-26965 was patched at 2026-02-27
debian: CVE-2026-26965 was patched at 2026-03-18
ubuntu: CVE-2026-26965 was patched at 2026-03-18
67.
Memory Corruption - FreeRDP (CVE-2026-31806) - High [522]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0002, EPSS Percentile is 0.05381 |
debian: CVE-2026-31806 was patched at 2026-03-18
68.
Memory Corruption - FreeRDP (CVE-2026-31883) - High [522]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.13688 |
debian: CVE-2026-31883 was patched at 2026-03-18
69.
Authentication Bypass - Curl (CVE-2026-3783) - High [520]
Description: When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances. If the hostname that the first request is redirected to has information in the used .netrc file, with either of the `machine` or `default` keywords, curl would pass on the bearer token set for the first host also to the second one.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:hackerone.com website | |
| 0.98 | 15 | Authentication Bypass | |
| 0.5 | 14 | Product detected by a:haxx:curl (exists in CPE dict) | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00016, EPSS Percentile is 0.03494 |
altlinux: CVE-2026-3783 was patched at 2026-03-16
debian: CVE-2026-3783 was patched at 2026-03-18
ubuntu: CVE-2026-3783 was patched at 2026-03-11, 2026-03-16
70.
Remote Code Execution - GVfs (CVE-2026-28296) - High [519]
Description: A flaw was found in the FTP
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:EXPLOITINTEL:EIP-POCS-AND-CVES, Vulners:PublicExploit:PACKETSTORM:216454 websites | |
| 1.0 | 15 | Remote Code Execution | |
| 0.4 | 14 | GVfs (GNOME Virtual File System) is userspace virtual filesystem software for GNOME that provides backends (including FTP) to access different remote and local file systems transparently. | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0006, EPSS Percentile is 0.18821 |
debian: CVE-2026-28296 was patched at 2026-03-18
71.
Denial of Service - Pypdf (CVE-2026-27888) - High [517]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:216689 website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | PyPDF is a Python library for reading, manipulating, and writing PDF files, including extraction, splitting, merging, and encryption features. | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00048, EPSS Percentile is 0.14907 |
debian: CVE-2026-27888 was patched at 2026-03-18
72.
Denial of Service - fast-xml-parser (CVE-2026-26278) - High [517]
Description: fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expansion. With a very small XML input, it’s possible to make the parser spend seconds or even minutes processing a single request, effectively freezing the application. Version 5.3.6 fixes the issue. As a workaround, avoid using DOCTYPE parsing by `processEntities: false` option.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:naturalintelligence:fast-xml-parser (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.05956 |
debian: CVE-2026-26278 was patched at 2026-03-18
73.
Incorrect Calculation - Caddy (CVE-2026-27586) - High [517]
Description: Caddy is an extensible server platform that uses TLS by default. Prior to version 2.11.1, two swallowed errors in `ClientAuthentication.provision()` cause mTLS client certificate authentication to silently fail open when a CA certificate file is missing, unreadable, or malformed. The server starts without error but accepts any client certificate signed by any system-trusted CA, completely bypassing the intended private CA trust boundary. Any deployment using `trusted_ca_cert_file` or `trusted_ca_certs_pem_files` for mTLS will silently degrade to accepting any system-trusted client certificate if the CA file becomes unavailable. This can happen due to a typo in the path, file rotation, corruption, or permission changes. The server gives no indication that mTLS is misconfigured. Version 2.11.1 fixes the vulnerability.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.5 | 14 | Product detected by a:caddyserver:caddy (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00088, EPSS Percentile is 0.25291 |
altlinux: CVE-2026-27586 was patched at 2026-03-04, 2026-03-05
debian: CVE-2026-27586 was patched at 2026-03-18
74.
Information Disclosure - Authlib (CVE-2026-28490) - High [517]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.83 | 15 | Information Disclosure | |
| 0.5 | 14 | Authlib is a Python library for building OAuth and OpenID Connect clients and servers, providing tools for secure authentication, token management, and authorization flows. | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00011, EPSS Percentile is 0.01217 |
debian: CVE-2026-28490 was patched at 2026-03-18
75.
Memory Corruption - Admesh (CVE-2022-38072) - High [517]
Description: An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:talosintelligence.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:admesh_project:admesh (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00096, EPSS Percentile is 0.26673 |
debian: CVE-2022-38072 was patched at 2026-03-18
76.
Memory Corruption - sail (CVE-2026-27168) - High [517]
Description: SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:sail:sail (does NOT exist in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15633 |
debian: CVE-2026-27168 was patched at 2026-03-18
77.
Cross Site Scripting - lxml_html_clean (CVE-2026-28348) - High [511]
Description: lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the _has_sneaky_javascript() method strips backslashes before checking for dangerous CSS keywords. This causes CSS Unicode escape sequences to bypass the @import and expression() filters, allowing external CSS loading or
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | Product detected by a:fedoralovespython:lxml_html_clean (does NOT exist in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0003, EPSS Percentile is 0.08492 |
debian: CVE-2026-28348 was patched at 2026-03-18
78.
Incorrect Calculation - FreeRDP (CVE-2026-27951) - High [510]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.17867 |
altlinux: CVE-2026-27951 was patched at 2026-02-27
debian: CVE-2026-27951 was patched at 2026-03-18
ubuntu: CVE-2026-27951 was patched at 2026-03-18
79.
Memory Corruption - FreeRDP (CVE-2026-25942) - High [510]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00071, EPSS Percentile is 0.21776 |
altlinux: CVE-2026-25942 was patched at 2026-02-27
debian: CVE-2026-25942 was patched at 2026-03-18
ubuntu: CVE-2026-25942 was patched at 2026-03-18
80.
Memory Corruption - FreeRDP (CVE-2026-25954) - High [510]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0007, EPSS Percentile is 0.21351 |
altlinux: CVE-2026-25954 was patched at 2026-02-27
debian: CVE-2026-25954 was patched at 2026-03-18
ubuntu: CVE-2026-25954 was patched at 2026-03-18
81.
Memory Corruption - FreeRDP (CVE-2026-26986) - High [510]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00076, EPSS Percentile is 0.22795 |
altlinux: CVE-2026-26986 was patched at 2026-02-27
debian: CVE-2026-26986 was patched at 2026-03-18
ubuntu: CVE-2026-26986 was patched at 2026-03-18
82.
Memory Corruption - FreeRDP (CVE-2026-29774) - High [510]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.16707 |
debian: CVE-2026-29774 was patched at 2026-03-18
83.
Memory Corruption - FreeRDP (CVE-2026-29775) - High [510]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.16333 |
debian: CVE-2026-29775 was patched at 2026-03-18
84.
Memory Corruption - FreeRDP (CVE-2026-31885) - High [510]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.9 | 10 | CVSS Base Score is 9.4. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00034, EPSS Percentile is 0.10006 |
debian: CVE-2026-31885 was patched at 2026-03-18
85.
Memory Corruption - FreeRDP (CVE-2026-31897) - High [510]
Description: FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, there is an out-of-bounds read in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00034, EPSS Percentile is 0.10006 |
debian: CVE-2026-31897 was patched at 2026-03-18
86.
Denial of Service - JOSE (CVE-2026-27932) - High [508]
Description: joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:PACKETSTORM:216669 websites | |
| 0.7 | 15 | Denial of Service | |
| 0.3 | 14 | JavaScript module for JSON Object Signing and Encryption (JOSE) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00108, EPSS Percentile is 0.29079 |
debian: CVE-2026-27932 was patched at 2026-03-18
87.
Denial of Service - Underscore (CVE-2026-27601) - High [505]
Description: Underscore.js is a utility-belt library for JavaScript. Prior to 1.13.8, the _.flatten and _.isEqual functions use recursion without a depth limit. Under very specific conditions, detailed below, an attacker could exploit this in a Denial of Service (DoS) attack by triggering a stack overflow. Untrusted input must be used to create a recursive datastructure, for example using JSON.parse, with no enforced depth limit. The datastructure thus created must be passed to _.flatten or _.isEqual. In the case of _.flatten, the vulnerability can only be exploited if it is possible for a remote client to prepare a datastructure that consists of arrays at all levels AND if no finite depth limit is passed as the second argument to _.flatten. In the case of _.isEqual, the vulnerability can only be exploited if there exists a code path in which two distinct datastructures that were submitted by the same remote client are compared using _.isEqual. For example, if a client submits data that are stored in a database, and the same client can later submit another datastructure that is then compared to the data that were saved in the database previously, OR if a client submits a single request, but its data are parsed twice, creating two non-identical but equivalent datastructures that are then compared. Exceptions originating from the call to _.flatten or _.isEqual, as a result of a stack overflow, are not being caught. This vulnerability is fixed in 1.13.8.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:underscorejs:underscore (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02611 |
debian: CVE-2026-27601 was patched at 2026-03-18
88.
Denial of Service - flatted (CVE-2026-32141) - High [505]
Description: flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process. This vulnerability is fixed in 3.4.0.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:webreflection:flatted (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02561 |
debian: CVE-2026-32141 was patched at 2026-03-18
89.
Denial of Service - minimatch (CVE-2026-26996) - High [505]
Description: minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (Re
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:minimatch_project:minimatch (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.04625 |
debian: CVE-2026-26996 was patched at 2026-03-18
90.
Denial of Service - minimatch (CVE-2026-27903) - High [505]
Description: minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3, `matchOne()` performs unbounded recursive backtracking when a glob pattern contains multiple non-adjacent `**` (GLOBSTAR) segments and the input path does not match. The time complexity is O(C(n, k)) -- binomial -- where `n` is the number of path segments and `k` is the number of globstars. With k=11 and n=30, a call to the default `minimatch()` API stalls for roughly 5 seconds. With k=13, it exceeds 15 seconds. No memoization or call budget exists to bound this behavior. Any application where an attacker can influence the glob pattern passed to `minimatch()` is vulnerable. The realistic attack surface includes build tools and task runners that accept user-supplied glob arguments (ESLint, Webpack, Rollup config), multi-tenant systems where one tenant configures glob-based rules that run in a shared process, admin or developer interfaces that accept ignore-rule or filter configuration as globs, and CI/CD pipelines that evaluate user-submitted config files containing glob patterns. An attacker who can place a crafted pattern into any of these paths can stall the Node.js event loop for tens of seconds per invocation. The pattern is 56 bytes for a 5-second stall and does not require authentication in contexts where pattern input is part of the feature. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3 fix the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:minimatch_project:minimatch (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.0463 |
debian: CVE-2026-27903 was patched at 2026-03-18
91.
Denial of Service - minimatch (CVE-2026-27904) - High [505]
Description: minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested `*()` extglobs produce regexps with nested unbounded quantifiers (e.g. `(?:(?:a|b)*)*`), which exhibit catastrophic backtracking in V8. With a 12-byte pattern `*(*(*(a|b)))` and an 18-byte non-matching input, `minimatch()` stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default `minimatch()` API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects `+()` extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:minimatch_project:minimatch (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03996 |
debian: CVE-2026-27904 was patched at 2026-03-18
92.
Incorrect Calculation - Psd-tools (CVE-2026-27809) - High [505]
Description: psd-tools is a Python package for working with Adobe Photoshop PSD files. Prior to version 1.12.2, when a PSD file contains malformed RLE-compressed image data (e.g. a literal run that extends past the expected row size), decode_rle() raises ValueError which propagated all the way to the user, crashing psd.composite() and psd-tools export. decompress() already had a fallback that replaces failed channels with black pixels when result is None, but it never triggered because the ValueError from decode_rle() was not caught. The fix in version 1.12.2 wraps the decode_rle() call in a try/except so the existing fallback handles the error gracefully.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.5 | 14 | Product detected by a:psd-tools_project:psd-tools (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.16905 |
debian: CVE-2026-27809 was patched at 2026-03-18
93.
Memory Corruption - fast_xml_parser (CVE-2023-26920) - High [505]
Description: fast-xml-parser before 4.1.2 allows __proto__ for
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:gist.github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:naturalintelligence:fast_xml_parser (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.4 | 10 | EPSS Probability is 0.00199, EPSS Percentile is 0.41954 |
debian: CVE-2023-26920 was patched at 2026-03-18
94.
Security Feature Bypass - Cosign (CVE-2026-24122) - High [505]
Description: Cosign provides code signing and transparency for containers and binaries. In versions 3.0.4 and below, an issuing certificate with a validity that expires before the leaf certificate will be considered valid during verification even if the provided timestamp would mean the issuing certificate should be considered expired. When verifying artifact signatures using a certificate, Cosign first verifies the certificate chain using the leaf certificate's "not before" timestamp and later checks expiry of the leaf certificate using either a signed timestamp provided by the Rekor transparency log or from a timestamp authority, or using the current time. The root and all issuing certificates are assumed to be valid during the leaf certificate's validity. There is no impact to users of the public Sigstore infrastructure. This may affect private deployments with customized PKIs. This issue has been fixed in version 3.0.5.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:PACKETSTORM:216155 websites | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:sigstore:cosign (exists in CPE dict) | |
| 0.4 | 10 | CVSS Base Score is 3.7. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.05762 |
altlinux: CVE-2026-24122 was patched at 2026-03-17
debian: CVE-2026-24122 was patched at 2026-03-18
95.
Denial of Service - QEMU (CVE-2026-2243) - High [503]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:216123 website | |
| 0.7 | 15 | Denial of Service | |
| 0.7 | 14 | QEMU is a generic and open source machine & userspace emulator and virtualizer | |
| 0.5 | 10 | CVSS Base Score is 5.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.04449 |
debian: CVE-2026-2243 was patched at 2026-03-18
96.
Memory Corruption - cpp-httplib (CVE-2026-29076) - High [503]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.7 | 14 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library | |
| 0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15705 |
debian: CVE-2026-29076 was patched at 2026-03-18
97.
Cross Site Scripting - rack (CVE-2026-25500) - High [500]
Description: Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory` generates an HTML directory index where each file entry is rendered as a clickable link. If a file exists on disk whose basename starts with the `javascript:` scheme (e.g. `javascript:alert(1)`), the generated index contains an anchor whose `href` is exactly `javascript:alert(1)`. Clicking the entry executes JavaScript in the browser (demonstrated with `alert(1)`). Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | Product detected by a:rack:rack (does NOT exist in CPE dict) | |
| 0.5 | 10 | CVSS Base Score is 5.4. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.0573 |
debian: CVE-2026-25500 was patched at 2026-03-18
ubuntu: CVE-2026-25500 was patched at 2026-02-26
98.
Denial of Service - Squirrel (CVE-2026-3388) - High [494]
Description: A vulnerability was found in Squirrel up to 3.2. This affects the function SQCompiler::Factor/SQCompiler::UnaryOP of the file squirrel/sqcompiler.cpp. Performing a manipulation results in uncontrolled recursion. The attack needs to be approached locally. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:squirrel-lang:squirrel (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06174 |
debian: CVE-2026-3388 was patched at 2026-03-18
99.
Incorrect Calculation - yamux (CVE-2026-31814) - High [494]
Description: Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. From 0.13.0 to before 0.13.9, a specially crafted WindowUpdate can cause arithmetic overflow in send-window accounting, which triggers a panic in the connection state machine. This is remotely reachable over a normal network connection and does not require authentication. This vulnerability is fixed in 0.13.9.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.5 | 14 | Product detected by a:protocol:yamux (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00071, EPSS Percentile is 0.21741 |
debian: CVE-2026-31814 was patched at 2026-03-18
100.
Path Traversal - tar (CVE-2026-26960) - High [494]
Description: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Path Traversal | |
| 0.5 | 14 | Product detected by a:isaacs:tar (does NOT exist in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00264 |
debian: CVE-2026-26960 was patched at 2026-03-18
101.
Tampering - Dottie (CVE-2026-27837) - High [494]
Description: Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7d3aee1` only validates the first segment of a dot-separated path, allowing an attacker to bypass the protection by placing `__proto__` at any position other than the first. Both `dottie.set()` and `dottie.transform()` are affected. Version 2.0.7 contains an updated fix to address the residual vulnerability.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:PACKETSTORM:216610 websites | |
| 0.3 | 15 | Tampering | |
| 0.5 | 14 | Product detected by a:dottie_project:dottie (exists in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00096, EPSS Percentile is 0.26708 |
debian: CVE-2026-27837 was patched at 2026-03-18
102.
Authentication Bypass - Keycloak (CVE-2026-3047) - High [486]
Description: A flaw was found in org.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.6 | 10 | EPSS Probability is 0.0034, EPSS Percentile is 0.56609 |
altlinux: CVE-2026-3047 was patched at 2026-03-10, 2026-03-23
103.
Denial of Service - libexpat (CVE-2026-32777) - High [482]
Description: libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:libexpat_project:libexpat (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00012, EPSS Percentile is 0.01671 |
debian: CVE-2026-32777 was patched at 2026-03-18
104.
Denial of Service - miniaudio (CVE-2026-32837) - High [482]
Description: miniaudio version 0.11.25 and earlier contain a heap out-of-bounds read vulnerability in the WAV BEXT metadata parser that allows attackers to trigger memory access violations by processing crafted WAV files. Attackers can exploit improper null-termination handling in the coding history field to cause out-of-bounds reads past the allocated metadata pool, resulting in application crashes or
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:mackron:miniaudio (does NOT exist in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.02239 |
debian: CVE-2026-32837 was patched at 2026-03-18
105.
Memory Corruption - Curl (CVE-2026-3805) - High [482]
Description: When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:hackerone.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:haxx:curl (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00039, EPSS Percentile is 0.11788 |
altlinux: CVE-2026-3805 was patched at 2026-03-16
debian: CVE-2026-3805 was patched at 2026-03-18
ubuntu: CVE-2026-3805 was patched at 2026-03-11
106.
Memory Corruption - Open Babel (CVE-2026-2704) - High [482]
Description: A security vulnerability has been detected in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Open Babel is an open-source chemical toolbox for converting, analyzing and working with many molecular file formats. It provides a C/C++ library and command-line tools widely used in cheminformatics and computational chemistry workflows. | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00024, EPSS Percentile is 0.06391 |
debian: CVE-2026-2704 was patched at 2026-03-18
107.
Memory Corruption - Open Babel (CVE-2026-2705) - High [482]
Description: A vulnerability was detected in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Open Babel is an open-source chemical toolbox for converting, analyzing and working with many molecular file formats. It provides a C/C++ library and command-line tools widely used in cheminformatics and computational chemistry workflows. | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.05838 |
debian: CVE-2026-2705 was patched at 2026-03-18
108.
Memory Corruption - Open Babel (CVE-2026-3408) - High [482]
Description: A vulnerability was identified in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Open Babel is an open-source chemical toolbox for converting, analyzing and working with many molecular file formats. It provides a C/C++ library and command-line tools widely used in cheminformatics and computational chemistry workflows. | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00065, EPSS Percentile is 0.2023 |
debian: CVE-2026-3408 was patched at 2026-03-18
109.
Memory Corruption - exiv2 (CVE-2026-25884) - High [482]
Description: Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found. The vulnerability is in the CRW image parser. This issue has been patched in version 0.28.8.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:exiv2:exiv2 (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00037, EPSS Percentile is 0.1109 |
altlinux: CVE-2026-25884 was patched at 2026-03-09
debian: CVE-2026-25884 was patched at 2026-03-18
ubuntu: CVE-2026-25884 was patched at 2026-03-18
110.
Memory Corruption - libvips (CVE-2026-3147) - High [482]
Description: A vulnerability was found in libvips up to 8.18.0. This affects the function vips_foreign_load_csv_build of the file libvips/foreign/csvload.c. The manipulation results in heap-based buffer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as b3ab458a25e0e261cbd1788474bbc763f7435780. It is advisable to implement a patch to correct this issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libvips:libvips (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06029 |
debian: CVE-2026-3147 was patched at 2026-03-18
111.
Path Traversal - tar (CVE-2026-29786) - High [482]
Description: node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:GitHub:JVR2022:CVE-2026-29786 websites | |
| 0.7 | 15 | Path Traversal | |
| 0.5 | 14 | Product detected by a:isaacs:tar (does NOT exist in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 6.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00247 |
debian: CVE-2026-29786 was patched at 2026-03-18
112.
Denial of Service - Cairo (CVE-2026-31899) - High [479]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.7 | 15 | Denial of Service | |
| 0.2 | 14 | 2D graphics library used for rendering vector graphics, including PDF via Poppler | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.17223 |
debian: CVE-2026-31899 was patched at 2026-03-18
113.
Remote Code Execution - PHP (CVE-2026-27206) - High [478]
Description: Zumba Json Serializer is a library to serialize
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.6 | 10 | EPSS Probability is 0.00419, EPSS Percentile is 0.61716 |
debian: CVE-2026-27206 was patched at 2026-03-18
114.
Denial of Service - Linux Kernel (CVE-2024-14027) - High [477]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:LCFR-ETH:CVE-2024-14027_SLOP website | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.0 | 10 | EPSS Probability is 0.0001, EPSS Percentile is 0.01138 |
debian: CVE-2024-14027 was patched at 2026-03-18
115.
Memory Corruption - FreeRDP (CVE-2026-26271) - High [475]
Description: FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, a buffer overread in `
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on BDU:PublicExploit website | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00059, EPSS Percentile is 0.18456 |
altlinux: CVE-2026-26271 was patched at 2026-02-27
debian: CVE-2026-26271 was patched at 2026-03-18
ubuntu: CVE-2026-26271 was patched at 2026-03-18
116.
Memory Corruption - Admesh (CVE-2026-2653) - High [470]
Description: A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:admesh_project:admesh (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00269 |
debian: CVE-2026-2653 was patched at 2026-03-18
117.
Memory Corruption - Squirrel (CVE-2026-2659) - High [470]
Description: A vulnerability was determined in Squirrel up to 3.2. Affected by this vulnerability is the function SQFuncState::PopTarget of the file src/squirrel/squirrel/sqfuncstate.cpp. Executing a manipulation of the argument _target_stack can lead to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:squirrel-lang:squirrel (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00945 |
debian: CVE-2026-2659 was patched at 2026-03-18
118.
Memory Corruption - Squirrel (CVE-2026-2661) - High [470]
Description: A security flaw has been discovered in Squirrel up to 3.2. This affects the function SQObjectPtr::operator in the library squirrel/sqobject.h. The manipulation results in heap-based buffer overflow. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:PACKETSTORM:216049 websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:squirrel-lang:squirrel (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00945 |
debian: CVE-2026-2661 was patched at 2026-03-18
119.
Memory Corruption - libbiosig (CVE-2025-64736) - High [470]
Description: An out-of-bounds read vulnerability exists in the ABF parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (5462afb0). A specially crafted .abf file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.talosintelligence.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libbiosig_project:libbiosig (does NOT exist in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.05623 |
debian: CVE-2025-64736 was patched at 2026-03-18
120.
Memory Corruption - libvips (CVE-2026-2913) - High [470]
Description: A vulnerability was determined in libvips up to 8.19.0. The affected element is the function vips_source_read_to_memory of the file libvips/iofuncs/source.c. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The attack's complexity is rated as high. The exploitability is described as difficult. The exploit has been publicly disclosed and may be utilized. Patch name: a56feecbe9ed66521d9647ec9fbcd2546eccd7ee. Applying a patch is the recommended action to fix this issue. The confirmation of the bugfix mentions: "[T]he impact of this is negligible, since this only affects custom seekable sources larger than 4 GiB (and the crash occurs in user code rather than libvips itself)."
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libvips:libvips (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 7.0. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06044 |
debian: CVE-2026-2913 was patched at 2026-03-18
121.
Memory Corruption - libvips (CVE-2026-3145) - High [470]
Description: A flaw has been found in libvips up to 8.18.0. The affected element is the function vips_foreign_load_matrix_file_is_a/vips_foreign_load_matrix_header of the file libvips/foreign/matrixload.c. Executing a manipulation can lead to memory corruption. The attack needs to be launched locally. This patch is called d4ce337c76bff1b278d7085c3c4f4725e3aa6ece. A patch should be applied to remediate this issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libvips:libvips (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03994 |
debian: CVE-2026-3145 was patched at 2026-03-18
122.
Memory Corruption - libvips (CVE-2026-3281) - High [470]
Description: A vulnerability was detected in libvips 8.19.0. This affects the function vips_bandrank_build of the file libvips/conversion/bandrank.c. Performing a manipulation of the argument index results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit is now public and may be used. The patch is named fd28c5463697712cb0ab116a2c55e4f4d92c4088. It is suggested to install a patch to address this issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libvips:libvips (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00011, EPSS Percentile is 0.01307 |
debian: CVE-2026-3281 was patched at 2026-03-18
123.
Memory Corruption - openexr (CVE-2026-27622) - High [470]
Description: OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector<unsigned int> total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32. overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:PACKETSTORM:216683 websites | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:openexr:openexr (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.02238 |
debian: CVE-2026-27622 was patched at 2026-03-18
124.
Remote Code Execution - GIMP (CVE-2026-2047) - High [470]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0.5 | 17 | The existence of a private exploit is mentioned on BDU:PrivateExploit website | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | GIMP is an open-source image manipulation program used for photo editing, graphic design, and digital art creation. | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00036, EPSS Percentile is 0.1048 |
almalinux: CVE-2026-2047 was patched at 2026-03-10
debian: CVE-2026-2047 was patched at 2026-03-18
oraclelinux: CVE-2026-2047 was patched at 2026-03-10
redhat: CVE-2026-2047 was patched at 2026-03-10
redos: CVE-2026-2047 was patched at 2026-03-19
125.
Authentication Bypass - Mozilla Firefox (CVE-2026-2768) - High [463]
Description: Sandbox escape in the Storage: IndexedDB component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 10.0. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00097, EPSS Percentile is 0.26907 |
almalinux: CVE-2026-2768 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2768 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2768 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2768 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2768 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
126.
Incorrect Calculation - libvips (CVE-2026-3284) - High [458]
Description: A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, Vulners:PublicExploit:PACKETSTORM:216458 websites | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.5 | 14 | Product detected by a:libvips:libvips (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0002, EPSS Percentile is 0.05319 |
debian: CVE-2026-3284 was patched at 2026-03-18
127.
Memory Corruption - Squirrel (CVE-2026-3389) - High [458]
Description: A vulnerability was determined in Squirrel up to 3.2. This vulnerability affects the function sqstd_rex_newnode in the library sqstdlib/sqstdrex.cpp. Executing a manipulation can lead to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:squirrel-lang:squirrel (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06174 |
debian: CVE-2026-3389 was patched at 2026-03-18
128.
Memory Corruption - ettercap (CVE-2026-3606) - High [458]
Description: A vulnerability has been found in Ettercap 0.8.4-Garofalo. Affected by this vulnerability is the function add_data_segment of the file src/ettercap/utils/etterfilter/ef_output.c of the component etterfilter. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:vuldb.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:ettercap-project:ettercap (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.05529 |
debian: CVE-2026-3606 was patched at 2026-03-18
129.
Memory Corruption - libvips (CVE-2026-3282) - High [458]
Description: A flaw has been found in libvips 8.19.0. This vulnerability affects the function vips_unpremultiply_build of the file libvips/conversion/unpremultiply.c. Executing a manipulation of the argument alpha_band can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been published and may be used. This patch is called 7215ead1e0cd7d3703cc4f5fca06d7d0f4c22b91. A patch should be applied to remediate this issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libvips:libvips (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02547 |
debian: CVE-2026-3282 was patched at 2026-03-18
debian: CVE-2026-32829 was patched at 2026-03-18
130.
Memory Corruption - libvips (CVE-2026-3283) - High [458]
Description: A vulnerability has been found in libvips 8.19.0. This issue affects the function vips_extract_band_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_band leads to out-of-bounds read. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. To fix this issue, it is recommended to deploy a patch.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libvips:libvips (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02547 |
debian: CVE-2026-3283 was patched at 2026-03-18
debian: CVE-2026-32837 was patched at 2026-03-18
131.
Tampering - Calibre (CVE-2026-27810) - High [455]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.3 | 15 | Tampering | |
| 0.7 | 14 | Calibre is a cross-platform free and open-source suite of e-book software | |
| 0.6 | 10 | CVSS Base Score is 6.4. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.13981 |
debian: CVE-2026-27810 was patched at 2026-03-18
132.
Remote Code Execution - Mozilla Firefox (CVE-2026-2792) - High [454]
Description: Memory safety bugs present in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0007, EPSS Percentile is 0.21288 |
almalinux: CVE-2026-2792 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2792 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2792 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2792 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2792 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
133.
Remote Code Execution - Mozilla Firefox (CVE-2026-2793) - High [454]
Description: Memory safety bugs present in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00071, EPSS Percentile is 0.21647 |
almalinux: CVE-2026-2793 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2793 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2793 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27932 was patched at 2026-03-18
oraclelinux: CVE-2026-2793 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2793 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
134.
Remote Code Execution - Mozilla Firefox (CVE-2026-2807) - High [454]
Description: Memory safety bugs present in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.19109 |
altlinux: CVE-2026-2807 was patched at 2026-03-16
135.
Remote Code Execution - Apache Commons Text (CVE-2025-46295) - High [452]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | The Commons Text library provides additions to the standard JDK text handling | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.6 | 10 | EPSS Probability is 0.00379, EPSS Percentile is 0.59273 |
redos: CVE-2025-46295 was patched at 2026-02-24
136.
Remote Code Execution - gstreamer (CVE-2026-3083) - High [452]
Description: GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.7 | 10 | EPSS Probability is 0.00497, EPSS Percentile is 0.65742 |
debian: CVE-2026-3083 was patched at 2026-03-18
debian: CVE-2026-30838 was patched at 2026-03-18
137.
Authentication Bypass - Keycloak (CVE-2026-2603) - High [451]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.4 | 10 | EPSS Probability is 0.00172, EPSS Percentile is 0.38444 |
altlinux: CVE-2026-2603 was patched at 2026-03-10, 2026-03-23
138.
Authentication Bypass - Mozilla Firefox (CVE-2026-2800) - High [451]
Description: Spoofing issue in the WebAuthn component in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00059, EPSS Percentile is 0.18581 |
altlinux: CVE-2026-2800 was patched at 2026-03-16
139.
Tampering - Libsoup (CVE-2026-3633) - High [451]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:gitlab.gnome.org website | |
| 0.3 | 15 | Tampering | |
| 0.6 | 14 | libsoup is an HTTP client/server library for GNOME. It uses GObjects and the glib main loop to integrate well with GNOME applications and also has a synchronous API for use in CLI tools. | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00034, EPSS Percentile is 0.09846 |
debian: CVE-2026-3633 was patched at 2026-03-18
140.
Tampering - Libsoup (CVE-2026-3634) - High [451]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:gitlab.gnome.org website | |
| 0.3 | 15 | Tampering | |
| 0.6 | 14 | libsoup is an HTTP client/server library for GNOME. It uses GObjects and the glib main loop to integrate well with GNOME applications and also has a synchronous API for use in CLI tools. | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00026, EPSS Percentile is 0.07006 |
debian: CVE-2026-3634 was patched at 2026-03-18
141.
Security Feature Bypass - Chromium (CVE-2026-3545) - High [448]
Description: Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 1.0 | 10 | CVSS Base Score is 9.6. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00116, EPSS Percentile is 0.30458 |
debian: CVE-2026-3545 was patched at 2026-03-05, 2026-03-18
142.
Security Feature Bypass - Mozilla Firefox (CVE-2026-2761) - High [448]
Description: Sandbox escape in the Graphics: WebRender component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 10.0. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00139, EPSS Percentile is 0.33774 |
almalinux: CVE-2026-2761 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2761 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2761 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2761 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2761 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
143.
Memory Corruption - libde265 (CVE-2025-61147) - High [446]
Description: strukturag libde265 commit d9fea9d wa discovered to contain a segmentation fault via the component decoder_context::compute_framedrop_table().
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:struktur:libde265 (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 6.2. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.0292 |
debian: CVE-2025-61147 was patched at 2026-03-18
144.
Memory Corruption - libvips (CVE-2026-3146) - High [446]
Description: A vulnerability has been found in libvips up to 8.18.0. The impacted element is the function vips_foreign_load_matrix_header of the file libvips/foreign/matrixload.c. The manipulation leads to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com website | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libvips:libvips (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02592 |
debian: CVE-2026-3146 was patched at 2026-03-18
145.
Authentication Bypass - Chromium (CVE-2026-3541) - High [439]
Description: Inappropriate implementation in CSS in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00078, EPSS Percentile is 0.23175 |
debian: CVE-2026-3541 was patched at 2026-03-05, 2026-03-18
146.
Authentication Bypass - Chromium (CVE-2026-3542) - High [439]
Description: Inappropriate implementation in WebAssembly in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00072, EPSS Percentile is 0.21876 |
debian: CVE-2026-3542 was patched at 2026-03-05, 2026-03-18
147.
Authentication Bypass - Chromium (CVE-2026-3543) - High [439]
Description: Inappropriate implementation in V8 in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00078, EPSS Percentile is 0.23175 |
debian: CVE-2026-3543 was patched at 2026-03-05, 2026-03-18
148.
Incorrect Calculation - FreeRDP (CVE-2026-29776) - High [439]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 1.0 | 17 | The existence of a publicly available exploit is mentioned on BDU:PublicExploit website | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.3 | 10 | CVSS Base Score is 3.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00038, EPSS Percentile is 0.11369 |
debian: CVE-2026-29776 was patched at 2026-03-18
149.
Denial of Service - .NET Core (CVE-2026-26130) - High [436]
Description: Allocation of resources without limits or throttling in ASP.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.8 | 14 | .NET Core | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.7 | 10 | EPSS Probability is 0.00492, EPSS Percentile is 0.6552 |
almalinux: CVE-2026-26130 was patched at 2026-03-12
oraclelinux: CVE-2026-26130 was patched at 2026-03-12, 2026-03-13
redhat: CVE-2026-26130 was patched at 2026-03-12
ubuntu: CVE-2026-26130 was patched at 2026-03-11
150.
Security Feature Bypass - Chromium (CVE-2026-3916) - High [436]
Description: Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 1.0 | 10 | CVSS Base Score is 9.6. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0008, EPSS Percentile is 0.23526 |
debian: CVE-2026-3916 was patched at 2026-03-12, 2026-03-18
151.
Cross Site Scripting - Angular (CVE-2026-32635) - High [432]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.95 | 14 | Angular is a development platform for building mobile and desktop web applications using TypeScript, JavaScript, and other languages. It provides a component-based architecture, declarative templates, dependency injection, powerful tooling, and extensive ecosystem support for creating scalable, high-performance web apps. | |
| 0.9 | 10 | CVSS Base Score is 8.6. According to Vulners data source | |
| 0.2 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.15389 |
debian: CVE-2026-32635 was patched at 2026-03-18
152.
Denial of Service - Rust (CVE-2026-31812) - High [429]
Description: Quinn is a pure-
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | Rust is a modern, high-performance systems programming language focused on safety, concurrency, and memory management. | |
| 0.9 | 10 | CVSS Base Score is 8.7. According to Vulners data source | |
| 0.4 | 10 | EPSS Probability is 0.00205, EPSS Percentile is 0.42586 |
debian: CVE-2026-31812 was patched at 2026-03-18
153.
Remote Code Execution - black (CVE-2026-31900) - High [428]
Description: Black is the uncompromising Python code formatter. Black provides a GitHub action for formatting code. This action supports an option, use_pyproject: true, for reading the version of Black to use from the repository pyproject.toml. A malicious pull request could edit pyproject.toml to use a direct URL reference to a malicious repository. This could lead to arbitrary
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:python:black (does NOT exist in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.4 | 10 | EPSS Probability is 0.00184, EPSS Percentile is 0.39994 |
debian: CVE-2026-31900 was patched at 2026-03-18
154.
Remote Code Execution - gstreamer (CVE-2026-3085) - High [428]
Description: GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.5 | 10 | EPSS Probability is 0.00274, EPSS Percentile is 0.5068 |
debian: CVE-2026-3085 was patched at 2026-03-18
debian: CVE-2026-30853 was patched at 2026-03-18
155.
Remote Code Execution - Kubernetes (CVE-2026-24512) - High [426]
Description: A security issue was discovered in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.7 | 14 | Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00068, EPSS Percentile is 0.20907 |
redos: CVE-2026-24512 was patched at 2026-03-11
156.
Authentication Bypass - SPIP (CVE-2026-22205) - High [425]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.6 | 10 | EPSS Probability is 0.00356, EPSS Percentile is 0.57758 |
debian: CVE-2026-22205 was patched at 2026-03-03, 2026-03-18
157.
Security Feature Bypass - Chromium (CVE-2026-3924) - High [425]
Description: use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00118, EPSS Percentile is 0.30634 |
debian: CVE-2026-3924 was patched at 2026-03-12, 2026-03-18
158.
Remote Code Execution - 389 Directory Server (CVE-2025-14905) - High [416]
Description: A flaw was found in the
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | 389 Directory Server is a highly usable, fully featured, reliable and secure LDAP server implementation | |
| 0.7 | 10 | CVSS Base Score is 7.2. According to NVD data source | |
| 0.6 | 10 | EPSS Probability is 0.00466, EPSS Percentile is 0.64303 |
almalinux: CVE-2025-14905 was patched at 2026-02-24
altlinux: CVE-2025-14905 was patched at 2026-02-27
debian: CVE-2025-14905 was patched at 2026-03-18
oraclelinux: CVE-2025-14905 was patched at 2026-02-24, 2026-03-24
redhat: CVE-2025-14905 was patched at 2026-02-24, 2026-03-10, 2026-03-17, 2026-03-23, 2026-03-24
159.
Remote Code Execution - SPIP (CVE-2026-22206) - High [416]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.4 | 10 | EPSS Probability is 0.00189, EPSS Percentile is 0.40699 |
debian: CVE-2026-22206 was patched at 2026-03-03, 2026-03-18
160.
Remote Code Execution - Kubernetes (CVE-2025-15566) - High [414]
Description: A security issue was discovered in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.7 | 14 | Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.13641 |
redos: CVE-2025-15566 was patched at 2026-03-10
161.
Remote Code Execution - Kubernetes (CVE-2026-1580) - High [414]
Description: A security issue was discovered in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.7 | 14 | Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.13641 |
redos: CVE-2026-1580 was patched at 2026-03-10
162.
Security Feature Bypass - Keycloak (CVE-2026-1486) - High [413]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.05675 |
altlinux: CVE-2026-1486 was patched at 2026-03-10, 2026-03-23
163.
Security Feature Bypass - Mozilla Firefox (CVE-2026-2790) - High [413]
Description: Same-origin policy bypass in the Networking: JAR component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.05874 |
almalinux: CVE-2026-2790 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2790 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2790 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27903 was patched at 2026-03-18
debian: CVE-2026-27904 was patched at 2026-03-18
oraclelinux: CVE-2026-2790 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2790 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
164.
Code Injection - simpleeval (CVE-2026-32640) - High [411]
Description: SimpleEval is a library for adding evaluatable expressions into python projects. Prior to 1.0.5, objects (including modules) can leak dangerous modules through to direct access inside the sandbox. If the objects you've passed in as names to SimpleEval have modules or other disallowed / dangerous objects available as attrs. Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call. The latest version 1.0.5 has this issue fixed. This vulnerability is fixed in 1.0.5.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.97 | 15 | Code Injection | |
| 0.5 | 14 | Product detected by a:danthedeckie:simpleeval (does NOT exist in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00129, EPSS Percentile is 0.32362 |
debian: CVE-2026-32640 was patched at 2026-03-18
165.
Authentication Bypass - Chromium (CVE-2026-3932) - High [403]
Description: Insufficient policy enforcement in PDF in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06863 |
debian: CVE-2026-3932 was patched at 2026-03-12, 2026-03-18
166.
Authentication Bypass - Chromium (CVE-2026-3934) - High [403]
Description: Insufficient policy enforcement in ChromeDriver in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06863 |
debian: CVE-2026-3934 was patched at 2026-03-12, 2026-03-18
167.
Authentication Bypass - Chromium (CVE-2026-3938) - High [403]
Description: Insufficient policy enforcement in Clipboard in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.09313 |
debian: CVE-2026-3938 was patched at 2026-03-12, 2026-03-18
168.
Authentication Bypass - Chromium (CVE-2026-3939) - High [403]
Description: Insufficient policy enforcement in PDF in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted PDF file. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06863 |
debian: CVE-2026-3939 was patched at 2026-03-12, 2026-03-18
169.
Denial of Service - Python (CVE-2026-28356) - High [403]
Description: multipart is a fast multipart/form-data parser for
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | Python is a high-level, general-purpose programming language | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.7 | 10 | EPSS Probability is 0.00713, EPSS Percentile is 0.72231 |
debian: CVE-2026-28356 was patched at 2026-03-12, 2026-03-18
170.
Denial of Service - Mozilla Firefox (CVE-2026-2777) - High [401]
Description: Privilege escalation in the Messaging System component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00064, EPSS Percentile is 0.19897 |
almalinux: CVE-2026-2777 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2777 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2777 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2777 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2777 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
171.
Security Feature Bypass - OpenSSL (CVE-2026-2673) - High [401]
Description: Issue summary: An
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.13769 |
debian: CVE-2026-2673 was patched at 2026-03-18
172.
Information Disclosure - Keycloak (CVE-2026-2092) - High [400]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.83 | 15 | Information Disclosure | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.8 | 10 | CVSS Base Score is 7.7. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00079, EPSS Percentile is 0.23334 |
altlinux: CVE-2026-2092 was patched at 2026-03-10, 2026-03-23
173.
Information Disclosure - Mozilla Firefox (CVE-2026-2803) - High [400]
Description: Information disclosure, mitigation bypass in the Settings UI component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.83 | 15 | Information Disclosure | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.1789 |
altlinux: CVE-2026-2803 was patched at 2026-03-16
174.
Security Feature Bypass - Rust (CVE-2025-54368) - Medium [394]
Description: uv is a Python package and project manager written in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.9 | 14 | Rust is a modern, high-performance systems programming language focused on safety, concurrency, and memory management. | |
| 0.7 | 10 | CVSS Base Score is 6.8. According to Vulners data source | |
| 0.0 | 10 | EPSS Probability is 0.00012, EPSS Percentile is 0.01854 |
altlinux: CVE-2025-54368 was patched at 2026-03-03, 2026-03-10
175.
Elevation of Privilege - Angular (CVE-2026-27970) - Medium [393]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.85 | 15 | Elevation of Privilege | |
| 0.95 | 14 | Angular is a development platform for building mobile and desktop web applications using TypeScript, JavaScript, and other languages. It provides a component-based architecture, declarative templates, dependency injection, powerful tooling, and extensive ecosystem support for creating scalable, high-performance web apps. | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00044, EPSS Percentile is 0.13464 |
debian: CVE-2026-27970 was patched at 2026-03-18
176.
Remote Code Execution - ldap_account_manager (CVE-2026-27894) - Medium [392]
Description: LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, a local file inclusion was detected in the PDF export that allows users to include local PHP files and this way execute code. In combination with GHSA-88hf-2cjm-m9g8 this allows to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:ldap-account-manager:ldap_account_manager (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00065, EPSS Percentile is 0.20166 |
debian: CVE-2026-27894 was patched at 2026-03-18
177.
Remote Code Execution - ldap_account_manager (CVE-2026-27895) - Medium [392]
Description: LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, the PDF export component does not correctly validate uploaded file extensions. This way any file type (including .php files) can be uploaded. With GHSA-w7xq-vjr3-p9cf, an attacker can achieve
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:ldap-account-manager:ldap_account_manager (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00077, EPSS Percentile is 0.22887 |
debian: CVE-2026-27895 was patched at 2026-03-18
178.
Denial of Service - Mozilla Firefox (CVE-2026-2782) - Medium [389]
Description: Privilege escalation in the Netmonitor component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00051, EPSS Percentile is 0.15885 |
almalinux: CVE-2026-2782 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2782 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2782 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27824 was patched at 2026-03-18
oraclelinux: CVE-2026-2782 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2782 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
179.
Security Feature Bypass - Chromium (CVE-2026-3930) - Medium [389]
Description: Unsafe navigation in Navigation in Google Chrome on iOS prior to 146.0.7680.71 allowed a remote attacker to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06863 |
debian: CVE-2026-3930 was patched at 2026-03-12, 2026-03-18
180.
Remote Code Execution - GIMP (CVE-2026-2045) - Medium [380]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | GIMP is an open-source image manipulation program used for photo editing, graphic design, and digital art creation. | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.15162 |
almalinux: CVE-2026-2045 was patched at 2026-03-10, 2026-03-19
debian: CVE-2026-2045 was patched at 2026-03-03, 2026-03-18
oraclelinux: CVE-2026-2045 was patched at 2026-03-10, 2026-03-19
redhat: CVE-2026-2045 was patched at 2026-03-10, 2026-03-19, 2026-03-23
181.
Remote Code Execution - gstreamer (CVE-2026-2920) - Medium [380]
Description: GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00062, EPSS Percentile is 0.19433 |
debian: CVE-2026-2920 was patched at 2026-03-18
182.
Remote Code Execution - gstreamer (CVE-2026-2921) - Medium [380]
Description: GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00068, EPSS Percentile is 0.20983 |
debian: CVE-2026-2921 was patched at 2026-03-17, 2026-03-18
183.
Remote Code Execution - gstreamer (CVE-2026-2922) - Medium [380]
Description: GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00086, EPSS Percentile is 0.24823 |
debian: CVE-2026-2922 was patched at 2026-03-18
184.
Remote Code Execution - gstreamer (CVE-2026-2923) - Medium [380]
Description: GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00086, EPSS Percentile is 0.24823 |
debian: CVE-2026-2923 was patched at 2026-03-18
185.
Remote Code Execution - gstreamer (CVE-2026-3081) - Medium [380]
Description: GStreamer H.266 Codec Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00062, EPSS Percentile is 0.19433 |
debian: CVE-2026-3081 was patched at 2026-03-18
186.
Remote Code Execution - gstreamer (CVE-2026-3082) - Medium [380]
Description: GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00062, EPSS Percentile is 0.19433 |
debian: CVE-2026-3082 was patched at 2026-03-18
187.
Remote Code Execution - gstreamer (CVE-2026-3084) - Medium [380]
Description: GStreamer H.266 Codec Parser Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00068, EPSS Percentile is 0.20983 |
debian: CVE-2026-3084 was patched at 2026-03-18
188.
Remote Code Execution - gstreamer (CVE-2026-3086) - Medium [380]
Description: GStreamer H.266 Codec Parser Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:gstreamer:gstreamer (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00086, EPSS Percentile is 0.24823 |
debian: CVE-2026-3086 was patched at 2026-03-18
189.
Information Disclosure - ImageMagick (CVE-2026-25898) - Medium [379]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.83 | 15 | Information Disclosure | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00058, EPSS Percentile is 0.18302 |
altlinux: CVE-2026-25898 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25898 was patched at 2026-03-09, 2026-03-10, 2026-03-18
ubuntu: CVE-2026-25898 was patched at 2026-03-04
190.
Security Feature Bypass - Jetty (CVE-2025-11143) - Medium [379]
Description: The
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.6 | 14 | Jetty is a Java based web server and servlet engine | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00093, EPSS Percentile is 0.26139 |
debian: CVE-2025-11143 was patched at 2026-03-18
191.
Information Disclosure - Mozilla Firefox (CVE-2026-2783) - Medium [376]
Description: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.83 | 15 | Information Disclosure | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0004, EPSS Percentile is 0.12185 |
almalinux: CVE-2026-2783 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2783 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2783 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27830 was patched at 2026-03-18
debian: CVE-2026-27837 was patched at 2026-03-18
oraclelinux: CVE-2026-2783 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2783 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
192.
Command Injection - undici (CVE-2026-1525) - Medium [375]
Description: Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the wire. Who is impacted: * Applications using undici.request(), undici.Client, or similar low-level APIs with headers passed as flat arrays * Applications that accept user-controlled header names without case-normalization Potential consequences: * Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate Content-Length headers (400 Bad Request) * HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.97 | 15 | Command Injection | |
| 0.5 | 14 | Product detected by a:nodejs:undici (exists in CPE dict) | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00016, EPSS Percentile is 0.03729 |
debian: CVE-2026-1525 was patched at 2026-03-18
193.
Information Disclosure - SQLite (CVE-2025-70873) - Medium [372]
Description: An
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.83 | 15 | Information Disclosure | |
| 0.7 | 14 | SQLite is a database engine written in the C programming language | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00038, EPSS Percentile is 0.11528 |
debian: CVE-2025-70873 was patched at 2026-03-18
194.
Security Feature Bypass - Envoy (CVE-2026-23941) - Medium [372]
Description: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling. This vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7. The server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd,
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.7 | 14 | Envoy is a cloud-native, open-source edge and service proxy | |
| 0.7 | 10 | CVSS Base Score is 7.0. According to Vulners data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.05569 |
debian: CVE-2026-23941 was patched at 2026-03-18
195.
Authentication Bypass - ImageMagick (CVE-2026-25966) - Medium [370]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.0333 |
altlinux: CVE-2026-25966 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25966 was patched at 2026-03-09, 2026-03-18
196.
Remote Code Execution - GIMP (CVE-2026-0797) - Medium [369]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | GIMP is an open-source image manipulation program used for photo editing, graphic design, and digital art creation. | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00037, EPSS Percentile is 0.1101 |
almalinux: CVE-2026-0797 was patched at 2026-03-10, 2026-03-19
debian: CVE-2026-0797 was patched at 2026-03-03, 2026-03-18
oraclelinux: CVE-2026-0797 was patched at 2026-03-10, 2026-03-19
redhat: CVE-2026-0797 was patched at 2026-03-10, 2026-03-19, 2026-03-23
197.
Remote Code Execution - GIMP (CVE-2026-2044) - Medium [369]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | GIMP is an open-source image manipulation program used for photo editing, graphic design, and digital art creation. | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00039, EPSS Percentile is 0.11738 |
almalinux: CVE-2026-2044 was patched at 2026-03-10, 2026-03-19
debian: CVE-2026-2044 was patched at 2026-03-03, 2026-03-18
oraclelinux: CVE-2026-2044 was patched at 2026-03-10, 2026-03-19
redhat: CVE-2026-2044 was patched at 2026-03-10, 2026-03-19, 2026-03-23
198.
Remote Code Execution - GIMP (CVE-2026-2048) - Medium [369]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | GIMP is an open-source image manipulation program used for photo editing, graphic design, and digital art creation. | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00047, EPSS Percentile is 0.14602 |
almalinux: CVE-2026-2048 was patched at 2026-03-10, 2026-03-19
debian: CVE-2026-2048 was patched at 2026-03-03, 2026-03-18
oraclelinux: CVE-2026-2048 was patched at 2026-03-10, 2026-03-19
redhat: CVE-2026-2048 was patched at 2026-03-10, 2026-03-19, 2026-03-23
199.
Remote Code Execution - Unknown Product (CVE-2026-0848) - Medium [369]
Description: {'nvd_cve_data_all': 'NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply or replace the JAR file, enabling the execution of arbitrary Java bytecode at import time. This vulnerability can be exploited through methods such as model poisoning, MITM attacks, or dependency poisoning, leading to remote code execution. The issue arises from the direct execution of the JAR file via subprocess with unvalidated classpath input, allowing malicious classes to execute when loaded by the JVM.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply or replace the JAR file, enabling the execution of arbitrary Java bytecode at import time. This vulnerability can be exploited through methods such as model poisoning, MITM attacks, or dependency poisoning, leading to remote code execution. The issue arises from the direct execution of the JAR file via subprocess with unvalidated classpath input, allowing malicious classes to execute when loaded by the JVM.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0 | 14 | Unknown Product | |
| 1.0 | 10 | CVSS Base Score is 10.0. According to NVD data source | |
| 0.6 | 10 | EPSS Probability is 0.0048, EPSS Percentile is 0.64989 |
debian: CVE-2026-0848 was patched at 2026-03-18
200.
Remote Code Execution - ocaml (CVE-2026-28364) - Medium [369]
Description: In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0.5 | 14 | Product detected by a:ocaml:ocaml (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00038, EPSS Percentile is 0.11523 |
debian: CVE-2026-28364 was patched at 2026-03-18
201.
Authentication Bypass - Chromium (CVE-2026-3940) - Medium [367]
Description: Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06863 |
debian: CVE-2026-3940 was patched at 2026-03-12, 2026-03-18
202.
Denial of Service - ImageMagick (CVE-2026-25798) - Medium [367]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.4 | 10 | EPSS Probability is 0.00152, EPSS Percentile is 0.35785 |
altlinux: CVE-2026-25798 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25798 was patched at 2026-03-09, 2026-03-10, 2026-03-18
203.
Open Redirect - Django (CVE-2026-27982) - Medium [367]
Description: An open redirect vulnerability exists in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.75 | 15 | Open Redirect | |
| 0.9 | 14 | Django is a high-level Python web framework that encourages rapid development and clean, pragmatic design. It provides built-in tools for database models, authentication, URL routing, templates, and security features, making it one of the most widely used frameworks for building scalable and maintainable web applications. | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00029, EPSS Percentile is 0.08213 |
debian: CVE-2026-27982 was patched at 2026-03-18
204.
Authentication Bypass - Curl (CVE-2026-1965) - Medium [365]
Description: libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of criterion must first be met. Due to a logical error in the code, a request that was issued by an application could wrongfully reuse an existing connection to the same server that was authenticated using different credentials. One underlying reason being that Negotiate sometimes authenticates *connections* and not *requests*, contrary to how HTTP is designed to work. An application that allows Negotiate authentication to a server (that responds wanting Negotiate) with `user1:password1` and then does another operation to the same server also using Negotiate but with `user2:password2` (while the previous connection is still alive) - the second request wrongly reused the same connection and since it then sees that the Negotiate negotiation is already made, it just sends the request over that connection thinking it uses the user2 credentials when it is in fact still using the connection authenticated for user1... The set of authentication methods to use is set with `CURLOPT_HTTPAUTH`. Applications can disable libcurl's reuse of connections and thus mitigate this problem, by using one of the following libcurl options to alter how connections are or are not reused: `CURLOPT_FRESH_CONNECT`, `CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the curl_multi API).
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.5 | 14 | Product detected by a:haxx:curl (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.17044 |
altlinux: CVE-2026-1965 was patched at 2026-03-16
debian: CVE-2026-1965 was patched at 2026-03-18
ubuntu: CVE-2026-1965 was patched at 2026-03-11, 2026-03-16
205.
Denial of Service - Mozilla Firefox (CVE-2026-2780) - Medium [365]
Description: Privilege escalation in the Netmonitor component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.04012 |
almalinux: CVE-2026-2780 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2780 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2780 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27809 was patched at 2026-03-18
oraclelinux: CVE-2026-2780 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2780 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
206.
Incorrect Calculation - Mozilla Firefox (CVE-2026-2762) - Medium [365]
Description: Integer overflow in the JavaScript: Standard Library component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00065, EPSS Percentile is 0.201 |
almalinux: CVE-2026-2762 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2762 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2762 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27622 was patched at 2026-03-18
debian: CVE-2026-27624 was patched at 2026-03-18
debian: CVE-2026-27628 was patched at 2026-03-18
oraclelinux: CVE-2026-2762 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2762 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
207.
Memory Corruption - Chromium (CVE-2026-3917) - Medium [365]
Description: Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00118, EPSS Percentile is 0.30634 |
debian: CVE-2026-3917 was patched at 2026-03-12, 2026-03-18
208.
Memory Corruption - Chromium (CVE-2026-3918) - Medium [365]
Description: Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00108, EPSS Percentile is 0.29129 |
debian: CVE-2026-3918 was patched at 2026-03-12, 2026-03-18
209.
Memory Corruption - Chromium (CVE-2026-3921) - Medium [365]
Description: Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00118, EPSS Percentile is 0.30634 |
debian: CVE-2026-3921 was patched at 2026-03-12, 2026-03-18
210.
Memory Corruption - Chromium (CVE-2026-3922) - Medium [365]
Description: Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00118, EPSS Percentile is 0.30634 |
debian: CVE-2026-3922 was patched at 2026-03-12, 2026-03-18
211.
Memory Corruption - Chromium (CVE-2026-3923) - Medium [365]
Description: Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00108, EPSS Percentile is 0.29129 |
debian: CVE-2026-3923 was patched at 2026-03-12, 2026-03-18
212.
Memory Corruption - Chromium (CVE-2026-3936) - Medium [365]
Description: Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00108, EPSS Percentile is 0.29129 |
debian: CVE-2026-3936 was patched at 2026-03-12, 2026-03-18
213.
Memory Corruption - Mozilla Firefox (CVE-2026-2758) - Medium [365]
Description: Use-after-free in the JavaScript: GC component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00066, EPSS Percentile is 0.20411 |
almalinux: CVE-2026-2758 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2758 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-27585 was patched at 2026-03-04, 2026-03-05
altlinux: CVE-2026-27586 was patched at 2026-03-04, 2026-03-05
altlinux: CVE-2026-27589 was patched at 2026-03-04, 2026-03-05
debian: CVE-2026-2758 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27585 was patched at 2026-03-18
debian: CVE-2026-27586 was patched at 2026-03-18
debian: CVE-2026-27587 was patched at 2026-03-18
debian: CVE-2026-27588 was patched at 2026-03-18
debian: CVE-2026-27589 was patched at 2026-03-18
oraclelinux: CVE-2026-2758 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2758 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
214.
Memory Corruption - Mozilla Firefox (CVE-2026-2771) - Medium [365]
Description: Undefined behavior in the DOM: Core & HTML component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00066, EPSS Percentile is 0.20411 |
almalinux: CVE-2026-2771 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2771 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2771 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2771 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2771 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
215.
Memory Corruption - Mozilla Firefox (CVE-2026-2776) - Medium [365]
Description: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 10.0. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00078, EPSS Percentile is 0.23052 |
almalinux: CVE-2026-2776 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2776 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2776 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2776 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2776 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
216.
Memory Corruption - Mozilla Firefox (CVE-2026-2778) - Medium [365]
Description: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 10.0. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00078, EPSS Percentile is 0.23052 |
almalinux: CVE-2026-2778 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2778 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2778 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2778 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2778 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
217.
Memory Corruption - Mozilla Firefox (CVE-2026-2779) - Medium [365]
Description: Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00065, EPSS Percentile is 0.201 |
almalinux: CVE-2026-2779 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2779 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-27798 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-27799 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-2779 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27798 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-27799 was patched at 2026-03-09, 2026-03-10, 2026-03-18
oraclelinux: CVE-2026-2779 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2779 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
218.
Information Disclosure - Binutils (CVE-2026-3441) - Medium [364]
Description: A flaw was found in GNU
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.83 | 15 | Information Disclosure | |
| 0.8 | 14 | The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00276 |
debian: CVE-2026-3441 was patched at 2026-03-18
219.
Security Feature Bypass - apache::session::generate::md5 (CVE-2025-40931) - Medium [363]
Description: Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id. Apache::Session::Generate::MD5 generates session ids insecurely. The default session id generator returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:chorny:apache | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.13194 |
debian: CVE-2025-40931 was patched at 2026-03-18
220.
Denial of Service - Linux Kernel (CVE-2026-23235) - Medium [358]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02698 |
altlinux: CVE-2026-23235 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2026-23235 was patched at 2026-03-12, 2026-03-18
oraclelinux: CVE-2026-23235 was patched at 2026-03-20
221.
Information Disclosure - ImageMagick (CVE-2026-24481) - Medium [355]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.83 | 15 | Information Disclosure | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00047, EPSS Percentile is 0.1441 |
altlinux: CVE-2026-24481 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-24481 was patched at 2026-03-09, 2026-03-10, 2026-03-18
222.
Information Disclosure - ImageMagick (CVE-2026-25982) - Medium [355]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.83 | 15 | Information Disclosure | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.16555 |
altlinux: CVE-2026-25982 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25982 was patched at 2026-03-09, 2026-03-10, 2026-03-18
223.
Denial of Service - OpenSSH (CVE-2026-23943) - Medium [353]
Description: Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion. The SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory exhaustion
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.8 | 14 | OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture | |
| 0.7 | 10 | CVSS Base Score is 6.9. According to Vulners data source | |
| 0.1 | 10 | EPSS Probability is 0.00041, EPSS Percentile is 0.12548 |
debian: CVE-2026-23943 was patched at 2026-03-18
224.
Incorrect Calculation - Chromium (CVE-2026-3536) - Medium [353]
Description: Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0008, EPSS Percentile is 0.23747 |
debian: CVE-2026-3536 was patched at 2026-03-05, 2026-03-18
225.
Incorrect Calculation - Chromium (CVE-2026-3538) - Medium [353]
Description: Integer overflow in Skia in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0008, EPSS Percentile is 0.23747 |
debian: CVE-2026-3538 was patched at 2026-03-05, 2026-03-18
226.
Incorrect Calculation - Chromium (CVE-2026-3914) - Medium [353]
Description: Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0008, EPSS Percentile is 0.23526 |
debian: CVE-2026-3914 was patched at 2026-03-12, 2026-03-18
227.
Incorrect Calculation - Mozilla Firefox (CVE-2026-2774) - Medium [353]
Description: Integer overflow in the Audio/Video component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15478 |
almalinux: CVE-2026-2774 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2774 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2774 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2774 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2774 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
228.
Incorrect Calculation - Mozilla Firefox (CVE-2026-2781) - Medium [353]
Description: Integer overflow in the Libraries component in NSS. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15478 |
almalinux: CVE-2026-2781 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2781 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2781 was patched at 2026-02-25, 2026-02-26, 2026-02-28, 2026-03-18
debian: CVE-2026-27810 was patched at 2026-03-18
oraclelinux: CVE-2026-2781 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2781 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
ubuntu: CVE-2026-2781 was patched at 2026-03-04, 2026-03-05
229.
Memory Corruption - Chromium (CVE-2026-3537) - Medium [353]
Description: Object lifecycle issue in PowerVR in Google Chrome on Android prior to 145.0.7632.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00082, EPSS Percentile is 0.24012 |
debian: CVE-2026-3537 was patched at 2026-03-05, 2026-03-18
230.
Memory Corruption - Chromium (CVE-2026-3540) - Medium [353]
Description: Inappropriate implementation in WebAudio in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00074, EPSS Percentile is 0.22344 |
debian: CVE-2026-3540 was patched at 2026-03-05, 2026-03-18
231.
Memory Corruption - Chromium (CVE-2026-3544) - Medium [353]
Description: Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00085, EPSS Percentile is 0.2474 |
debian: CVE-2026-3544 was patched at 2026-03-05, 2026-03-18
232.
Memory Corruption - Chromium (CVE-2026-3913) - Medium [353]
Description: Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00073, EPSS Percentile is 0.22065 |
debian: CVE-2026-3913 was patched at 2026-03-12, 2026-03-18
233.
Memory Corruption - Chromium (CVE-2026-3915) - Medium [353]
Description: Heap
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00073, EPSS Percentile is 0.22065 |
debian: CVE-2026-3915 was patched at 2026-03-12, 2026-03-18
234.
Memory Corruption - Chromium (CVE-2026-3920) - Medium [353]
Description: Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0008, EPSS Percentile is 0.23526 |
debian: CVE-2026-3920 was patched at 2026-03-12, 2026-03-18
235.
Memory Corruption - Chromium (CVE-2026-3926) - Medium [353]
Description: Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00086, EPSS Percentile is 0.24947 |
debian: CVE-2026-3926 was patched at 2026-03-12, 2026-03-18
236.
Memory Corruption - Chromium (CVE-2026-3931) - Medium [353]
Description: Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00079, EPSS Percentile is 0.23392 |
debian: CVE-2026-3931 was patched at 2026-03-12, 2026-03-18
237.
Memory Corruption - Mozilla Firefox (CVE-2026-2763) - Medium [353]
Description: Use-after-free in the JavaScript Engine component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06228 |
almalinux: CVE-2026-2763 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2763 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-27631 was patched at 2026-03-09
debian: CVE-2026-2763 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27631 was patched at 2026-03-18
oraclelinux: CVE-2026-2763 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2763 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
ubuntu: CVE-2026-27631 was patched at 2026-03-18
238.
Memory Corruption - Mozilla Firefox (CVE-2026-2764) - Medium [353]
Description: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00024, EPSS Percentile is 0.06436 |
almalinux: CVE-2026-2764 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2764 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2764 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2764 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2764 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
239.
Memory Corruption - Mozilla Firefox (CVE-2026-2765) - Medium [353]
Description: Use-after-free in the JavaScript Engine component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06114 |
almalinux: CVE-2026-2765 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2765 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2765 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2765 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2765 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
240.
Memory Corruption - Mozilla Firefox (CVE-2026-2766) - Medium [353]
Description: Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06114 |
almalinux: CVE-2026-2766 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2766 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2766 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2766 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2766 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
241.
Memory Corruption - Mozilla Firefox (CVE-2026-2767) - Medium [353]
Description: Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.15164 |
almalinux: CVE-2026-2767 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2767 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2767 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2767 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2767 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
242.
Memory Corruption - Mozilla Firefox (CVE-2026-2769) - Medium [353]
Description: Use-after-free in the Storage: IndexedDB component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15654 |
almalinux: CVE-2026-2769 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2769 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2769 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27699 was patched at 2026-03-18
oraclelinux: CVE-2026-2769 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2769 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
243.
Memory Corruption - Mozilla Firefox (CVE-2026-2770) - Medium [353]
Description: Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15478 |
almalinux: CVE-2026-2770 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2770 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2770 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2770 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2770 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
244.
Memory Corruption - Mozilla Firefox (CVE-2026-2772) - Medium [353]
Description: Use-after-free in the Audio/Video: Playback component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15478 |
almalinux: CVE-2026-2772 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2772 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2772 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2772 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2772 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
245.
Memory Corruption - Mozilla Firefox (CVE-2026-2773) - Medium [353]
Description: Incorrect boundary conditions in the Web Audio component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00028, EPSS Percentile is 0.0784 |
almalinux: CVE-2026-2773 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2773 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2773 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2773 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2773 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
246.
Memory Corruption - Mozilla Firefox (CVE-2026-2785) - Medium [353]
Description: Invalid pointer in the JavaScript Engine component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.15164 |
almalinux: CVE-2026-2785 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2785 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2785 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2785 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2785 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
247.
Memory Corruption - Mozilla Firefox (CVE-2026-2786) - Medium [353]
Description: Use-after-free in the JavaScript Engine component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00049, EPSS Percentile is 0.15164 |
almalinux: CVE-2026-2786 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2786 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2786 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2786 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2786 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
248.
Memory Corruption - Mozilla Firefox (CVE-2026-2787) - Medium [353]
Description: Use-after-free in the DOM: Window and Location component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15478 |
almalinux: CVE-2026-2787 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2787 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2787 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2787 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2787 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
249.
Memory Corruption - Mozilla Firefox (CVE-2026-2788) - Medium [353]
Description: Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06228 |
almalinux: CVE-2026-2788 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2788 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2788 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27888 was patched at 2026-03-18
oraclelinux: CVE-2026-2788 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2788 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
250.
Memory Corruption - Mozilla Firefox (CVE-2026-2789) - Medium [353]
Description: Use-after-free in the Graphics: ImageLib component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15478 |
almalinux: CVE-2026-2789 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2789 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2789 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27894 was patched at 2026-03-18
debian: CVE-2026-27895 was patched at 2026-03-18
oraclelinux: CVE-2026-2789 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2789 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
251.
Memory Corruption - Mozilla Firefox (CVE-2026-2805) - Medium [353]
Description: Invalid pointer in the DOM: Core & HTML component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.05794 |
altlinux: CVE-2026-2805 was patched at 2026-03-16
252.
Memory Corruption - OpenSSL (CVE-2026-27459) - Medium [353]
Description: py
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0002, EPSS Percentile is 0.05275 |
debian: CVE-2026-27459 was patched at 2026-03-18
253.
Security Feature Bypass - Chromium (CVE-2026-3941) - Medium [353]
Description: Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00034, EPSS Percentile is 0.09797 |
debian: CVE-2026-3941 was patched at 2026-03-12, 2026-03-18
254.
Command Injection - vim (CVE-2026-28417) - Medium [351]
Description: Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.97 | 15 | Command Injection | |
| 0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.01924 |
debian: CVE-2026-28417 was patched at 2026-03-18
ubuntu: CVE-2026-28417 was patched at 2026-03-16
255.
Denial of Service - undici (CVE-2026-2229) - Medium [351]
Description: ImpactThe undici WebSocket client is vulnerable to a
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:nodejs:undici (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.4 | 10 | EPSS Probability is 0.00186, EPSS Percentile is 0.40394 |
debian: CVE-2026-2229 was patched at 2026-03-18
256.
Security Feature Bypass - apache::sessionx (CVE-2025-40932) - Medium [351]
Description: Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:grichter:apache | |
| 0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00038, EPSS Percentile is 0.11303 |
debian: CVE-2025-40932 was patched at 2026-03-18
257.
Security Feature Bypass - onnx (CVE-2026-28500) - Medium [351]
Description: Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. This vulnerability transforms a standard model-loading function into a vector for Zero-Interaction Supply-Chain Attacks. When chained with file-system vulnerabilities, an attacker can silently exfiltrate sensitive files (SSH keys, cloud credentials) from the victim's machine the moment the model is loaded. As of time of publication, no known patched versions are available.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:linuxfoundation:onnx (exists in CPE dict) | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.0001, EPSS Percentile is 0.01094 |
debian: CVE-2026-28500 was patched at 2026-03-18
258.
Denial of Service - Linux Kernel (CVE-2026-23067) - Medium [346]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23067 was patched at 2026-02-26
259.
Denial of Service - Linux Kernel (CVE-2026-23082) - Medium [346]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03121 |
altlinux: CVE-2026-23082 was patched at 2026-02-26
oraclelinux: CVE-2026-23082 was patched at 2026-03-20
260.
Denial of Service - Linux Kernel (CVE-2026-23109) - Medium [346]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23109 was patched at 2026-02-26
261.
Denial of Service - Linux Kernel (CVE-2026-23238) - Medium [346]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 7e-05, EPSS Percentile is 0.00483 |
altlinux: CVE-2026-23238 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2026-23238 was patched at 2026-03-12, 2026-03-18
262.
Remote Code Execution - Unknown Product (CVE-2026-0847) - Medium [345]
Description: {'nvd_cve_data_all': 'A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file read via path traversal in multiple CorpusReader classes, including WordListCorpusReader, TaggedCorpusReader, and BracketParseCorpusReader. These classes fail to properly sanitize or validate file paths, enabling attackers to traverse directories and access sensitive files on the server. This issue is particularly critical in scenarios where user-controlled file inputs are processed, such as in machine learning APIs, chatbots, or NLP pipelines. Exploitation of this vulnerability can lead to unauthorized access to sensitive files, including system files, SSH private keys, and API tokens, and may potentially escalate to remote code execution when combined with other vulnerabilities.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file read via path traversal in multiple CorpusReader classes, including WordListCorpusReader, TaggedCorpusReader, and BracketParseCorpusReader. These classes fail to properly sanitize or validate file paths, enabling attackers to traverse directories and access sensitive files on the server. This issue is particularly critical in scenarios where user-controlled file inputs are processed, such as in machine learning APIs, chatbots, or NLP pipelines. Exploitation of this vulnerability can lead to unauthorized access to sensitive files, including system files, SSH private keys, and API tokens, and may potentially escalate to remote code execution when combined with other vulnerabilities.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0 | 14 | Unknown Product | |
| 0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
| 0.5 | 10 | EPSS Probability is 0.00287, EPSS Percentile is 0.52084 |
debian: CVE-2026-0847 was patched at 2026-03-18
263.
Code Injection - ImageMagick (CVE-2026-25797) - Medium [344]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.97 | 15 | Code Injection | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06778 |
altlinux: CVE-2026-25797 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25797 was patched at 2026-03-09, 2026-03-10, 2026-03-18
264.
Denial of Service - ImageMagick (CVE-2026-24485) - Medium [344]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.17805 |
altlinux: CVE-2026-24485 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-24485 was patched at 2026-03-09, 2026-03-10, 2026-03-18
265.
Denial of Service - ImageMagick (CVE-2026-25796) - Medium [344]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0006, EPSS Percentile is 0.18833 |
altlinux: CVE-2026-25796 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25796 was patched at 2026-03-09, 2026-03-10, 2026-03-18
266.
Denial of Service - ImageMagick (CVE-2026-25799) - Medium [344]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0006, EPSS Percentile is 0.18906 |
altlinux: CVE-2026-25799 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25799 was patched at 2026-03-09, 2026-03-10, 2026-03-18
267.
Denial of Service - ImageMagick (CVE-2026-25967) - Medium [344]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.17899 |
altlinux: CVE-2026-25967 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25967 was patched at 2026-03-09, 2026-03-18
268.
Denial of Service - ImageMagick (CVE-2026-25970) - Medium [344]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.17832 |
altlinux: CVE-2026-25970 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25970 was patched at 2026-03-09, 2026-03-10, 2026-03-18
269.
Denial of Service - Jetty (CVE-2026-1605) - Medium [344]
Description: In Eclipse
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | Jetty is a Java based web server and servlet engine | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.17343 |
debian: CVE-2026-1605 was patched at 2026-03-18
270.
Denial of Service - Libsoup (CVE-2026-2436) - Medium [344]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | libsoup is an HTTP client/server library for GNOME. It uses GObjects and the glib main loop to integrate well with GNOME applications and also has a synchronous API for use in CLI tools. | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00098, EPSS Percentile is 0.27044 |
debian: CVE-2026-2436 was patched at 2026-03-18
271.
Denial of Service - MongoDB (CVE-2026-1850) - Medium [344]
Description: Complex queries can cause excessive memory usage in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | MongoDB is a source-available, cross-platform, document-oriented database program | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.16881 |
redos: CVE-2026-1850 was patched at 2026-03-11
272.
Elevation of Privilege - Keycloak (CVE-2025-14778) - Medium [344]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.85 | 15 | Elevation of Privilege | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.5 | 10 | CVSS Base Score is 5.4. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.0001, EPSS Percentile is 0.01158 |
altlinux: CVE-2025-14778 was patched at 2026-03-10, 2026-03-23
273.
Memory Corruption - Exim (CVE-2025-67896) - Medium [344]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | Exim is a mail transfer agent (MTA) used on Unix-like operating systems | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00087, EPSS Percentile is 0.25023 |
redos: CVE-2025-67896 was patched at 2026-03-10
274.
Elevation of Privilege - postgresql (CVE-2026-2007) - Medium [342]
Description: Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.85 | 15 | Elevation of Privilege | |
| 0.5 | 14 | Product detected by a:postgresql:postgresql (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0002, EPSS Percentile is 0.05223 |
altlinux: CVE-2026-2007 was patched at 2026-03-03
275.
Incorrect Calculation - Chromium (CVE-2026-2649) - Medium [341]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00033, EPSS Percentile is 0.09449 |
debian: CVE-2026-2649 was patched at 2026-02-20, 2026-03-18
276.
Memory Corruption - Chromium (CVE-2026-2648) - Medium [341]
Description: Heap
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00035, EPSS Percentile is 0.10168 |
debian: CVE-2026-2648 was patched at 2026-02-20, 2026-03-18
277.
Memory Corruption - Chromium (CVE-2026-2650) - Medium [341]
Description: Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00028, EPSS Percentile is 0.07747 |
debian: CVE-2026-2650 was patched at 2026-02-20, 2026-03-18
278.
Memory Corruption - Chromium (CVE-2026-3061) - Medium [341]
Description: Out of bounds read in Media in Google Chrome prior to 145.0.7632.116 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0003, EPSS Percentile is 0.08661 |
debian: CVE-2026-3061 was patched at 2026-02-26, 2026-03-18
279.
Memory Corruption - Chromium (CVE-2026-3062) - Medium [341]
Description: Out of bounds read and write in Tint in Google Chrome on Mac prior to 145.0.7632.116 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0003, EPSS Percentile is 0.08661 |
debian: CVE-2026-3062 was patched at 2026-02-26, 2026-03-18
280.
Memory Corruption - Chromium (CVE-2026-3919) - Medium [341]
Description: Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.09055 |
debian: CVE-2026-3919 was patched at 2026-03-12, 2026-03-18
281.
Memory Corruption - Mozilla Firefox (CVE-2026-2795) - Medium [341]
Description: Use-after-free in the JavaScript: GC component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.14234 |
altlinux: CVE-2026-2795 was patched at 2026-03-16
altlinux: CVE-2026-27950 was patched at 2026-02-27
altlinux: CVE-2026-27951 was patched at 2026-02-27
debian: CVE-2026-27950 was patched at 2026-03-18
debian: CVE-2026-27951 was patched at 2026-03-18
ubuntu: CVE-2026-27950 was patched at 2026-03-18
ubuntu: CVE-2026-27951 was patched at 2026-03-18
282.
Memory Corruption - Mozilla Firefox (CVE-2026-2797) - Medium [341]
Description: Use-after-free in the JavaScript: GC component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.14234 |
altlinux: CVE-2026-2797 was patched at 2026-03-16
debian: CVE-2026-27970 was patched at 2026-03-18
283.
Memory Corruption - Mozilla Firefox (CVE-2026-2798) - Medium [341]
Description: Use-after-free in the DOM: Core & HTML component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.14234 |
altlinux: CVE-2026-2798 was patched at 2026-03-16
debian: CVE-2026-27982 was patched at 2026-03-18
284.
Memory Corruption - Mozilla Firefox (CVE-2026-2799) - Medium [341]
Description: Use-after-free in the DOM: Core & HTML component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00046, EPSS Percentile is 0.14234 |
altlinux: CVE-2026-2799 was patched at 2026-03-16
285.
Security Feature Bypass - Chromium (CVE-2026-3928) - Medium [341]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.0286 |
debian: CVE-2026-3928 was patched at 2026-03-12, 2026-03-18
286.
Security Feature Bypass - Chromium (CVE-2026-3929) - Medium [341]
Description: Side-channel information leakage in ResourceTiming in Google Chrome prior to 146.0.7680.71 allowed a remote attacker
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.3 | 10 | CVSS Base Score is 3.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.0905 |
debian: CVE-2026-3929 was patched at 2026-03-12, 2026-03-18
287.
Denial of Service - CoreDNS (CVE-2025-68151) - Medium [339]
Description: CoreDNS is a DNS server that chains plugins. Prior to version 1.14.0, multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limits, or message size constraints. Version 1.14.0 contains a patch.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:coredns.io:coredns (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.0014, EPSS Percentile is 0.33921 |
redos: CVE-2025-68151 was patched at 2026-03-10
288.
Security Feature Bypass - vim (CVE-2026-28421) - Medium [339]
Description: Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.0001, EPSS Percentile is 0.01058 |
debian: CVE-2026-28421 was patched at 2026-03-18
ubuntu: CVE-2026-28421 was patched at 2026-03-16
289.
Memory Corruption - Linux Kernel (CVE-2025-71238) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 8e-05, EPSS Percentile is 0.00715 |
altlinux: CVE-2025-71238 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2025-71238 was patched at 2026-03-12, 2026-03-18
oraclelinux: CVE-2025-71238 was patched at 2026-03-20
290.
Memory Corruption - Linux Kernel (CVE-2026-23077) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03918 |
altlinux: CVE-2026-23077 was patched at 2026-02-26
291.
Memory Corruption - Linux Kernel (CVE-2026-23092) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03918 |
altlinux: CVE-2026-23092 was patched at 2026-02-26
292.
Memory Corruption - Linux Kernel (CVE-2026-23162) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03918 |
altlinux: CVE-2026-23162 was patched at 2026-02-26
293.
Memory Corruption - Linux Kernel (CVE-2026-23184) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03918 |
altlinux: CVE-2026-23184 was patched at 2026-02-26
294.
Memory Corruption - Linux Kernel (CVE-2026-23185) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03918 |
altlinux: CVE-2026-23185 was patched at 2026-02-26
295.
Memory Corruption - Linux Kernel (CVE-2026-23192) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03918 |
altlinux: CVE-2026-23192 was patched at 2026-02-26
296.
Memory Corruption - Linux Kernel (CVE-2026-23194) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03918 |
altlinux: CVE-2026-23194 was patched at 2026-02-26
297.
Memory Corruption - Linux Kernel (CVE-2026-23195) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03918 |
altlinux: CVE-2026-23195 was patched at 2026-02-26
298.
Memory Corruption - Linux Kernel (CVE-2026-23221) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02289 |
altlinux: CVE-2026-23221 was patched at 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2026-23221 was patched at 2026-03-12, 2026-03-18
oraclelinux: CVE-2026-23221 was patched at 2026-03-20
299.
Memory Corruption - Linux Kernel (CVE-2026-23226) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00896 |
altlinux: CVE-2026-23226 was patched at 2026-02-26
debian: CVE-2026-23226 was patched at 2026-03-18
300.
Memory Corruption - Linux Kernel (CVE-2026-23227) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00901 |
altlinux: CVE-2026-23227 was patched at 2026-02-26
debian: CVE-2026-23227 was patched at 2026-03-18
301.
Memory Corruption - Linux Kernel (CVE-2026-23231) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.02272 |
altlinux: CVE-2026-23231 was patched at 2026-03-02, 2026-03-14
debian: CVE-2026-23231 was patched at 2026-03-18
302.
Memory Corruption - Linux Kernel (CVE-2026-23233) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.0224 |
altlinux: CVE-2026-23233 was patched at 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-18
debian: CVE-2026-23233 was patched at 2026-03-12, 2026-03-18
oraclelinux: CVE-2026-23233 was patched at 2026-03-20
303.
Memory Corruption - Linux Kernel (CVE-2026-23234) - Medium [334]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02698 |
altlinux: CVE-2026-23234 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2026-23234 was patched at 2026-03-12, 2026-03-18
oraclelinux: CVE-2026-23234 was patched at 2026-03-20
304.
Denial of Service - ImageMagick (CVE-2026-25989) - Medium [332]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.05063 |
altlinux: CVE-2026-25989 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25989 was patched at 2026-03-09, 2026-03-10, 2026-03-18
305.
Denial of Service - TuneD (CVE-2026-27204) - Medium [332]
Description: Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of WASI host interfaces are susceptible to guest-controlled resource exhaustion on the host. Wasmtime did not appropriately place limits on resource allocations requested by the guests. This serves as a Denial of Service vector. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 have all been released with the fix for this issue. These versions do not prevent this issue in their default configuration to avoid breaking preexisting behaviors. All versions of Wasmtime have appropriate knobs to prevent this behavior, and Wasmtime 42.0.0-and-later will have these knobs
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | Tuned is a daemon that uses udev to monitor connected devices and statically and dynamically tunes system settings according to a selected profile | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0008, EPSS Percentile is 0.23733 |
debian: CVE-2026-27204 was patched at 2026-03-18
306.
Denial of Service - Wireshark (CVE-2026-3202) - Medium [332]
Description: NTS-KE protocol dissector crash in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06673 |
altlinux: CVE-2026-3202 was patched at 2026-02-27
307.
Incorrect Calculation - ImageMagick (CVE-2026-25897) - Medium [332]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00062, EPSS Percentile is 0.19244 |
altlinux: CVE-2026-25897 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25897 was patched at 2026-03-09, 2026-03-10, 2026-03-18
ubuntu: CVE-2026-25897 was patched at 2026-03-04
308.
Memory Corruption - ImageMagick (CVE-2026-25968) - Medium [332]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.19145 |
altlinux: CVE-2026-25968 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25968 was patched at 2026-03-09, 2026-03-10, 2026-03-18
ubuntu: CVE-2026-25968 was patched at 2026-03-04
309.
Memory Corruption - ImageMagick (CVE-2026-25986) - Medium [332]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.19145 |
altlinux: CVE-2026-25986 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25986 was patched at 2026-03-09, 2026-03-10, 2026-03-18
ubuntu: CVE-2026-25986 was patched at 2026-03-04
310.
Path Traversal - ImageMagick (CVE-2026-25965) - Medium [332]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Path Traversal | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00047, EPSS Percentile is 0.14595 |
altlinux: CVE-2026-25965 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25965 was patched at 2026-03-09, 2026-03-10, 2026-03-18
redhat: CVE-2026-25965 was patched at 2026-03-24
311.
Denial of Service - Keycloak (CVE-2026-2575) - Medium [329]
Description: A flaw was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0003, EPSS Percentile is 0.08505 |
altlinux: CVE-2026-2575 was patched at 2026-03-10, 2026-03-23
312.
Memory Corruption - Chromium (CVE-2026-3539) - Medium [329]
Description: Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 8e-05, EPSS Percentile is 0.00715 |
debian: CVE-2026-3539 was patched at 2026-03-05, 2026-03-18
313.
Code Injection - Unknown Product (CVE-2026-27830) - Medium [327]
Description: {'nvd_cve_data_all': 'c3p0, a JDBC Connection pooling library, is vulnerable to attack via maliciously crafted Java-serialized objects and `javax.naming.Reference` instances. Several c3p0 `ConnectionPoolDataSource` implementations have a property called `userOverridesAsString` which conceptually represents a `Map<String,Map<String,String>>`. Prior to v0.12.0, that property was maintained as a hex-encoded serialized object. Any attacker able to reset this property, on an existing `ConnectionPoolDataSource` or via maliciously crafted serialized objects or `javax.naming.Reference` instances could be tailored execute unexpected code on the application's `CLASSPATH`. The danger of this vulnerability was strongly magnified by vulnerabilities in c3p0's main dependency, mchange-commons-java. This library includes code that mirrors early implementations of JNDI functionality, including ungated support for remote `factoryClassLocation` values. Attackers could set c3p0's `userOverridesAsString` hex-encoded serialized objects that include objects "indirectly serialized" via JNDI references. Deserialization of those objects and dereferencing of the embedded `javax.naming.Reference` objects could provoke download and execution of malicious code from a remote `factoryClassLocation`. Although hazard presented by c3p0's vulnerabilites are exarcerbated by vulnerabilities in mchange-commons-java, use of Java-serialized-object hex as the format for a writable Java-Bean property, of objects that may be exposed across JNDI interfaces, represents a serious independent fragility. The `userOverridesAsString` property of c3p0 `ConnectionPoolDataSource` classes has been reimplemented to use a safe CSV-based format, rather than rely upon potentially dangerous Java object deserialization. c3p0-0.12.0+ and above depend upon mchange-commons-java 0.4.0+, which gates support for remote `factoryClassLocation` values by configuration parameters that default to restrictive values. c3p0 additionally enforces the new mchange-commons-java `com.mchange.v2.naming.nameGuardClassName` to prevent injection of unexpected, potentially remote JNDI names. There is no supported workaround for versions of c3p0 prior to 0.12.0.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'c3p0, a JDBC Connection pooling library, is vulnerable to attack via maliciously crafted Java-serialized objects and `javax.naming.Reference` instances. Several c3p0 `ConnectionPoolDataSource` implementations have a property called `userOverridesAsString` which conceptually represents a `Map<String,Map<String,String>>`. Prior to v0.12.0, that property was maintained as a hex-encoded serialized object. Any attacker able to reset this property, on an existing `ConnectionPoolDataSource` or via maliciously crafted serialized objects or `javax.naming.Reference` instances could be tailored execute unexpected code on the application's `CLASSPATH`. The danger of this vulnerability was strongly magnified by vulnerabilities in c3p0's main dependency, mchange-commons-java. This library includes code that mirrors early implementations of JNDI functionality, including ungated support for remote `factoryClassLocation` values. Attackers could set c3p0's `userOverridesAsString` hex-encoded serialized objects that include objects "indirectly serialized" via JNDI references. Deserialization of those objects and dereferencing of the embedded `javax.naming.Reference` objects could provoke download and execution of malicious code from a remote `factoryClassLocation`. Although hazard presented by c3p0's vulnerabilites are exarcerbated by vulnerabilities in mchange-commons-java, use of Java-serialized-object hex as the format for a writable Java-Bean property, of objects that may be exposed across JNDI interfaces, represents a serious independent fragility. The `userOverridesAsString` property of c3p0 `ConnectionPoolDataSource` classes has been reimplemented to use a safe CSV-based format, rather than rely upon potentially dangerous Java object deserialization. c3p0-0.12.0+ and above depend upon mchange-commons-java 0.4.0+, which gates support for remote `factoryClassLocation` values by configuration parameters that default to restrictive values. c3p0 additionally enforces the new mchange-commons-java `com.mchange.v2.naming.nameGuardClassName` to prevent injection of unexpected, potentially remote JNDI names. There is no supported workaround for versions of c3p0 prior to 0.12.0.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.97 | 15 | Code Injection | |
| 0 | 14 | Unknown Product | |
| 0.9 | 10 | CVSS Base Score is 8.9. According to Vulners data source | |
| 0.4 | 10 | EPSS Probability is 0.00173, EPSS Percentile is 0.38548 |
debian: CVE-2026-27830 was patched at 2026-03-18
314.
Denial of Service - Pypdf (CVE-2026-27628) - Medium [327]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | PyPDF is a Python library for reading, manipulating, and writing PDF files, including extraction, splitting, merging, and encryption features. | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.16624 |
debian: CVE-2026-27628 was patched at 2026-03-18
315.
Denial of Service - QuickJS (CVE-2025-69654) - Medium [327]
Description: A crafted JavaScript input executed with the
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | QuickJS is a lightweight JavaScript engine that supports modern ECMAScript features and can be embedded into applications for scripting purposes. | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.16319 |
debian: CVE-2025-69654 was patched at 2026-03-18
316.
Denial of Service - exiv2 (CVE-2026-27596) - Medium [327]
Description: Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. The out-of-bounds read is at a 4GB offset, which usually causes Exiv2
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:exiv2:exiv2 (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.1681 |
altlinux: CVE-2026-27596 was patched at 2026-03-09
debian: CVE-2026-27596 was patched at 2026-03-18
ubuntu: CVE-2026-27596 was patched at 2026-03-18
317.
Security Feature Bypass - ZooKeeper (CVE-2026-24281) - Medium [327]
Description: Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:apache:zookeeper (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00026, EPSS Percentile is 0.07005 |
debian: CVE-2026-24281 was patched at 2026-03-18
318.
Security Feature Bypass - openshift_container_platform (CVE-2025-12801) - Medium [327]
Description: A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:redhat:openshift_container_platform (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.01959 |
almalinux: CVE-2025-12801 was patched at 2026-03-05
debian: CVE-2025-12801 was patched at 2026-03-18
oraclelinux: CVE-2025-12801 was patched at 2026-03-05, 2026-03-06
redhat: CVE-2025-12801 was patched at 2026-03-05, 2026-03-06
319.
Security Feature Bypass - utls (CVE-2026-26994) - Medium [327]
Description: uTLS is a fork of crypto/tls, created to customize ClientHello for fingerprinting resistance while still using it for the handshake. In versions 1.6.7 and below, uTLS did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a uTLS ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a uTLS client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because uTLS did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint uTLS connections. This issue has been fixed in version 1.7.0.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:refraction-networking:utls (does NOT exist in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03203 |
debian: CVE-2026-26994 was patched at 2026-03-18
320.
Memory Corruption - .NET (CVE-2026-26127) - Medium [324]
Description: Out-of-bounds read in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.7 | 14 | .NET | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00083, EPSS Percentile is 0.24193 |
almalinux: CVE-2026-26127 was patched at 2026-03-12
oraclelinux: CVE-2026-26127 was patched at 2026-03-12, 2026-03-13
redhat: CVE-2026-26127 was patched at 2026-03-12
ubuntu: CVE-2026-26127 was patched at 2026-03-11
321.
Memory Corruption - Linux Kernel (CVE-2025-71128) - Medium [322]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.05033 |
ubuntu: CVE-2025-71128 was patched at 2026-03-16, 2026-03-17
322.
Cross Site Scripting - SPIP (CVE-2026-26223) - Medium [321]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.1618 |
debian: CVE-2026-26223 was patched at 2026-03-03, 2026-03-18
323.
Cross Site Scripting - SPIP (CVE-2026-27473) - Medium [321]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.6 | 10 | CVSS Base Score is 6.4. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.1782 |
debian: CVE-2026-27473 was patched at 2026-03-03, 2026-03-18
324.
Cross Site Scripting - SPIP (CVE-2026-27474) - Medium [321]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.1618 |
debian: CVE-2026-27474 was patched at 2026-03-03, 2026-03-18
325.
Denial of Service - ImageMagick (CVE-2026-25985) - Medium [320]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.04709 |
altlinux: CVE-2026-25985 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25985 was patched at 2026-03-09, 2026-03-18
redhat: CVE-2026-25985 was patched at 2026-03-24
326.
Denial of Service - ImageMagick (CVE-2026-26066) - Medium [320]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.04572 |
altlinux: CVE-2026-26066 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-26066 was patched at 2026-03-09, 2026-03-10, 2026-03-18
327.
Denial of Service - ImageMagick (CVE-2026-26283) - Medium [320]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.04957 |
altlinux: CVE-2026-26283 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-26283 was patched at 2026-03-09, 2026-03-10, 2026-03-18
328.
Memory Corruption - FreeRDP (CVE-2026-27950) - Medium [320]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.0011, EPSS Percentile is 0.29407 |
altlinux: CVE-2026-27950 was patched at 2026-02-27
debian: CVE-2026-27950 was patched at 2026-03-18
ubuntu: CVE-2026-27950 was patched at 2026-03-18
329.
Memory Corruption - ImageMagick (CVE-2026-25971) - Medium [320]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.13129 |
altlinux: CVE-2026-25971 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25971 was patched at 2026-03-09, 2026-03-18
330.
Memory Corruption - ImageMagick (CVE-2026-25983) - Medium [320]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00029, EPSS Percentile is 0.08123 |
altlinux: CVE-2026-25983 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25983 was patched at 2026-03-09, 2026-03-10, 2026-03-18
ubuntu: CVE-2026-25983 was patched at 2026-03-04
331.
Denial of Service - Filebeat (CVE-2025-68383) - Medium [315]
Description: Improper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:elastic:filebeat (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.19035 |
redos: CVE-2025-68383 was patched at 2026-03-10
332.
Denial of Service - Rebar3 (CVE-2026-21619) - Medium [315]
Description: Uncontrolled Resource Consumption, Deserialization of Untrusted Data vulnerability in hexpm hex_core (hex_api modules), hexpm hex (mix_hex_api modules), erlang rebar3 (r3_hex_api modules) allows Object Injection, Excessive Allocation. This vulnerability is associated with program files src/hex_api.erl, src/mix_hex_api.erl, apps/rebar/src/vendored/r3_hex_api.erl and program routines hex_core:request/4, mix_hex_api:request/4, r3_hex_api:request/4. This issue affects hex_core: from 0.1.0 before 0.12.1; hex: from 2.3.0 before 2.3.2; rebar3: from 3.9.1 before 3.27.0.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:erlang:rebar3 (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00036, EPSS Percentile is 0.10726 |
debian: CVE-2026-21619 was patched at 2026-03-18
333.
Denial of Service - tornado (CVE-2026-31958) - Medium [315]
Description: Tornado is a Python web framework and asynchronous networking library. In versions of Tornado prior to 6.5.5, the only limit on the number of parts in multipart/form-data is the max_body_size setting (default 100MB). Since parsing occurs synchronously on the main thread, this creates the possibility of denial-of-service due to the cost of parsing very large multipart bodies with many parts. This vulnerability is fixed in 6.5.5.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:tornadoweb:tornado (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06153 |
altlinux: CVE-2026-31958 was patched at 2026-03-18
debian: CVE-2026-31958 was patched at 2026-03-18
334.
Path Traversal - black (CVE-2026-32274) - Medium [315]
Description: Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes a cache file, the name of which is computed from various formatting options. The value of the --python-cell-magics option was placed in the filename without sanitization, which allowed an attacker who controls the value of this argument to write cache files to arbitrary file system locations. Fixed in Black 26.3.1.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Path Traversal | |
| 0.5 | 14 | Product detected by a:python:black (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.0506 |
debian: CVE-2026-32274 was patched at 2026-03-18
335.
Security Feature Bypass - SPIP (CVE-2025-71240) - Medium [315]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.5 | 10 | CVSS Base Score is 5.4. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00033, EPSS Percentile is 0.09733 |
debian: CVE-2025-71240 was patched at 2026-03-18
336.
Memory Corruption - Linux Kernel (CVE-2026-23117) - Medium [310]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23117 was patched at 2026-02-26
337.
Memory Corruption - Linux Kernel (CVE-2026-23127) - Medium [310]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23127 was patched at 2026-02-26
338.
Memory Corruption - Linux Kernel (CVE-2026-23130) - Medium [310]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03027 |
altlinux: CVE-2026-23130 was patched at 2026-02-26
339.
Memory Corruption - Linux Kernel (CVE-2026-23155) - Medium [310]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03121 |
altlinux: CVE-2026-23155 was patched at 2026-02-20, 2026-03-06, 2026-03-09
oraclelinux: CVE-2026-23155 was patched at 2026-03-20
340.
Memory Corruption - Linux Kernel (CVE-2026-23196) - Medium [310]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23196 was patched at 2026-02-26
341.
Memory Corruption - Linux Kernel (CVE-2026-23197) - Medium [310]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23197 was patched at 2026-02-26
342.
Memory Corruption - Linux Kernel (CVE-2026-23218) - Medium [310]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23218 was patched at 2026-02-26
343.
Memory Corruption - Linux Kernel (CVE-2026-23237) - Medium [310]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 7e-05, EPSS Percentile is 0.00483 |
altlinux: CVE-2026-23237 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2026-23237 was patched at 2026-03-12, 2026-03-18
oraclelinux: CVE-2026-23237 was patched at 2026-03-20
344.
Server-Side Request Forgery - SPIP (CVE-2026-27472) - Medium [310]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.87 | 15 | Server-Side Request Forgery | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15735 |
debian: CVE-2026-27472 was patched at 2026-03-03, 2026-03-18
345.
Cross Site Scripting - Alinto SOGo (CVE-2025-71276) - Medium [309]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | SOGo is an open source groupware and webmail server developed by Alinto, providing email, calendar, and contact management through a web-based interface and standard protocols. | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00029, EPSS Percentile is 0.08373 |
altlinux: CVE-2025-71276 was patched at 2026-03-05, 2026-03-10
debian: CVE-2025-71276 was patched at 2026-03-25
346.
Cross Site Scripting - CommonMark (CVE-2026-30838) - Medium [309]
Description: league/commonmark is a PHP Markdown parser. Prior to version 2.8.1, the DisallowedRawHtml extension can be bypassed by inserting a newline, tab, or other ASCII whitespace character between a disallowed HTML tag name and the closing >. For example, <script\n> would pass through unfiltered and be rendered as a valid HTML tag by browsers. This is a cross-site scripting (XSS) vector for any application that relies on this extension to sanitize untrusted user input. All applications using the DisallowedRawHtml extension to process untrusted markdown are affected. Applications that use a dedicated HTML sanitizer (such as HTML Purifier) on the rendered output are not affected. This issue has been patched in version 2.8.1.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | Product detected by a:thephpleague:commonmark (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00035, EPSS Percentile is 0.10411 |
debian: CVE-2026-30838 was patched at 2026-03-18
347.
Cross Site Scripting - DOMPurify (CVE-2025-15599) - Medium [309]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.08981 |
debian: CVE-2025-15599 was patched at 2026-03-18
348.
Cross Site Scripting - SPIP (CVE-2025-71241) - Medium [309]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00035, EPSS Percentile is 0.10148 |
debian: CVE-2025-71241 was patched at 2026-03-18
349.
Cross Site Scripting - SPIP (CVE-2026-26345) - Medium [309]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.5 | 10 | CVSS Base Score is 5.4. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.1618 |
debian: CVE-2026-26345 was patched at 2026-03-03, 2026-03-18
350.
Denial of Service - ImageMagick (CVE-2026-24484) - Medium [308]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.17386 |
altlinux: CVE-2026-24484 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-24484 was patched at 2026-03-09, 2026-03-10, 2026-03-18
351.
Denial of Service - UDisks (CVE-2026-26103) - Medium [308]
Description: A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | UDisks is a system service daemon that provides interfaces to enumerate, query, and manage storage devices such as hard drives, SSDs, removable media, and loop devices. It exposes functionality over the D-Bus system bus, allowing unprivileged applications to perform safe disk operations while privileged actions are mediated by PolicyKit. | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00948 |
almalinux: CVE-2026-26103 was patched at 2026-03-02
altlinux: CVE-2026-26103 was patched at 2026-03-03
oraclelinux: CVE-2026-26103 was patched at 2026-03-02
352.
Incorrect Calculation - Apache ActiveMQ (CVE-2025-66168) - Medium [308]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.6 | 14 | Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service (JMS) client | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.08943 |
debian: CVE-2025-66168 was patched at 2026-03-18
353.
Memory Corruption - ImageMagick (CVE-2026-25794) - Medium [308]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 8.2. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00058, EPSS Percentile is 0.18033 |
altlinux: CVE-2026-25794 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25794 was patched at 2026-03-09, 2026-03-18
354.
Memory Corruption - ImageMagick (CVE-2026-25795) - Medium [308]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.18959 |
altlinux: CVE-2026-25795 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25795 was patched at 2026-03-09, 2026-03-10, 2026-03-18
355.
Memory Corruption - ImageMagick (CVE-2026-25969) - Medium [308]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.17899 |
altlinux: CVE-2026-25969 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25969 was patched at 2026-03-09, 2026-03-18
356.
Memory Corruption - ImageMagick (CVE-2026-26284) - Medium [308]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.05834 |
altlinux: CVE-2026-26284 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-26284 was patched at 2026-03-09, 2026-03-18
ubuntu: CVE-2026-26284 was patched at 2026-03-04
357.
Memory Corruption - ImageMagick (CVE-2026-28693) - Medium [308]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00059, EPSS Percentile is 0.18588 |
debian: CVE-2026-28693 was patched at 2026-03-18, 2026-03-19
358.
Authentication Bypass - Alinto SOGo (CVE-2026-33550) - Medium [305]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0.5 | 14 | SOGo is an open source groupware and webmail server developed by Alinto, providing email, calendar, and contact management through a web-based interface and standard protocols. | |
| 0.3 | 10 | CVSS Base Score is 2.6. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0003, EPSS Percentile is 0.08638 |
altlinux: CVE-2026-33550 was patched at 2026-03-05, 2026-03-10
debian: CVE-2026-33550 was patched at 2026-03-25
359.
Denial of Service - Libarchive (CVE-2026-4111) - Medium [303]
Description: A flaw was identified in the RAR5 archive decompression logic of the
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Multi-format archive and compression library | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.04884 |
almalinux: CVE-2026-4111 was patched at 2026-03-19
debian: CVE-2026-4111 was patched at 2026-03-18
oraclelinux: CVE-2026-4111 was patched at 2026-03-19
redhat: CVE-2026-4111 was patched at 2026-03-19
360.
Denial of Service - Packetbeat (CVE-2025-68388) - Medium [303]
Description: Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to a degradation in Packetbeat.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:elasticsearch:packetbeat (exists in CPE dict) | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00129, EPSS Percentile is 0.32289 |
redos: CVE-2025-68388 was patched at 2026-03-10
361.
Denial of Service - QuickJS (CVE-2025-69653) - Medium [303]
Description: A crafted JavaScript input can trigger an internal assertion failure in QuickJS release 2025-09-13, fixed in commit 1dbba8a88eaa40d15a8a9b70bb1a0b8fb5b552e6 (2025-12-11), in file gc_decref_child in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | QuickJS is a lightweight JavaScript engine that supports modern ECMAScript features and can be embedded into applications for scripting purposes. | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00037, EPSS Percentile is 0.10993 |
debian: CVE-2025-69653 was patched at 2026-03-18
362.
Denial of Service - Traefik (CVE-2026-25949) - Medium [303]
Description: Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.8, there is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint respondingTimeouts.readTimeout by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinitely, leading to a denial of service. This vulnerability is fixed in 3.6.8.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:traefik:traefik (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.04627 |
altlinux: CVE-2026-25949 was patched at 2026-02-20
363.
Denial of Service - Traefik (CVE-2026-26999) - Medium [303]
Description: Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing TLS handshake on TCP routers. When Traefik processes a TLS connection on a TCP router, the read deadline used to bound protocol sniffing is cleared before the TLS handshake is completed. When a TLS handshake read error occurs, the code attempts a second handshake with different connection parameters, silently ignoring the initial error. A remote unauthenticated client can exploit this by sending an incomplete TLS record and stopping further data transmission, causing the TLS handshake to stall indefinitely and holding connections open. By opening many such stalled connections in parallel, an attacker can exhaust file descriptors and goroutines, degrading availability of all services on the affected entrypoint. This issue has been patched in versions 2.11.38 and 3.6.9.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:traefik:traefik (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.04252 |
altlinux: CVE-2026-26999 was patched at 2026-03-06, 2026-03-10
364.
Denial of Service - undici (CVE-2026-1526) - Medium [303]
Description: The undici WebSocket client is vulnerable to a
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:nodejs:undici (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.04757 |
debian: CVE-2026-1526 was patched at 2026-03-18
365.
Memory Corruption - libssh (CVE-2026-3731) - Medium [303]
Description: A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libssh:libssh (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00099, EPSS Percentile is 0.27691 |
altlinux: CVE-2026-3731 was patched at 2026-03-11, 2026-03-12
debian: CVE-2026-3731 was patched at 2026-03-18
ubuntu: CVE-2026-3731 was patched at 2026-03-16
366.
Security Feature Bypass - gitea (CVE-2025-68939) - Medium [303]
Description: Gitea before 1.23.0 allows attackers to add attachments with forbidden file extensions by editing an attachment name via an attachment API.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0.5 | 14 | Product detected by a:gitea:gitea (exists in CPE dict) | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.0217 |
redos: CVE-2025-68939 was patched at 2026-02-24
367.
Open Redirect - SPIP (CVE-2025-71244) - Medium [300]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.75 | 15 | Open Redirect | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.08987 |
debian: CVE-2025-71244 was patched at 2026-03-18
368.
Spoofing - Chromium (CVE-2026-3937) - Medium [300]
Description: Incorrect security UI in Downloads in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.4 | 15 | Spoofing | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00028, EPSS Percentile is 0.07973 |
debian: CVE-2026-3937 was patched at 2026-03-12, 2026-03-18
369.
Memory Corruption - Linux Kernel (CVE-2026-23115) - Medium [298]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.5 | 10 | CVSS Base Score is 4.7. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03027 |
altlinux: CVE-2026-23115 was patched at 2026-02-26
370.
Memory Corruption - Linux Kernel (CVE-2026-23153) - Medium [298]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.5 | 10 | CVSS Base Score is 4.7. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03027 |
altlinux: CVE-2026-23153 was patched at 2026-02-26
371.
Cross Site Scripting - Alinto SOGo (CVE-2026-3054) - Medium [297]
Description: A vulnerability was identified in Alinto
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | SOGo is an open source groupware and webmail server developed by Alinto, providing email, calendar, and contact management through a web-based interface and standard protocols. | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00923 |
altlinux: CVE-2026-3054 was patched at 2026-03-05
debian: CVE-2026-3054 was patched at 2026-03-18
372.
Cross Site Scripting - DOMPurify (CVE-2026-0540) - Medium [297]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0.5 | 14 | DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00012, EPSS Percentile is 0.01481 |
debian: CVE-2026-0540 was patched at 2026-03-18
373.
Denial of Service - ImageMagick (CVE-2026-31853) - Medium [296]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02558 |
debian: CVE-2026-31853 was patched at 2026-03-18, 2026-03-19
374.
Incorrect Calculation - ImageMagick (CVE-2026-28493) - Medium [296]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.17343 |
debian: CVE-2026-28493 was patched at 2026-03-18, 2026-03-19
375.
Memory Corruption - ImageMagick (CVE-2026-25987) - Medium [296]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.0333 |
altlinux: CVE-2026-25987 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25987 was patched at 2026-03-09, 2026-03-10, 2026-03-18
ubuntu: CVE-2026-25987 was patched at 2026-03-04
376.
Memory Corruption - Mozilla Firefox (CVE-2026-2804) - Medium [294]
Description: Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.5 | 10 | CVSS Base Score is 5.4. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00034, EPSS Percentile is 0.09927 |
altlinux: CVE-2026-2804 was patched at 2026-03-16
377.
Memory Corruption - fast-xml-parser (CVE-2026-27942) - Medium [291]
Description: fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. Prior to version 5.3.8, the application crashes with stack overflow when user use XML builder with `preserveOrder:true`. Version 5.3.8 fixes the issue. As a workaround, use XML builder with `preserveOrder:false` or check the input data before passing to builder.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:naturalintelligence:fast-xml-parser (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.0005, EPSS Percentile is 0.15449 |
debian: CVE-2026-27942 was patched at 2026-03-18
378.
Path Traversal - PDFBox (CVE-2026-23907) - Medium [291]
Description: This issue affects the ExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.35, from 3.0.0 through 3.0.6. The ExtractEmbeddedFiles example contains a path traversal vulnerability (CWE-22) because the filename that is obtained from PDComplexFileSpecification.getFilename() is appended to the extraction path. Users who have copied this example into their production code should review it to ensure that the extraction path is acceptable. The example has been changed accordingly, now the initial path and the extraction paths are converted into canonical paths and it is verified that extraction path contains the initial path. The documentation has also been adjusted.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Path Traversal | |
| 0.5 | 14 | Product detected by a:apache:pdfbox (exists in CPE dict) | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00053, EPSS Percentile is 0.16447 |
debian: CVE-2026-23907 was patched at 2026-03-18
379.
Denial of Service - Linux Kernel (CVE-2025-71265) - Medium [286]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00037, EPSS Percentile is 0.1094 |
debian: CVE-2025-71265 was patched at 2026-03-18
380.
Denial of Service - Linux Kernel (CVE-2025-71266) - Medium [286]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.09235 |
debian: CVE-2025-71266 was patched at 2026-03-18
381.
Denial of Service - Linux Kernel (CVE-2025-71267) - Medium [286]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.09235 |
debian: CVE-2025-71267 was patched at 2026-03-18
382.
Remote Code Execution - Unknown Product (CVE-2025-61982) - Medium [285]
Description: {'nvd_cve_data_all': 'An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 1.0 | 15 | Remote Code Execution | |
| 0 | 14 | Unknown Product | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.07644 |
debian: CVE-2025-61982 was patched at 2026-03-18
383.
Memory Corruption - ImageMagick (CVE-2026-30883) - Medium [284]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 7e-05, EPSS Percentile is 0.00453 |
debian: CVE-2026-30883 was patched at 2026-03-18, 2026-03-19
384.
Memory Corruption - ImageMagick (CVE-2026-30931) - Medium [284]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.0272 |
debian: CVE-2026-30931 was patched at 2026-03-18, 2026-03-19
385.
Server-Side Request Forgery - GVfs (CVE-2026-28295) - Medium [281]
Description: A flaw was found in the FTP
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.87 | 15 | Server-Side Request Forgery | |
| 0.4 | 14 | GVfs (GNOME Virtual File System) is userspace virtual filesystem software for GNOME that provides backends (including FTP) to access different remote and local file systems transparently. | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.08746 |
debian: CVE-2026-28295 was patched at 2026-03-18
386.
Code Injection - Unknown Product (CVE-2026-0603) - Medium [280]
Description: {'nvd_cve_data_all': 'A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application's database, resulting in an application level denial of service.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application's database, resulting in an application level denial of service.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.97 | 15 | Code Injection | |
| 0 | 14 | Unknown Product | |
| 0.8 | 10 | CVSS Base Score is 8.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00029, EPSS Percentile is 0.0831 |
redhat: CVE-2026-0603 was patched at 2026-03-18
387.
Denial of Service - Pypdf (CVE-2026-27024) - Medium [279]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | PyPDF is a Python library for reading, manipulating, and writing PDF files, including extraction, splitting, merging, and encryption features. | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00232 |
debian: CVE-2026-27024 was patched at 2026-03-18
388.
Denial of Service - Pypdf (CVE-2026-27026) - Medium [279]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | PyPDF is a Python library for reading, manipulating, and writing PDF files, including extraction, splitting, merging, and encryption features. | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00232 |
debian: CVE-2026-27026 was patched at 2026-03-18
389.
Denial of Service - Pypdf (CVE-2026-31826) - Medium [279]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | PyPDF is a Python library for reading, manipulating, and writing PDF files, including extraction, splitting, merging, and encryption features. | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00012, EPSS Percentile is 0.01673 |
debian: CVE-2026-31826 was patched at 2026-03-18
390.
Denial of Service - exiv2 (CVE-2026-27631) - Medium [279]
Description: Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an uncaught exception was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. Due to an integer overflow, the code attempts to create a huge std::vector, which causes Exiv2
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:exiv2:exiv2 (exists in CPE dict) | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00033, EPSS Percentile is 0.09735 |
altlinux: CVE-2026-27631 was patched at 2026-03-09
debian: CVE-2026-27631 was patched at 2026-03-18
ubuntu: CVE-2026-27631 was patched at 2026-03-18
391.
Denial of Service - undici (CVE-2026-2581) - Medium [279]
Description: This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS). In vulnerable Undici versions, when interceptors.deduplicate() is enabled, response data for deduplicated requests could be accumulated in memory for downstream handlers. An attacker-controlled or untrusted upstream endpoint can exploit this with large/chunked responses and concurrent identical requests, causing high memory usage and potential OOM process termination. Impacted users are applications that use Undici’s deduplication interceptor against endpoints that may produce large or long-lived response bodies. PatchesThe issue has been patched by changing deduplication behavior to stream response chunks to downstream handlers as they arrive (instead of full-body accumulation), and by preventing late deduplication when body streaming has already started. Users should upgrade to the first official Undici (and Node.js, where applicable) releases that include this patch.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:nodejs:undici (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.9. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.04285 |
debian: CVE-2026-2581 was patched at 2026-03-18
392.
Incorrect Calculation - capnproto (CVE-2026-32239) - Medium [279]
Description: Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.5 | 14 | Product detected by a:capnproto:capnproto (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00077, EPSS Percentile is 0.23024 |
debian: CVE-2026-32239 was patched at 2026-03-18
393.
Memory Corruption - nats-server (CVE-2026-27571) - Medium [279]
Description: NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The WebSockets handling of NATS messages handles compressed messages via the WebSockets negotiated compression. Prior to versions 2.11.2 and 2.12.3, the implementation bound the memory size of a NATS message but did not independently bound the
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:linuxfoundation:nats-server (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.08986 |
debian: CVE-2026-27571 was patched at 2026-03-18
394.
Memory Corruption - valkey (CVE-2026-21863) - Medium [279]
Description: Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:lfprojects:valkey (does NOT exist in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.05101 |
almalinux: CVE-2026-21863 was patched at 2026-02-26, 2026-03-02
debian: CVE-2026-21863 was patched at 2026-03-18
oraclelinux: CVE-2026-21863 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-21863 was patched at 2026-03-02
ubuntu: CVE-2026-21863 was patched at 2026-03-18
395.
Memory Corruption - yaml::syck (CVE-2026-4177) - Medium [279]
Description: YAML::Syck versions through 1.36 for Perl has several potential security vulnerabilities including a high-severity heap
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:toddr:yaml | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.04923 |
debian: CVE-2026-4177 was patched at 2026-03-18, 2026-03-22
396.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2757) - Medium [276]
Description: {'nvd_cve_data_all': 'Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00066, EPSS Percentile is 0.20411 |
almalinux: CVE-2026-2757 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2757 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2757 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27571 was patched at 2026-03-18
debian: CVE-2026-27572 was patched at 2026-03-18
oraclelinux: CVE-2026-2757 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2757 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
397.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2759) - Medium [276]
Description: {'nvd_cve_data_all': 'Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00066, EPSS Percentile is 0.20411 |
almalinux: CVE-2026-2759 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2759 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-27590 was patched at 2026-03-04, 2026-03-05
altlinux: CVE-2026-27596 was patched at 2026-03-09
debian: CVE-2026-2759 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27590 was patched at 2026-03-18
debian: CVE-2026-27596 was patched at 2026-03-18
oraclelinux: CVE-2026-2759 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2759 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
ubuntu: CVE-2026-27596 was patched at 2026-03-18
398.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2760) - Medium [276]
Description: {'nvd_cve_data_all': 'Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 10.0. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00078, EPSS Percentile is 0.23052 |
almalinux: CVE-2026-2760 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2760 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2760 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27601 was patched at 2026-03-18
debian: CVE-2026-27606 was patched at 2026-03-18
oraclelinux: CVE-2026-2760 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-27606 was patched at 2026-03-13
redhat: CVE-2026-2760 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
399.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2784) - Medium [276]
Description: {'nvd_cve_data_all': 'Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.19561 |
almalinux: CVE-2026-2784 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2784 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2784 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2784 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2784 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
400.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2796) - Medium [276]
Description: {'nvd_cve_data_all': 'JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.19109 |
altlinux: CVE-2026-2796 was patched at 2026-03-16
debian: CVE-2026-27962 was patched at 2026-03-18
401.
Denial of Service - Wasmtime (CVE-2026-27572) - Medium [273]
Description: Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of the `wasi:http/types.fields` resource is susceptible to panics when too many fields are added to the set of headers. Wasmtime's implementation in the `
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.25 | 14 | Standalone WebAssembly runtime written in Rust | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00028, EPSS Percentile is 0.07773 |
debian: CVE-2026-27572 was patched at 2026-03-18
402.
Memory Corruption - ImageMagick (CVE-2026-25637) - Medium [272]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.17386 |
altlinux: CVE-2026-25637 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25637 was patched at 2026-03-09, 2026-03-18
403.
Memory Corruption - ImageMagick (CVE-2026-25638) - Medium [272]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00059, EPSS Percentile is 0.18456 |
altlinux: CVE-2026-25638 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25638 was patched at 2026-03-09, 2026-03-10, 2026-03-18
404.
Memory Corruption - ImageMagick (CVE-2026-27798) - Medium [272]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02675 |
altlinux: CVE-2026-27798 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-27798 was patched at 2026-03-09, 2026-03-10, 2026-03-18
405.
Memory Corruption - ImageMagick (CVE-2026-28494) - Medium [272]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02558 |
debian: CVE-2026-28494 was patched at 2026-03-18, 2026-03-19
406.
Memory Corruption - ImageMagick (CVE-2026-28687) - Medium [272]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.16912 |
debian: CVE-2026-28687 was patched at 2026-03-18, 2026-03-19
407.
Memory Corruption - ImageMagick (CVE-2026-28690) - Medium [272]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.02273 |
debian: CVE-2026-28690 was patched at 2026-03-18, 2026-03-19
408.
Authentication Bypass - Unknown Product (CVE-2025-15581) - Medium [270]
Description: {'nvd_cve_data_all': 'Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's HTTP Basic Authentication implementation. Successful exploitation could result in Privilege Escalation, potentially allowing full administrative access.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's\xa0HTTP Basic Authentication implementation. \n\nSuccessful exploitation could result in Privilege Escalation, potentially allowing full administrative access.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0 | 14 | Unknown Product | |
| 0.6 | 10 | CVSS Base Score is 5.7. According to Vulners data source | |
| 0.2 | 10 | EPSS Probability is 0.00083, EPSS Percentile is 0.24303 |
debian: CVE-2025-15581 was patched at 2026-02-28, 2026-03-18
409.
Denial of Service - Pypdf (CVE-2026-28351) - Medium [267]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | PyPDF is a Python library for reading, manipulating, and writing PDF files, including extraction, splitting, merging, and encryption features. | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03933 |
debian: CVE-2026-28351 was patched at 2026-03-18
410.
Denial of Service - Traefik (CVE-2026-26998) - Medium [267]
Description: Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing the ForwardAuth middleware responses. When Traefik is configured to use the ForwardAuth middleware, the response body from the authentication server is read entirely into memory without any size limit. There is no maxResponseBodySize configuration to restrict the amount of data read from the authentication server response. If the authentication server returns an unexpectedly large or unbounded response body, Traefik will allocate unlimited memory, potentially causing an out-of-memory (OOM) condition that crashes the process. This results in a denial of service for all routes served by the affected Traefik instance. This issue has been patched in versions 2.11.38 and 3.6.9.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.5 | 14 | Product detected by a:traefik:traefik (exists in CPE dict) | |
| 0.4 | 10 | CVSS Base Score is 4.4. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.07643 |
altlinux: CVE-2026-26998 was patched at 2026-03-06, 2026-03-10
411.
Security Feature Bypass - Unknown Product (CVE-2026-3644) - Medium [267]
Description: {'nvd_cve_data_all': 'The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0 | 14 | Unknown Product | |
| 0.6 | 10 | CVSS Base Score is 6.0. According to Vulners data source | |
| 0.3 | 10 | EPSS Probability is 0.00113, EPSS Percentile is 0.29903 |
debian: CVE-2026-3644 was patched at 2026-03-18
412.
Spoofing - Chromium (CVE-2026-3925) - Medium [264]
Description: Incorrect security UI in LookalikeChecks in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.4 | 15 | Spoofing | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00024, EPSS Percentile is 0.06417 |
debian: CVE-2026-3925 was patched at 2026-03-12, 2026-03-18
413.
Spoofing - Chromium (CVE-2026-3927) - Medium [264]
Description: Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.4 | 15 | Spoofing | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00028, EPSS Percentile is 0.07973 |
debian: CVE-2026-3927 was patched at 2026-03-12, 2026-03-18
414.
Spoofing - Chromium (CVE-2026-3935) - Medium [264]
Description: Incorrect security UI in WebAppInstalls in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.4 | 15 | Spoofing | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00026, EPSS Percentile is 0.07117 |
debian: CVE-2026-3935 was patched at 2026-03-12, 2026-03-18
415.
Spoofing - Chromium (CVE-2026-3942) - Medium [264]
Description: Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.4 | 15 | Spoofing | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00028, EPSS Percentile is 0.07973 |
debian: CVE-2026-3942 was patched at 2026-03-12, 2026-03-18
416.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2775) - Medium [264]
Description: {'nvd_cve_data_all': 'Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.07527 |
almalinux: CVE-2026-2775 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2775 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2775 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2775 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2775 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
417.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2791) - Medium [264]
Description: {'nvd_cve_data_all': 'Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.07369 |
almalinux: CVE-2026-2791 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2791 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2791 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2791 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2791 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
418.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2806) - Medium [264]
Description: {'nvd_cve_data_all': 'Uninitialized memory in the Graphics: Text component. This vulnerability affects Firefox < 148 and Thunderbird < 148.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Uninitialized memory in the Graphics: Text component. This vulnerability affects Firefox < 148 and Thunderbird < 148.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.9 | 10 | CVSS Base Score is 9.1. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00061, EPSS Percentile is 0.19109 |
altlinux: CVE-2026-2806 was patched at 2026-03-16
419.
Denial of Service - MongoDB (CVE-2026-4359) - Medium [260]
Description: A compromised third party cloud server or man-in-the-middle attacker could send a malformed HTTP response and
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0.6 | 14 | MongoDB is a source-available, cross-platform, document-oriented database program | |
| 0.2 | 10 | CVSS Base Score is 2.0. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00033, EPSS Percentile is 0.09519 |
debian: CVE-2026-4359 was patched at 2026-03-18
420.
Incorrect Calculation - ImageMagick (CVE-2026-30937) - Medium [260]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02705 |
debian: CVE-2026-30937 was patched at 2026-03-18, 2026-03-19
421.
Memory Corruption - ImageMagick (CVE-2026-28688) - Medium [260]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.12781 |
debian: CVE-2026-28688 was patched at 2026-03-18, 2026-03-19
422.
Memory Corruption - ImageMagick (CVE-2026-28692) - Medium [260]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.5 | 10 | CVSS Base Score is 4.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.05573 |
debian: CVE-2026-28692 was patched at 2026-03-18, 2026-03-19
423.
Memory Corruption - ImageMagick (CVE-2026-30936) - Medium [260]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.04338 |
debian: CVE-2026-30936 was patched at 2026-03-18, 2026-03-19
424.
Authentication Bypass - Unknown Product (CVE-2026-4105) - Medium [258]
Description: {'nvd_cve_data_all': 'A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0 | 14 | Unknown Product | |
| 0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.04857 |
debian: CVE-2026-4105 was patched at 2026-03-18
425.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-38357) - Medium [257]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: fuse: fix runtime warning on truncate_folio_batch_exceptionals() The WARN_ON_ONCE is introduced on truncate_folio_batch_exceptionals() to capture whether the filesystem has removed all DAX entries or not. And the fix has been applied on the filesystem xfs and ext4 by the commit 0e2f80afcfa6 ("fs/dax: ensure all pages are idle prior to filesystem unmount"). Apply the missed fix on filesystem fuse to fix the runtime warning: [ 2.011450] ------------[ cut here ]------------ [ 2.011873] WARNING: CPU: 0 PID: 145 at mm/truncate.c:89 truncate_folio_batch_exceptionals+0x272/0x2b0 [ 2.012468] Modules linked in: [ 2.012718] CPU: 0 UID: 1000 PID: 145 Comm: weston Not tainted 6.16.0-rc2-WSL2-STABLE #2 PREEMPT(undef) [ 2.013292] RIP: 0010:truncate_folio_batch_exceptionals+0x272/0x2b0 [ 2.013704] Code: 48 63 d0 41 29 c5 48 8d 1c d5 00 00 00 00 4e 8d 6c 2a 01 49 c1 e5 03 eb 09 48 83 c3 08 49 39 dd 74 83 41 f6 44 1c 08 01 74 ef <0f> 0b 49 8b 34 1e 48 89 ef e8 10 a2 17 00 eb df 48 8b 7d 00 e8 35 [ 2.014845] RSP: 0018:ffffa47ec33f3b10 EFLAGS: 00010202 [ 2.015279] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 2.015884] RDX: 0000000000000000 RSI: ffffa47ec33f3ca0 RDI: ffff98aa44f3fa80 [ 2.016377] RBP: ffff98aa44f3fbf0 R08: ffffa47ec33f3ba8 R09: 0000000000000000 [ 2.016942] R10: 0000000000000001 R11: 0000000000000000 R12: ffffa47ec33f3ca0 [ 2.017437] R13: 0000000000000008 R14: ffffa47ec33f3ba8 R15: 0000000000000000 [ 2.017972] FS: 000079ce006afa40(0000) GS:ffff98aade441000(0000) knlGS:0000000000000000 [ 2.018510] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2.018987] CR2: 000079ce03e74000 CR3: 000000010784f006 CR4: 0000000000372eb0 [ 2.019518] Call Trace: [ 2.019729] <TASK> [ 2.019901] truncate_inode_pages_range+0xd8/0x400 [ 2.020280] ? timerqueue_add+0x66/0xb0 [ 2.020574] ? get_nohz_timer_target+0x2a/0x140 [ 2.020904] ? timerqueue_add+0x66/0xb0 [ 2.021231] ? timerqueue_del+0x2e/0x50 [ 2.021646] ? __remove_hrtimer+0x39/0x90 [ 2.022017] ? srso_alias_untrain_ret+0x1/0x10 [ 2.022497] ? psi_group_change+0x136/0x350 [ 2.023046] ? _raw_spin_unlock+0xe/0x30 [ 2.023514] ? finish_task_switch.isra.0+0x8d/0x280 [ 2.024068] ? __schedule+0x532/0xbd0 [ 2.024551] fuse_evict_inode+0x29/0x190 [ 2.025131] evict+0x100/0x270 [ 2.025641] ? _atomic_dec_and_lock+0x39/0x50 [ 2.026316] ? __pfx_generic_delete_inode+0x10/0x10 [ 2.026843] __dentry_kill+0x71/0x180 [ 2.027335] dput+0xeb/0x1b0 [ 2.027725] __fput+0x136/0x2b0 [ 2.028054] __x64_sys_close+0x3d/0x80 [ 2.028469] do_syscall_64+0x6d/0x1b0 [ 2.028832] ? clear_bhb_loop+0x30/0x80 [ 2.029182] ? clear_bhb_loop+0x30/0x80 [ 2.029533] ? clear_bhb_loop+0x30/0x80 [ 2.029902] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 2.030423] RIP: 0033:0x79ce03d0d067 [ 2.030820] Code: b8 ff ff ff ff e9 3e ff ff ff 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 c3 a7 f8 ff [ 2.032354] RSP: 002b:00007ffef0498948 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 2.032939] RAX: ffffffffffffffda RBX: 00007ffef0498960 RCX: 000079ce03d0d067 [ 2.033612] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 000000000000000d [ 2.034289] RBP: 00007ffef0498a30 R08: 000000000000000d R09: 0000000000000000 [ 2.034944] R10: 00007ffef0498978 R11: 0000000000000246 R12: 0000000000000001 [ 2.035610] R13: 00007ffef0498960 R14: 000079ce03e09ce0 R15: 0000000000000003 [ 2.036301] </TASK> [ 2.036532] ---[ end trace 0000000000000000 ]---', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: fix runtime warning on truncate_folio_batch_exceptionals()\n\nThe WARN_ON_ONCE is introduced on truncate_folio_batch_exceptionals() to\ncapture whether the filesystem has removed all DAX entries or not.\n\nAnd the fix has been applied on the filesystem xfs and ext4 by the commit\n0e2f80afcfa6 ("fs/dax: ensure all pages are idle prior to filesystem\nunmount").\n\nApply the missed fix on filesystem fuse to fix the runtime warning:\n\n[ 2.011450] ------------[ cut here ]------------\n[ 2.011873] WARNING: CPU: 0 PID: 145 at mm/truncate.c:89 truncate_folio_batch_exceptionals+0x272/0x2b0\n[ 2.012468] Modules linked in:\n[ 2.012718] CPU: 0 UID: 1000 PID: 145 Comm: weston Not tainted 6.16.0-rc2-WSL2-STABLE #2 PREEMPT(undef)\n[ 2.013292] RIP: 0010:truncate_folio_batch_exceptionals+0x272/0x2b0\n[ 2.013704] Code: 48 63 d0 41 29 c5 48 8d 1c d5 00 00 00 00 4e 8d 6c 2a 01 49 c1 e5 03 eb 09 48 83 c3 08 49 39 dd 74 83 41 f6 44 1c 08 01 74 ef <0f> 0b 49 8b 34 1e 48 89 ef e8 10 a2 17 00 eb df 48 8b 7d 00 e8 35\n[ 2.014845] RSP: 0018:ffffa47ec33f3b10 EFLAGS: 00010202\n[ 2.015279] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\n[ 2.015884] RDX: 0000000000000000 RSI: ffffa47ec33f3ca0 RDI: ffff98aa44f3fa80\n[ 2.016377] RBP: ffff98aa44f3fbf0 R08: ffffa47ec33f3ba8 R09: 0000000000000000\n[ 2.016942] R10: 0000000000000001 R11: 0000000000000000 R12: ffffa47ec33f3ca0\n[ 2.017437] R13: 0000000000000008 R14: ffffa47ec33f3ba8 R15: 0000000000000000\n[ 2.017972] FS: 000079ce006afa40(0000) GS:ffff98aade441000(0000) knlGS:0000000000000000\n[ 2.018510] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 2.018987] CR2: 000079ce03e74000 CR3: 000000010784f006 CR4: 0000000000372eb0\n[ 2.019518] Call Trace:\n[ 2.019729] <TASK>\n[ 2.019901] truncate_inode_pages_range+0xd8/0x400\n[ 2.020280] ? timerqueue_add+0x66/0xb0\n[ 2.020574] ? get_nohz_timer_target+0x2a/0x140\n[ 2.020904] ? timerqueue_add+0x66/0xb0\n[ 2.021231] ? timerqueue_del+0x2e/0x50\n[ 2.021646] ? __remove_hrtimer+0x39/0x90\n[ 2.022017] ? srso_alias_untrain_ret+0x1/0x10\n[ 2.022497] ? psi_group_change+0x136/0x350\n[ 2.023046] ? _raw_spin_unlock+0xe/0x30\n[ 2.023514] ? finish_task_switch.isra.0+0x8d/0x280\n[ 2.024068] ? __schedule+0x532/0xbd0\n[ 2.024551] fuse_evict_inode+0x29/0x190\n[ 2.025131] evict+0x100/0x270\n[ 2.025641] ? _atomic_dec_and_lock+0x39/0x50\n[ 2.026316] ? __pfx_generic_delete_inode+0x10/0x10\n[ 2.026843] __dentry_kill+0x71/0x180\n[ 2.027335] dput+0xeb/0x1b0\n[ 2.027725] __fput+0x136/0x2b0\n[ 2.028054] __x64_sys_close+0x3d/0x80\n[ 2.028469] do_syscall_64+0x6d/0x1b0\n[ 2.028832] ? clear_bhb_loop+0x30/0x80\n[ 2.029182] ? clear_bhb_loop+0x30/0x80\n[ 2.029533] ? clear_bhb_loop+0x30/0x80\n[ 2.029902] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 2.030423] RIP: 0033:0x79ce03d0d067\n[ 2.030820] Code: b8 ff ff ff ff e9 3e ff ff ff 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 c3 a7 f8 ff\n[ 2.032354] RSP: 002b:00007ffef0498948 EFLAGS: 00000246 ORIG_RAX: 0000000000000003\n[ 2.032939] RAX: ffffffffffffffda RBX: 00007ffef0498960 RCX: 000079ce03d0d067\n[ 2.033612] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 000000000000000d\n[ 2.034289] RBP: 00007ffef0498a30 R08: 000000000000000d R09: 0000000000000000\n[ 2.034944] R10: 00007ffef0498978 R11: 0000000000000246 R12: 0000000000000001\n[ 2.035610] R13: 00007ffef0498960 R14: 000079ce03e09ce0 R15: 0000000000000003\n[ 2.036301] </TASK>\n[ 2.036532] ---[ end trace 0000000000000000 ]---', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.05538 |
oraclelinux: CVE-2025-38357 was patched at 2026-02-20
426.
Denial of Service - Unknown Product (CVE-2026-30405) - Medium [255]
Description: {'nvd_cve_data_all': 'An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of service via the NEXT_HOP path attribute', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of service via the NEXT_HOP path attribute', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0 | 14 | Unknown Product | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00141, EPSS Percentile is 0.341 |
debian: CVE-2026-30405 was patched at 2026-03-18
427.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2801) - Medium [252]
Description: {'nvd_cve_data_all': 'Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00057, EPSS Percentile is 0.17872 |
altlinux: CVE-2026-2801 was patched at 2026-03-16
428.
Memory Corruption - GPAC (CVE-2026-4185) - Medium [251]
Description: A vulnerability was found in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.4 | 14 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | |
| 0.6 | 10 | CVSS Base Score is 6.3. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00072, EPSS Percentile is 0.21911 |
debian: CVE-2026-4185 was patched at 2026-03-18
429.
Memory Corruption - Linux Kernel (CVE-2025-40249) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
almalinux: CVE-2025-40249 was patched at 2026-03-09
oraclelinux: CVE-2025-40249 was patched at 2026-03-10
ubuntu: CVE-2025-40249 was patched at 2026-03-16, 2026-03-17
430.
Memory Corruption - Linux Kernel (CVE-2025-40255) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-40255 was patched at 2026-03-16, 2026-03-17
431.
Memory Corruption - Linux Kernel (CVE-2025-40290) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-40290 was patched at 2026-03-16, 2026-03-17
432.
Memory Corruption - Linux Kernel (CVE-2025-68232) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68232 was patched at 2026-03-16, 2026-03-17
433.
Memory Corruption - Linux Kernel (CVE-2025-68323) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.13069 |
ubuntu: CVE-2025-68323 was patched at 2026-03-16, 2026-03-17
434.
Memory Corruption - Linux Kernel (CVE-2025-68326) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-68326 was patched at 2026-03-16, 2026-03-17
435.
Memory Corruption - Linux Kernel (CVE-2025-68373) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68373 was patched at 2026-03-16, 2026-03-17
436.
Memory Corruption - Linux Kernel (CVE-2025-68375) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68375 was patched at 2026-03-16, 2026-03-17
437.
Memory Corruption - Linux Kernel (CVE-2025-68738) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68738 was patched at 2026-03-16, 2026-03-17
438.
Memory Corruption - Linux Kernel (CVE-2025-68760) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68760 was patched at 2026-03-16, 2026-03-17
439.
Memory Corruption - Linux Kernel (CVE-2026-23239) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06189 |
debian: CVE-2026-23239 was patched at 2026-03-18
440.
Memory Corruption - Linux Kernel (CVE-2026-23240) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00023, EPSS Percentile is 0.06189 |
debian: CVE-2026-23240 was patched at 2026-03-18
441.
Memory Corruption - Linux Kernel (CVE-2026-23242) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.09235 |
debian: CVE-2026-23242 was patched at 2026-03-18
442.
Memory Corruption - Linux Kernel (CVE-2026-23246) - Medium [251]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00024, EPSS Percentile is 0.06303 |
debian: CVE-2026-23246 was patched at 2026-03-18
443.
Memory Corruption - ImageMagick (CVE-2026-26983) - Medium [248]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00016, EPSS Percentile is 0.03688 |
altlinux: CVE-2026-26983 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-26983 was patched at 2026-03-09, 2026-03-18
444.
Unknown Vulnerability Type - Rust (CVE-2026-32829) - Medium [245]
Description: {'nvd_cve_data_all': 'lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 "match copy operations," allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 "match copy operations," allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | Rust is a modern, high-performance systems programming language focused on safety, concurrency, and memory management. | |
| 0.8 | 10 | CVSS Base Score is 8.2. According to Vulners data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.04005 |
debian: CVE-2026-32829 was patched at 2026-03-18
445.
Memory Corruption - Pypdf (CVE-2026-27025) - Medium [244]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | PyPDF is a Python library for reading, manipulating, and writing PDF files, including extraction, splitting, merging, and encryption features. | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00232 |
debian: CVE-2026-27025 was patched at 2026-03-18
446.
Memory Corruption - libexpat (CVE-2026-32776) - Medium [244]
Description: libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libexpat_project:libexpat (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.02269 |
debian: CVE-2026-32776 was patched at 2026-03-18
447.
Memory Corruption - libexpat (CVE-2026-32778) - Medium [244]
Description: libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:libexpat_project:libexpat (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.02269 |
debian: CVE-2026-32778 was patched at 2026-03-18
448.
Memory Corruption - vim (CVE-2026-28418) - Medium [244]
Description: Vim is an open source, command line text editor. Prior to version 9.2.0074, a heap-based buffer overflow
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 4e-05, EPSS Percentile is 0.00178 |
debian: CVE-2026-28418 was patched at 2026-03-18
ubuntu: CVE-2026-28418 was patched at 2026-03-16
449.
Unknown Vulnerability Type - Canonical LXD (CVE-2026-28384) - Medium [242]
Description: {'nvd_cve_data_all': 'An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | Canonical LXD is a system container and VM manager for Linux. LXD-UI is the web UI component of LXD that provides a browser-based interface for creating, managing and starting containers and instances. | |
| 0.9 | 10 | CVSS Base Score is 9.4. According to Vulners data source | |
| 0.3 | 10 | EPSS Probability is 0.0013, EPSS Percentile is 0.32483 |
debian: CVE-2026-28384 was patched at 2026-03-18
450.
Unknown Vulnerability Type - Chromium (CVE-2026-3063) - Medium [240]
Description: {'nvd_cve_data_all': 'Inappropriate implementation in DevTools in Google Chrome prior to 145.0.7632.116 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via DevTools. (Chromium security severity: High)', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Inappropriate implementation in DevTools in Google Chrome prior to 145.0.7632.116 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via DevTools. (Chromium security severity: High)', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Chromium is a free and open-source web browser project, mainly developed and maintained by Google | |
| 0.9 | 10 | CVSS Base Score is 8.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 6e-05, EPSS Percentile is 0.00423 |
debian: CVE-2026-3063 was patched at 2026-02-26, 2026-03-18
451.
Unknown Vulnerability Type - Keycloak (CVE-2026-3009) - Medium [240]
Description: {'nvd_cve_data_all': 'A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a previously generated login request to bypass the administrative restriction. This undermines access control enforcement and may allow unauthorized authentication through a disabled external provider.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a previously generated login request to bypass the administrative restriction. This undermines access control enforcement and may allow unauthorized authentication through a disabled external provider.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00028, EPSS Percentile is 0.07766 |
altlinux: CVE-2026-3009 was patched at 2026-03-10, 2026-03-23
452.
Memory Corruption - ImageMagick (CVE-2026-30935) - Medium [236]
Description:
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.4 | 10 | CVSS Base Score is 4.4. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02356 |
debian: CVE-2026-30935 was patched at 2026-03-18, 2026-03-19
453.
Authentication Bypass - Unknown Product (CVE-2026-32953) - Medium [234]
Description: {'nvd_cve_data_all': 'Tillitis TKey Client package is a Go package for a TKey client. Versions 1.2.0 and below contain a critical bug in the tkeyclient Go module which causes 1 out of every 256 User Supplied Secrets (USS) to be silently ignored, producing the same Compound Device Identifier (CDI)—and thus the same key material—as if no USS is provided. This happens because a buffer index error overwrites the USS-enabled boolean with the first byte of the USS digest, so any USS whose hash starts with 0x00 is effectively discarded. This issue has been fixed in version 1.3.0. Users unable to upgrade immediately should switch to a USS whose hash does not begin with a zero byte.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Tillitis TKey Client package is a Go package for a TKey client. Versions 1.2.0 and below contain a critical bug in the tkeyclient Go module which causes 1 out of every 256 User Supplied Secrets (USS) to be silently ignored, producing the same Compound Device Identifier (CDI)—and thus the same key material—as if no USS is provided. This happens because a buffer index error overwrites the USS-enabled boolean with the first byte of the USS digest, so any USS whose hash starts with 0x00 is effectively discarded. This issue has been fixed in version 1.3.0. Users unable to upgrade immediately should switch to a USS whose hash does not begin with a zero byte.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.98 | 15 | Authentication Bypass | |
| 0 | 14 | Unknown Product | |
| 0.5 | 10 | CVSS Base Score is 4.7. According to Vulners data source | |
| 0.0 | 10 | EPSS Probability is 7e-05, EPSS Percentile is 0.00558 |
debian: CVE-2026-32953 was patched at 2026-03-18
454.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-38276) - Medium [233]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: fs/dax: Fix "don't skip locked entries when scanning entries" Commit 6be3e21d25ca ("fs/dax: don't skip locked entries when scanning entries") introduced a new function, wait_entry_unlocked_exclusive(), which waits for the current entry to become unlocked without advancing the XArray iterator state. Waiting for the entry to become unlocked requires dropping the XArray lock. This requires calling xas_pause() prior to dropping the lock which leaves the xas in a suitable state for the next iteration. However this has the side-effect of advancing the xas state to the next index. Normally this isn't an issue because xas_for_each() contains code to detect this state and thus avoid advancing the index a second time on the next loop iteration. However both callers of and wait_entry_unlocked_exclusive() itself subsequently use the xas state to reload the entry. As xas_pause() updated the state to the next index this will cause the current entry which is being waited on to be skipped. This caused the following warning to fire intermittently when running xftest generic/068 on an XFS filesystem with FS DAX enabled: [ 35.067397] ------------[ cut here ]------------ [ 35.068229] WARNING: CPU: 21 PID: 1640 at mm/truncate.c:89 truncate_folio_batch_exceptionals+0xd8/0x1e0 [ 35.069717] Modules linked in: nd_pmem dax_pmem nd_btt nd_e820 libnvdimm [ 35.071006] CPU: 21 UID: 0 PID: 1640 Comm: fstest Not tainted 6.15.0-rc7+ #77 PREEMPT(voluntary) [ 35.072613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/204 [ 35.074845] RIP: 0010:truncate_folio_batch_exceptionals+0xd8/0x1e0 [ 35.075962] Code: a1 00 00 00 f6 47 0d 20 0f 84 97 00 00 00 4c 63 e8 41 39 c4 7f 0b eb 61 49 83 c5 01 45 39 ec 7e 58 42 f68 [ 35.079522] RSP: 0018:ffffb04e426c7850 EFLAGS: 00010202 [ 35.080359] RAX: 0000000000000000 RBX: ffff9d21e3481908 RCX: ffffb04e426c77f4 [ 35.081477] RDX: ffffb04e426c79e8 RSI: ffffb04e426c79e0 RDI: ffff9d21e34816e8 [ 35.082590] RBP: ffffb04e426c79e0 R08: 0000000000000001 R09: 0000000000000003 [ 35.083733] R10: 0000000000000000 R11: 822b53c0f7a49868 R12: 000000000000001f [ 35.084850] R13: 0000000000000000 R14: ffffb04e426c78e8 R15: fffffffffffffffe [ 35.085953] FS: 00007f9134c87740(0000) GS:ffff9d22abba0000(0000) knlGS:0000000000000000 [ 35.087346] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 35.088244] CR2: 00007f9134c86000 CR3: 000000040afff000 CR4: 00000000000006f0 [ 35.089354] Call Trace: [ 35.089749] <TASK> [ 35.090168] truncate_inode_pages_range+0xfc/0x4d0 [ 35.091078] truncate_pagecache+0x47/0x60 [ 35.091735] xfs_setattr_size+0xc7/0x3e0 [ 35.092648] xfs_vn_setattr+0x1ea/0x270 [ 35.093437] notify_change+0x1f4/0x510 [ 35.094219] ? do_truncate+0x97/0xe0 [ 35.094879] do_truncate+0x97/0xe0 [ 35.095640] path_openat+0xabd/0xca0 [ 35.096278] do_filp_open+0xd7/0x190 [ 35.096860] do_sys_openat2+0x8a/0xe0 [ 35.097459] __x64_sys_openat+0x6d/0xa0 [ 35.098076] do_syscall_64+0xbb/0x1d0 [ 35.098647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.099444] RIP: 0033:0x7f9134d81fc1 [ 35.100033] Code: 75 57 89 f0 25 00 00 41 00 3d 00 00 41 00 74 49 80 3d 2a 26 0e 00 00 74 6d 89 da 48 89 ee bf 9c ff ff ff5 [ 35.102993] RSP: 002b:00007ffcd41e0d10 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 35.104263] RAX: ffffffffffffffda RBX: 0000000000000242 RCX: 00007f9134d81fc1 [ 35.105452] RDX: 0000000000000242 RSI: 00007ffcd41e1200 RDI: 00000000ffffff9c [ 35.106663] RBP: 00007ffcd41e1200 R08: 0000000000000000 R09: 0000000000000064 [ 35.107923] R10: 00000000000001a4 R11: 0000000000000202 R12: 0000000000000066 [ 35.109112] R13: 0000000000100000 R14: 0000000000100000 R15: 0000000000000400 [ 35.110357] </TASK> [ 35.110769] irq event stamp: 8415587 [ 35.111486] hardirqs last enabled at (8415599): [<ffffffff8d74b562>] __up_console_se ---truncated---', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nfs/dax: Fix "don't skip locked entries when scanning entries"\n\nCommit 6be3e21d25ca ("fs/dax: don't skip locked entries when scanning\nentries") introduced a new function, wait_entry_unlocked_exclusive(),\nwhich waits for the current entry to become unlocked without advancing\nthe XArray iterator state.\n\nWaiting for the entry to become unlocked requires dropping the XArray\nlock. This requires calling xas_pause() prior to dropping the lock\nwhich leaves the xas in a suitable state for the next iteration. However\nthis has the side-effect of advancing the xas state to the next index.\nNormally this isn't an issue because xas_for_each() contains code to\ndetect this state and thus avoid advancing the index a second time on\nthe next loop iteration.\n\nHowever both callers of and wait_entry_unlocked_exclusive() itself\nsubsequently use the xas state to reload the entry. As xas_pause()\nupdated the state to the next index this will cause the current entry\nwhich is being waited on to be skipped. This caused the following\nwarning to fire intermittently when running xftest generic/068 on an XFS\nfilesystem with FS DAX enabled:\n\n[ 35.067397] ------------[ cut here ]------------\n[ 35.068229] WARNING: CPU: 21 PID: 1640 at mm/truncate.c:89 truncate_folio_batch_exceptionals+0xd8/0x1e0\n[ 35.069717] Modules linked in: nd_pmem dax_pmem nd_btt nd_e820 libnvdimm\n[ 35.071006] CPU: 21 UID: 0 PID: 1640 Comm: fstest Not tainted 6.15.0-rc7+ #77 PREEMPT(voluntary)\n[ 35.072613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/204\n[ 35.074845] RIP: 0010:truncate_folio_batch_exceptionals+0xd8/0x1e0\n[ 35.075962] Code: a1 00 00 00 f6 47 0d 20 0f 84 97 00 00 00 4c 63 e8 41 39 c4 7f 0b eb 61 49 83 c5 01 45 39 ec 7e 58 42 f68\n[ 35.079522] RSP: 0018:ffffb04e426c7850 EFLAGS: 00010202\n[ 35.080359] RAX: 0000000000000000 RBX: ffff9d21e3481908 RCX: ffffb04e426c77f4\n[ 35.081477] RDX: ffffb04e426c79e8 RSI: ffffb04e426c79e0 RDI: ffff9d21e34816e8\n[ 35.082590] RBP: ffffb04e426c79e0 R08: 0000000000000001 R09: 0000000000000003\n[ 35.083733] R10: 0000000000000000 R11: 822b53c0f7a49868 R12: 000000000000001f\n[ 35.084850] R13: 0000000000000000 R14: ffffb04e426c78e8 R15: fffffffffffffffe\n[ 35.085953] FS: 00007f9134c87740(0000) GS:ffff9d22abba0000(0000) knlGS:0000000000000000\n[ 35.087346] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 35.088244] CR2: 00007f9134c86000 CR3: 000000040afff000 CR4: 00000000000006f0\n[ 35.089354] Call Trace:\n[ 35.089749] <TASK>\n[ 35.090168] truncate_inode_pages_range+0xfc/0x4d0\n[ 35.091078] truncate_pagecache+0x47/0x60\n[ 35.091735] xfs_setattr_size+0xc7/0x3e0\n[ 35.092648] xfs_vn_setattr+0x1ea/0x270\n[ 35.093437] notify_change+0x1f4/0x510\n[ 35.094219] ? do_truncate+0x97/0xe0\n[ 35.094879] do_truncate+0x97/0xe0\n[ 35.095640] path_openat+0xabd/0xca0\n[ 35.096278] do_filp_open+0xd7/0x190\n[ 35.096860] do_sys_openat2+0x8a/0xe0\n[ 35.097459] __x64_sys_openat+0x6d/0xa0\n[ 35.098076] do_syscall_64+0xbb/0x1d0\n[ 35.098647] entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[ 35.099444] RIP: 0033:0x7f9134d81fc1\n[ 35.100033] Code: 75 57 89 f0 25 00 00 41 00 3d 00 00 41 00 74 49 80 3d 2a 26 0e 00 00 74 6d 89 da 48 89 ee bf 9c ff ff ff5\n[ 35.102993] RSP: 002b:00007ffcd41e0d10 EFLAGS: 00000202 ORIG_RAX: 0000000000000101\n[ 35.104263] RAX: ffffffffffffffda RBX: 0000000000000242 RCX: 00007f9134d81fc1\n[ 35.105452] RDX: 0000000000000242 RSI: 00007ffcd41e1200 RDI: 00000000ffffff9c\n[ 35.106663] RBP: 00007ffcd41e1200 R08: 0000000000000000 R09: 0000000000000064\n[ 35.107923] R10: 00000000000001a4 R11: 0000000000000202 R12: 0000000000000066\n[ 35.109112] R13: 0000000000100000 R14: 0000000000100000 R15: 0000000000000400\n[ 35.110357] </TASK>\n[ 35.110769] irq event stamp: 8415587\n[ 35.111486] hardirqs last enabled at (8415599): [<ffffffff8d74b562>] __up_console_se\n---truncated---', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.05004 |
oraclelinux: CVE-2025-38276 was patched at 2026-02-20
455.
Denial of Service - Unknown Product (CVE-2026-2219) - Medium [232]
Description: {'nvd_cve_data_all': 'It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0 | 14 | Unknown Product | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.05728 |
debian: CVE-2026-2219 was patched at 2026-03-18
456.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2794) - Medium [228]
Description: {'nvd_cve_data_all': 'Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android. This vulnerability affects Firefox < 148.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android. This vulnerability affects Firefox < 148.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00038, EPSS Percentile is 0.11554 |
altlinux: CVE-2026-2794 was patched at 2026-03-16
debian: CVE-2026-27942 was patched at 2026-03-18
457.
Unknown Vulnerability Type - OpenSSH (CVE-2026-3497) - Medium [228]
Description: {'nvd_cve_data_all': 'Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture | |
| 0.7 | 10 | CVSS Base Score is 6.9. According to Vulners data source | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.09219 |
debian: CVE-2026-3497 was patched at 2026-03-18
ubuntu: CVE-2026-3497 was patched at 2026-03-12
458.
Path Traversal - Erlang/OTP (CVE-2026-21620) - Medium [227]
Description: Relative
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Path Traversal | |
| 0.4 | 14 | Erlang/OTP is a set of libraries for the Erlang programming language | |
| 0.2 | 10 | CVSS Base Score is 2.3. According to Vulners data source | |
| 0.1 | 10 | EPSS Probability is 0.00028, EPSS Percentile is 0.07821 |
debian: CVE-2026-21620 was patched at 2026-03-18
459.
Cross Site Scripting - Unknown Product (CVE-2026-3884) - Medium [226]
Description: {'nvd_cve_data_all': 'Versions of the package spin.js before 3.0.0 are vulnerable to Cross-site Scripting (XSS) via the spin() function that allows a creation of more than 1 alert for each 'target' element. An attacker would need to set an arbitrary key-value pair on Object.prototype through a crafted URL achieving a prototype pollution first, before being able to execute arbitrary JavaScript in the context of the user's browser.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Versions of the package spin.js before 3.0.0 are vulnerable to Cross-site Scripting (XSS) via the spin() function that allows a creation of more than 1 alert for each 'target' element. An attacker would need to set an arbitrary key-value pair on Object.prototype through a crafted URL achieving a prototype pollution first, before being able to execute arbitrary JavaScript in the context of the user's browser.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0 | 14 | Unknown Product | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.09076 |
debian: CVE-2026-3884 was patched at 2026-03-18
460.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-71227) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't WARN for connections on invalid channels It's not clear (to me) how exactly syzbot managed to hit this, but it seems conceivable that e.g. regulatory changed and has disabled a channel between scanning (channel is checked to be usable by cfg80211_get_ies_channel_number) and connecting on the channel later. With one scenario that isn't covered elsewhere described above, the warning isn't good, replace it with a (more informative) error message.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don't WARN for connections on invalid channels\n\nIt's not clear (to me) how exactly syzbot managed to hit this,\nbut it seems conceivable that e.g. regulatory changed and has\ndisabled a channel between scanning (channel is checked to be\nusable by cfg80211_get_ies_channel_number) and connecting on\nthe channel later.\n\nWith one scenario that isn't covered elsewhere described above,\nthe warning isn't good, replace it with a (more informative)\nerror message.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2025-71227 was patched at 2026-02-26
debian: CVE-2025-71227 was patched at 2026-03-18
461.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-71230) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: hfs: ensure sb->s_fs_info is always cleaned up When hfs was converted to the new mount api a bug was introduced by changing the allocation pattern of sb->s_fs_info. If setup_bdev_super() fails after a new superblock has been allocated by sget_fc(), but before hfs_fill_super() takes ownership of the filesystem-specific s_fs_info data it was leaked. Fix this by freeing sb->s_fs_info in hfs_kill_super().', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: ensure sb->s_fs_info is always cleaned up\n\nWhen hfs was converted to the new mount api a bug was introduced by\nchanging the allocation pattern of sb->s_fs_info. If setup_bdev_super()\nfails after a new superblock has been allocated by sget_fc(), but before\nhfs_fill_super() takes ownership of the filesystem-specific s_fs_info\ndata it was leaked.\n\nFix this by freeing sb->s_fs_info in hfs_kill_super().', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03035 |
altlinux: CVE-2025-71230 was patched at 2026-02-26
462.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23079) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: gpio: cdev: Fix resource leaks on errors in lineinfo_changed_notify() On error handling paths, lineinfo_changed_notify() doesn't free the allocated resources which results leaks. Fix it.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: cdev: Fix resource leaks on errors in lineinfo_changed_notify()\n\nOn error handling paths, lineinfo_changed_notify() doesn't free the\nallocated resources which results leaks. Fix it.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23079 was patched at 2026-02-26
463.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23081) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: net: phy: intel-xway: fix OF node refcount leakage Automated review spotted am OF node reference count leakage when checking if the 'leds' child node exists. Call of_put_node() to correctly maintain the refcount.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: intel-xway: fix OF node refcount leakage\n\nAutomated review spotted am OF node reference count leakage when\nchecking if the 'leds' child node exists.\n\nCall of_put_node() to correctly maintain the refcount.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23081 was patched at 2026-02-26
464.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23106) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: timekeeping: Adjust the leap state for the correct auxiliary timekeeper When __do_ajdtimex() was introduced to handle adjtimex for any timekeeper, this reference to tk_core was not updated. When called on an auxiliary timekeeper, the core timekeeper would be updated incorrectly. This gets caught by the lock debugging diagnostics because the timekeepers sequence lock gets written to without holding its associated spinlock: WARNING: include/linux/seqlock.h:226 at __do_adjtimex+0x394/0x3b0, CPU#2: test/125 aux_clock_adj (kernel/time/timekeeping.c:2979) __do_sys_clock_adjtime (kernel/time/posix-timers.c:1161 kernel/time/posix-timers.c:1173) do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1)) entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:131) Update the correct auxiliary timekeeper.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\ntimekeeping: Adjust the leap state for the correct auxiliary timekeeper\n\nWhen __do_ajdtimex() was introduced to handle adjtimex for any\ntimekeeper, this reference to tk_core was not updated. When called on an\nauxiliary timekeeper, the core timekeeper would be updated incorrectly.\n\nThis gets caught by the lock debugging diagnostics because the\ntimekeepers sequence lock gets written to without holding its\nassociated spinlock:\n\nWARNING: include/linux/seqlock.h:226 at __do_adjtimex+0x394/0x3b0, CPU#2: test/125\naux_clock_adj (kernel/time/timekeeping.c:2979)\n__do_sys_clock_adjtime (kernel/time/posix-timers.c:1161 kernel/time/posix-timers.c:1173)\ndo_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1))\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:131)\n\nUpdate the correct auxiliary timekeeper.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23106 was patched at 2026-02-26
465.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23114) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE writes on !SME systems When SVE is supported but SME is not supported, a ptrace write to the NT_ARM_SVE regset can place the tracee into an invalid state where (non-streaming) SVE register data is stored in FP_STATE_SVE format but TIF_SVE is clear. This can result in a later warning from fpsimd_restore_current_state(), e.g. WARNING: CPU: 0 PID: 7214 at arch/arm64/kernel/fpsimd.c:383 fpsimd_restore_current_state+0x50c/0x748 When this happens, fpsimd_restore_current_state() will set TIF_SVE, placing the task into the correct state. This occurs before any other check of TIF_SVE can possibly occur, as other checks of TIF_SVE only happen while the FPSIMD/SVE/SME state is live. Thus, aside from the warning, there is no functional issue. This bug was introduced during rework to error handling in commit: 9f8bf718f2923 ("arm64/fpsimd: ptrace: Gracefully handle errors") ... where the setting of TIF_SVE was moved into a block which is only executed when system_supports_sme() is true. Fix this by removing the system_supports_sme() check. This ensures that TIF_SVE is set for (SVE-formatted) writes to NT_ARM_SVE, at the cost of unconditionally manipulating the tracee's saved svcr value. The manipulation of svcr is benign and inexpensive, and we already do similar elsewhere (e.g. during signal handling), so I don't think it's worth guarding this with system_supports_sme() checks. Aside from the above, there is no functional change. The 'type' argument to sve_set_common() is only set to ARM64_VEC_SME (in ssve_set())) when system_supports_sme(), so the ARM64_VEC_SME case in the switch statement is still unreachable when !system_supports_sme(). When CONFIG_ARM64_SME=n, the only caller of sve_set_common() is sve_set(), and the compiler can constant-fold for the case where type is ARM64_VEC_SVE, removing the logic for other cases.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: ptrace: Fix SVE writes on !SME systems\n\nWhen SVE is supported but SME is not supported, a ptrace write to the\nNT_ARM_SVE regset can place the tracee into an invalid state where\n(non-streaming) SVE register data is stored in FP_STATE_SVE format but\nTIF_SVE is clear. This can result in a later warning from\nfpsimd_restore_current_state(), e.g.\n\n WARNING: CPU: 0 PID: 7214 at arch/arm64/kernel/fpsimd.c:383 fpsimd_restore_current_state+0x50c/0x748\n\nWhen this happens, fpsimd_restore_current_state() will set TIF_SVE,\nplacing the task into the correct state. This occurs before any other\ncheck of TIF_SVE can possibly occur, as other checks of TIF_SVE only\nhappen while the FPSIMD/SVE/SME state is live. Thus, aside from the\nwarning, there is no functional issue.\n\nThis bug was introduced during rework to error handling in commit:\n\n 9f8bf718f2923 ("arm64/fpsimd: ptrace: Gracefully handle errors")\n\n... where the setting of TIF_SVE was moved into a block which is only\nexecuted when system_supports_sme() is true.\n\nFix this by removing the system_supports_sme() check. This ensures that\nTIF_SVE is set for (SVE-formatted) writes to NT_ARM_SVE, at the cost of\nunconditionally manipulating the tracee's saved svcr value. The\nmanipulation of svcr is benign and inexpensive, and we already do\nsimilar elsewhere (e.g. during signal handling), so I don't think it's\nworth guarding this with system_supports_sme() checks.\n\nAside from the above, there is no functional change. The 'type' argument\nto sve_set_common() is only set to ARM64_VEC_SME (in ssve_set())) when\nsystem_supports_sme(), so the ARM64_VEC_SME case in the switch statement\nis still unreachable when !system_supports_sme(). When\nCONFIG_ARM64_SME=n, the only caller of sve_set_common() is sve_set(),\nand the compiler can constant-fold for the case where type is\nARM64_VEC_SVE, removing the logic for other cases.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23114 was patched at 2026-02-26
466.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23122) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue The previous 7 KB per queue caused TX unit hangs under heavy timestamping load. Reducing to 5 KB avoids these hangs and matches the TSN recommendation in I225/I226 SW User Manual Section 7.5.4. The 8 KB "freed" by this change is currently unused. This reduction is not expected to impact throughput, as the i226 is PCIe-limited for small TSN packets rather than TX-buffer-limited.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nigc: Reduce TSN TX packet buffer from 7KB to 5KB per queue\n\nThe previous 7 KB per queue caused TX unit hangs under heavy\ntimestamping load. Reducing to 5 KB avoids these hangs and matches\nthe TSN recommendation in I225/I226 SW User Manual Section 7.5.4.\n\nThe 8 KB "freed" by this change is currently unused. This reduction\nis not expected to impact throughput, as the i226 is PCIe-limited\nfor small TSN packets rather than TX-buffer-limited.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23122 was patched at 2026-02-26
467.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23132) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: drm/bridge: synopsys: dw-dp: fix error paths of dw_dp_bind Fix several issues in dw_dp_bind() error handling: 1. Missing return after drm_bridge_attach() failure - the function continued execution instead of returning an error. 2. Resource leak: drm_dp_aux_register() is not a devm function, so drm_dp_aux_unregister() must be called on all error paths after aux registration succeeds. This affects errors from: - drm_bridge_attach() - phy_init() - devm_add_action_or_reset() - platform_get_irq() - devm_request_threaded_irq() 3. Bug fix: platform_get_irq() returns the IRQ number or a negative error code, but the error path was returning ERR_PTR(ret) instead of ERR_PTR(dp->irq). Use a goto label for cleanup to ensure consistent error handling.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: synopsys: dw-dp: fix error paths of dw_dp_bind\n\nFix several issues in dw_dp_bind() error handling:\n\n1. Missing return after drm_bridge_attach() failure - the function\n continued execution instead of returning an error.\n\n2. Resource leak: drm_dp_aux_register() is not a devm function, so\n drm_dp_aux_unregister() must be called on all error paths after\n aux registration succeeds. This affects errors from:\n - drm_bridge_attach()\n - phy_init()\n - devm_add_action_or_reset()\n - platform_get_irq()\n - devm_request_threaded_irq()\n\n3. Bug fix: platform_get_irq() returns the IRQ number or a negative\n error code, but the error path was returning ERR_PTR(ret) instead\n of ERR_PTR(dp->irq).\n\nUse a goto label for cleanup to ensure consistent error handling.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.04231 |
altlinux: CVE-2026-23132 was patched at 2026-02-26
468.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23134) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() context check for PREEMPT_RT On PREEMPT_RT kernels, local_lock becomes a sleeping lock. The current check in kmalloc_nolock() only verifies we're not in NMI or hard IRQ context, but misses the case where preemption is disabled. When a BPF program runs from a tracepoint with preemption disabled (preempt_count > 0), kmalloc_nolock() proceeds to call local_lock_irqsave() which attempts to acquire a sleeping lock, triggering: BUG: sleeping function called from invalid context in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 6128 preempt_count: 2, expected: 0 Fix this by checking !preemptible() on PREEMPT_RT, which directly expresses the constraint that we cannot take a sleeping lock when preemption is disabled. This encompasses the previous checks for NMI and hard IRQ contexts while also catching cases where preemption is disabled.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nslab: fix kmalloc_nolock() context check for PREEMPT_RT\n\nOn PREEMPT_RT kernels, local_lock becomes a sleeping lock. The current\ncheck in kmalloc_nolock() only verifies we're not in NMI or hard IRQ\ncontext, but misses the case where preemption is disabled.\n\nWhen a BPF program runs from a tracepoint with preemption disabled\n(preempt_count > 0), kmalloc_nolock() proceeds to call\nlocal_lock_irqsave() which attempts to acquire a sleeping lock,\ntriggering:\n\n BUG: sleeping function called from invalid context\n in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 6128\n preempt_count: 2, expected: 0\n\nFix this by checking !preemptible() on PREEMPT_RT, which directly\nexpresses the constraint that we cannot take a sleeping lock when\npreemption is disabled. This encompasses the previous checks for NMI\nand hard IRQ contexts while also catching cases where preemption is\ndisabled.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23134 was patched at 2026-02-26
469.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23147) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: btrfs: zlib: fix the folio leak on S390 hardware acceleration [BUG] After commit aa60fe12b4f4 ("btrfs: zlib: refactor S390x HW acceleration buffer preparation"), we no longer release the folio of the page cache of folio returned by btrfs_compress_filemap_get_folio() for S390 hardware acceleration path. [CAUSE] Before that commit, we call kumap_local() and folio_put() after handling each folio. Although the timing is not ideal (it release previous folio at the beginning of the loop, and rely on some extra cleanup out of the loop), it at least handles the folio release correctly. Meanwhile the refactored code is easier to read, it lacks the call to release the filemap folio. [FIX] Add the missing folio_put() for copy_data_into_buffer().', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zlib: fix the folio leak on S390 hardware acceleration\n\n[BUG]\nAfter commit aa60fe12b4f4 ("btrfs: zlib: refactor S390x HW acceleration\nbuffer preparation"), we no longer release the folio of the page cache\nof folio returned by btrfs_compress_filemap_get_folio() for S390\nhardware acceleration path.\n\n[CAUSE]\nBefore that commit, we call kumap_local() and folio_put() after handling\neach folio.\n\nAlthough the timing is not ideal (it release previous folio at the\nbeginning of the loop, and rely on some extra cleanup out of the loop),\nit at least handles the folio release correctly.\n\nMeanwhile the refactored code is easier to read, it lacks the call to\nrelease the filemap folio.\n\n[FIX]\nAdd the missing folio_put() for copy_data_into_buffer().', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23147 was patched at 2026-02-26
470.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23149) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl() Since GEM bo handles are u32 in the uapi and the internal implementation uses idr_alloc() which uses int ranges, passing a new handle larger than INT_MAX trivially triggers a kernel warning: idr_alloc(): ... \tif (WARN_ON_ONCE(start < 0)) \t\treturn -EINVAL; ... Fix it by rejecting new handles above INT_MAX and at the same time make the end limit calculation more obvious by moving into int domain.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl()\n\nSince GEM bo handles are u32 in the uapi and the internal implementation\nuses idr_alloc() which uses int ranges, passing a new handle larger than\nINT_MAX trivially triggers a kernel warning:\n\nidr_alloc():\n...\n\tif (WARN_ON_ONCE(start < 0))\n\t\treturn -EINVAL;\n...\n\nFix it by rejecting new handles above INT_MAX and at the same time make\nthe end limit calculation more obvious by moving into int domain.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23149 was patched at 2026-02-26
471.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23165) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: sfc: fix deadlock in RSS config read Since cited commit, core locks the net_device's rss_lock when handling ethtool -x command, so driver's implementation should not lock it again. Remove the latter.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix deadlock in RSS config read\n\nSince cited commit, core locks the net_device's rss_lock when handling\n ethtool -x command, so driver's implementation should not lock it\n again. Remove the latter.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03027 |
altlinux: CVE-2026-23165 was patched at 2026-02-26
472.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23186) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: hwmon: (acpi_power_meter) Fix deadlocks related to acpi_power_meter_notify() The acpi_power_meter driver's .notify() callback function, acpi_power_meter_notify(), calls hwmon_device_unregister() under a lock that is also acquired by callbacks in sysfs attributes of the device being unregistered which is prone to deadlocks between sysfs access and device removal. Address this by moving the hwmon device removal in acpi_power_meter_notify() outside the lock in question, but notice that doing it alone is not sufficient because two concurrent METER_NOTIFY_CONFIG notifications may be attempting to remove the same device at the same time. To prevent that from happening, add a new lock serializing the execution of the switch () statement in acpi_power_meter_notify(). For simplicity, it is a static mutex which should not be a problem from the performance perspective. The new lock also allows the hwmon_device_register_with_info() in acpi_power_meter_notify() to be called outside the inner lock because it prevents the other notifications handled by that function from manipulating the "resource" object while the hwmon device based on it is being registered. The sending of ACPI netlink messages from acpi_power_meter_notify() is serialized by the new lock too which generally helps to ensure that the order of handling firmware notifications is the same as the order of sending netlink messages related to them. In addition, notice that hwmon_device_register_with_info() may fail in which case resource->hwmon_dev will become an error pointer, so add checks to avoid attempting to unregister the hwmon device pointer to by it in that case to acpi_power_meter_notify() and acpi_power_meter_remove().', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (acpi_power_meter) Fix deadlocks related to acpi_power_meter_notify()\n\nThe acpi_power_meter driver's .notify() callback function,\nacpi_power_meter_notify(), calls hwmon_device_unregister() under a lock\nthat is also acquired by callbacks in sysfs attributes of the device\nbeing unregistered which is prone to deadlocks between sysfs access and\ndevice removal.\n\nAddress this by moving the hwmon device removal in\nacpi_power_meter_notify() outside the lock in question, but notice\nthat doing it alone is not sufficient because two concurrent\nMETER_NOTIFY_CONFIG notifications may be attempting to remove the\nsame device at the same time. To prevent that from happening, add a\nnew lock serializing the execution of the switch () statement in\nacpi_power_meter_notify(). For simplicity, it is a static mutex\nwhich should not be a problem from the performance perspective.\n\nThe new lock also allows the hwmon_device_register_with_info()\nin acpi_power_meter_notify() to be called outside the inner lock\nbecause it prevents the other notifications handled by that function\nfrom manipulating the "resource" object while the hwmon device based\non it is being registered. The sending of ACPI netlink messages from\nacpi_power_meter_notify() is serialized by the new lock too which\ngenerally helps to ensure that the order of handling firmware\nnotifications is the same as the order of sending netlink messages\nrelated to them.\n\nIn addition, notice that hwmon_device_register_with_info() may fail\nin which case resource->hwmon_dev will become an error pointer,\nso add checks to avoid attempting to unregister the hwmon device\npointer to by it in that case to acpi_power_meter_notify() and\nacpi_power_meter_remove().', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00016, EPSS Percentile is 0.03472 |
altlinux: CVE-2026-23186 was patched at 2026-02-26
473.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23203) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this change triggered the following call trace on my BeagleBone Black board: WARNING: net/8021q/vlan_core.c:236 at vlan_for_each+0x120/0x124, CPU#0: rpcbind/496 RTNL: assertion failed at net/8021q/vlan_core.c (236) Modules linked in: CPU: 0 UID: 997 PID: 496 Comm: rpcbind Not tainted 6.19.0-rc6-next-20260122-yocto-standard+ #8 PREEMPT Hardware name: Generic AM33XX (Flattened Device Tree) Call trace: unwind_backtrace from show_stack+0x28/0x2c show_stack from dump_stack_lvl+0x30/0x38 dump_stack_lvl from __warn+0xb8/0x11c __warn from warn_slowpath_fmt+0x130/0x194 warn_slowpath_fmt from vlan_for_each+0x120/0x124 vlan_for_each from cpsw_add_mc_addr+0x54/0xd8 cpsw_add_mc_addr from __hw_addr_ref_sync_dev+0xc4/0xec __hw_addr_ref_sync_dev from __dev_mc_add+0x78/0x88 __dev_mc_add from igmp6_group_added+0x84/0xec igmp6_group_added from __ipv6_dev_mc_inc+0x1fc/0x2f0 __ipv6_dev_mc_inc from __ipv6_sock_mc_join+0x124/0x1b4 __ipv6_sock_mc_join from do_ipv6_setsockopt+0x84c/0x1168 do_ipv6_setsockopt from ipv6_setsockopt+0x88/0xc8 ipv6_setsockopt from do_sock_setsockopt+0xe8/0x19c do_sock_setsockopt from __sys_setsockopt+0x84/0xac __sys_setsockopt from ret_fast_syscall+0x0/0x5 This trace occurs because vlan_for_each() is called within cpsw_ndo_set_rx_mode(), which expects the RTNL lock to be held. Since modifying vlan_for_each() to operate without the RTNL lock is not straightforward, and because ndo_set_rx_mode() is invoked both with and without the RTNL lock across different code paths, simply adding rtnl_lock() in cpsw_ndo_set_rx_mode() is not a viable solution. To resolve this issue, we opt to execute the actual processing within a work queue, following the approach used by the icssg-prueth driver.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cpsw_new: Execute ndo_set_rx_mode callback in a work queue\n\nCommit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this\nchange triggered the following call trace on my BeagleBone Black board:\n WARNING: net/8021q/vlan_core.c:236 at vlan_for_each+0x120/0x124, CPU#0: rpcbind/496\n RTNL: assertion failed at net/8021q/vlan_core.c (236)\n Modules linked in:\n CPU: 0 UID: 997 PID: 496 Comm: rpcbind Not tainted 6.19.0-rc6-next-20260122-yocto-standard+ #8 PREEMPT\n Hardware name: Generic AM33XX (Flattened Device Tree)\n Call trace:\n unwind_backtrace from show_stack+0x28/0x2c\n show_stack from dump_stack_lvl+0x30/0x38\n dump_stack_lvl from __warn+0xb8/0x11c\n __warn from warn_slowpath_fmt+0x130/0x194\n warn_slowpath_fmt from vlan_for_each+0x120/0x124\n vlan_for_each from cpsw_add_mc_addr+0x54/0xd8\n cpsw_add_mc_addr from __hw_addr_ref_sync_dev+0xc4/0xec\n __hw_addr_ref_sync_dev from __dev_mc_add+0x78/0x88\n __dev_mc_add from igmp6_group_added+0x84/0xec\n igmp6_group_added from __ipv6_dev_mc_inc+0x1fc/0x2f0\n __ipv6_dev_mc_inc from __ipv6_sock_mc_join+0x124/0x1b4\n __ipv6_sock_mc_join from do_ipv6_setsockopt+0x84c/0x1168\n do_ipv6_setsockopt from ipv6_setsockopt+0x88/0xc8\n ipv6_setsockopt from do_sock_setsockopt+0xe8/0x19c\n do_sock_setsockopt from __sys_setsockopt+0x84/0xac\n __sys_setsockopt from ret_fast_syscall+0x0/0x5\n\nThis trace occurs because vlan_for_each() is called within\ncpsw_ndo_set_rx_mode(), which expects the RTNL lock to be held.\nSince modifying vlan_for_each() to operate without the RTNL lock is not\nstraightforward, and because ndo_set_rx_mode() is invoked both with and\nwithout the RTNL lock across different code paths, simply adding\nrtnl_lock() in cpsw_ndo_set_rx_mode() is not a viable solution.\n\nTo resolve this issue, we opt to execute the actual processing within\na work queue, following the approach used by the icssg-prueth driver.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23203 was patched at 2026-02-26
474.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23211) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: mm, swap: restore swap_space attr aviod kernel panic commit 8b47299a411a ("mm, swap: mark swap address space ro and add context debug check") made the swap address space read-only. It may lead to kernel panic if arch_prepare_to_swap returns a failure under heavy memory pressure as follows, el1_abort+0x40/0x64 el1h_64_sync_handler+0x48/0xcc el1h_64_sync+0x84/0x88 errseq_set+0x4c/0xb8 (P) __filemap_set_wb_err+0x20/0xd0 shrink_folio_list+0xc20/0x11cc evict_folios+0x1520/0x1be4 try_to_shrink_lruvec+0x27c/0x3dc shrink_one+0x9c/0x228 shrink_node+0xb3c/0xeac do_try_to_free_pages+0x170/0x4f0 try_to_free_pages+0x334/0x534 __alloc_pages_direct_reclaim+0x90/0x158 __alloc_pages_slowpath+0x334/0x588 __alloc_frozen_pages_noprof+0x224/0x2fc __folio_alloc_noprof+0x14/0x64 vma_alloc_zeroed_movable_folio+0x34/0x44 do_pte_missing+0xad4/0x1040 handle_mm_fault+0x4a4/0x790 do_page_fault+0x288/0x5f8 do_translation_fault+0x38/0x54 do_mem_abort+0x54/0xa8 Restore swap address space as not ro to avoid the panic.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nmm, swap: restore swap_space attr aviod kernel panic\n\ncommit 8b47299a411a ("mm, swap: mark swap address space ro and add context\ndebug check") made the swap address space read-only. It may lead to\nkernel panic if arch_prepare_to_swap returns a failure under heavy memory\npressure as follows,\n\nel1_abort+0x40/0x64\nel1h_64_sync_handler+0x48/0xcc\nel1h_64_sync+0x84/0x88\nerrseq_set+0x4c/0xb8 (P)\n__filemap_set_wb_err+0x20/0xd0\nshrink_folio_list+0xc20/0x11cc\nevict_folios+0x1520/0x1be4\ntry_to_shrink_lruvec+0x27c/0x3dc\nshrink_one+0x9c/0x228\nshrink_node+0xb3c/0xeac\ndo_try_to_free_pages+0x170/0x4f0\ntry_to_free_pages+0x334/0x534\n__alloc_pages_direct_reclaim+0x90/0x158\n__alloc_pages_slowpath+0x334/0x588\n__alloc_frozen_pages_noprof+0x224/0x2fc\n__folio_alloc_noprof+0x14/0x64\nvma_alloc_zeroed_movable_folio+0x34/0x44\ndo_pte_missing+0xad4/0x1040\nhandle_mm_fault+0x4a4/0x790\ndo_page_fault+0x288/0x5f8\ndo_translation_fault+0x38/0x54\ndo_mem_abort+0x54/0xa8\n\nRestore swap address space as not ro to avoid the panic.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0389 |
altlinux: CVE-2026-23211 was patched at 2026-02-26
475.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23217) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: riscv: trace: fix snapshot deadlock with sbi ecall If sbi_ecall.c's functions are traceable, echo "__sbi_ecall:snapshot" > /sys/kernel/tracing/set_ftrace_filter may get the kernel into a deadlock. (Functions in sbi_ecall.c are excluded from tracing if CONFIG_RISCV_ALTERNATIVE_EARLY is set.) __sbi_ecall triggers a snapshot of the ringbuffer. The snapshot code raises an IPI interrupt, which results in another call to __sbi_ecall and another snapshot... All it takes to get into this endless loop is one initial __sbi_ecall. On RISC-V systems without SSTC extension, the clock events in timer-riscv.c issue periodic sbi ecalls, making the problem easy to trigger. Always exclude the sbi_ecall.c functions from tracing to fix the potential deadlock. sbi ecalls can easiliy be logged via trace events, excluding ecall functions from function tracing is not a big limitation.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: trace: fix snapshot deadlock with sbi ecall\n\nIf sbi_ecall.c's functions are traceable,\n\necho "__sbi_ecall:snapshot" > /sys/kernel/tracing/set_ftrace_filter\n\nmay get the kernel into a deadlock.\n\n(Functions in sbi_ecall.c are excluded from tracing if\nCONFIG_RISCV_ALTERNATIVE_EARLY is set.)\n\n__sbi_ecall triggers a snapshot of the ringbuffer. The snapshot code\nraises an IPI interrupt, which results in another call to __sbi_ecall\nand another snapshot...\n\nAll it takes to get into this endless loop is one initial __sbi_ecall.\nOn RISC-V systems without SSTC extension, the clock events in\ntimer-riscv.c issue periodic sbi ecalls, making the problem easy to\ntrigger.\n\nAlways exclude the sbi_ecall.c functions from tracing to fix the\npotential deadlock.\n\nsbi ecalls can easiliy be logged via trace events, excluding ecall\nfunctions from function tracing is not a big limitation.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03027 |
altlinux: CVE-2026-23217 was patched at 2026-02-26
debian: CVE-2026-23217 was patched at 2026-03-18
476.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23236) - Medium [221]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: fbdev: smscufx: properly copy ioctl memory to kernelspace The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from userspace to kernelspace, and instead directly references the memory, which can cause problems if invalid data is passed from userspace. Fix this all up by correctly copying the memory before accessing it within the kernel.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: smscufx: properly copy ioctl memory to kernelspace\n\nThe UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from\nuserspace to kernelspace, and instead directly references the memory,\nwhich can cause problems if invalid data is passed from userspace. Fix\nthis all up by correctly copying the memory before accessing it within\nthe kernel.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 8e-05, EPSS Percentile is 0.00753 |
altlinux: CVE-2026-23236 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2026-23236 was patched at 2026-03-12, 2026-03-18
oraclelinux: CVE-2026-23236 was patched at 2026-03-20
477.
Memory Corruption - Unknown Product (CVE-2026-29063) - Medium [220]
Description: {'nvd_cve_data_all': 'Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, and 5.1.5, Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. This issue has been patched in versions 3.8.3, 4.3.7, and 5.1.5.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, and 5.1.5, Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. This issue has been patched in versions 3.8.3, 4.3.7, and 5.1.5.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0 | 14 | Unknown Product | |
| 0.9 | 10 | CVSS Base Score is 8.7. According to Vulners data source | |
| 0.2 | 10 | EPSS Probability is 0.0006, EPSS Percentile is 0.1879 |
debian: CVE-2026-29063 was patched at 2026-03-18
478.
Memory Corruption - vim (CVE-2026-28420) - Medium [220]
Description: Vim is an open source, command line text editor. Prior to version 9.2.0076, a heap-based
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
| 0.4 | 10 | CVSS Base Score is 4.4. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00212 |
debian: CVE-2026-28420 was patched at 2026-03-18
ubuntu: CVE-2026-28420 was patched at 2026-03-16
479.
Information Disclosure - Unknown Product (CVE-2026-2297) - Medium [219]
Description: {'nvd_cve_data_all': 'The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers for this audit event therefore do not fire.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers for this audit event therefore do not fire.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.83 | 15 | Information Disclosure | |
| 0 | 14 | Unknown Product | |
| 0.6 | 10 | CVSS Base Score is 5.7. According to Vulners data source | |
| 0.0 | 10 | EPSS Probability is 0.00016, EPSS Percentile is 0.03388 |
debian: CVE-2026-2297 was patched at 2026-03-18
480.
Unknown Vulnerability Type - ImageMagick (CVE-2026-28691) - Medium [219]
Description: {'nvd_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.17343 |
debian: CVE-2026-28691 was patched at 2026-03-18, 2026-03-19
481.
Memory Corruption - GPAC (CVE-2026-4015) - Medium [215]
Description: A weakness has been identified in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.4 | 14 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.0268 |
debian: CVE-2026-4015 was patched at 2026-03-18
482.
Memory Corruption - GPAC (CVE-2026-4016) - Medium [215]
Description: A security vulnerability has been detected in
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.4 | 14 | GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity) | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.0268 |
debian: CVE-2026-4016 was patched at 2026-03-18
483.
Cross Site Scripting - Unknown Product (CVE-2026-27142) - Medium [214]
Description: {'nvd_cve_data_all': 'Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.8 | 15 | Cross Site Scripting | |
| 0 | 14 | Unknown Product | |
| 0.6 | 10 | CVSS Base Score is 6.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00011, EPSS Percentile is 0.01267 |
altlinux: CVE-2026-27142 was patched at 2026-03-10, 2026-03-23
debian: CVE-2026-27142 was patched at 2026-03-18
484.
Unknown Vulnerability Type - compress::raw::zlib (CVE-2026-3381) - Medium [214]
Description: {'nvd_cve_data_all': 'Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib. Compress::Raw::Zlib includes a copy of the zlib library. Compress::Raw::Zlib version 2.220 includes zlib 1.3.2, which addresses findings fron the 7ASecurity audit of zlib. The includes fixs for CVE-2026-27171.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib.\n\nCompress::Raw::Zlib includes a copy of the zlib library. Compress::Raw::Zlib version 2.220 includes zlib 1.3.2, which addresses findings fron the 7ASecurity audit of zlib. The includes fixs for CVE-2026-27171.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:pmqs:compress | |
| 1.0 | 10 | CVSS Base Score is 9.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.09402 |
debian: CVE-2026-3381 was patched at 2026-03-18
485.
Unknown Vulnerability Type - undici (CVE-2026-1528) - Medium [214]
Description: {'nvd_cve_data_all': 'ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process.\n\nPatches\n\nPatched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:nodejs:undici (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00128, EPSS Percentile is 0.32218 |
debian: CVE-2026-1528 was patched at 2026-03-18
486.
Unknown Vulnerability Type - Kubernetes (CVE-2026-2808) - Medium [211]
Description: {'nvd_cve_data_all': 'HashiCorp Consul and Consul Enterprise 1.18.20 up to 1.21.10 and 1.22.4 are vulnerable to arbitrary file read when configured with Kubernetes authentication. This vulnerability, CVE-2026-2808, is fixed in Consul 1.18.21, 1.21.11 and 1.22.5.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'HashiCorp Consul and Consul Enterprise 1.18.20 up to 1.21.10 and 1.22.4 are vulnerable to arbitrary file read when configured with Kubernetes authentication. This vulnerability, CVE-2026-2808, is fixed in Consul 1.18.21, 1.21.11 and 1.22.5.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.7 | 14 | Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management | |
| 0.7 | 10 | CVSS Base Score is 6.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.0594 |
debian: CVE-2026-2808 was patched at 2026-03-18
487.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23212) - Medium [209]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: bonding: annotate data-races around slave->last_rx slave->last_rx and slave->target_last_arp_rx[...] can be read and written locklessly. Add READ_ONCE() and WRITE_ONCE() annotations. syzbot reported: BUG: KCSAN: data-race in bond_rcv_validate / bond_rcv_validate write to 0xffff888149f0d428 of 8 bytes by interrupt on cpu 1: bond_rcv_validate+0x202/0x7a0 drivers/net/bonding/bond_main.c:3335 bond_handle_frame+0xde/0x5e0 drivers/net/bonding/bond_main.c:1533 __netif_receive_skb_core+0x5b1/0x1950 net/core/dev.c:6039 __netif_receive_skb_one_core net/core/dev.c:6150 [inline] __netif_receive_skb+0x59/0x270 net/core/dev.c:6265 netif_receive_skb_internal net/core/dev.c:6351 [inline] netif_receive_skb+0x4b/0x2d0 net/core/dev.c:6410 ... write to 0xffff888149f0d428 of 8 bytes by interrupt on cpu 0: bond_rcv_validate+0x202/0x7a0 drivers/net/bonding/bond_main.c:3335 bond_handle_frame+0xde/0x5e0 drivers/net/bonding/bond_main.c:1533 __netif_receive_skb_core+0x5b1/0x1950 net/core/dev.c:6039 __netif_receive_skb_one_core net/core/dev.c:6150 [inline] __netif_receive_skb+0x59/0x270 net/core/dev.c:6265 netif_receive_skb_internal net/core/dev.c:6351 [inline] netif_receive_skb+0x4b/0x2d0 net/core/dev.c:6410 br_netif_receive_skb net/bridge/br_input.c:30 [inline] NF_HOOK include/linux/netfilter.h:318 [inline] ... value changed: 0x0000000100005365 -> 0x0000000100005366', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: annotate data-races around slave->last_rx\n\nslave->last_rx and slave->target_last_arp_rx[...] can be read and written\nlocklessly. Add READ_ONCE() and WRITE_ONCE() annotations.\n\nsyzbot reported:\n\nBUG: KCSAN: data-race in bond_rcv_validate / bond_rcv_validate\n\nwrite to 0xffff888149f0d428 of 8 bytes by interrupt on cpu 1:\n bond_rcv_validate+0x202/0x7a0 drivers/net/bonding/bond_main.c:3335\n bond_handle_frame+0xde/0x5e0 drivers/net/bonding/bond_main.c:1533\n __netif_receive_skb_core+0x5b1/0x1950 net/core/dev.c:6039\n __netif_receive_skb_one_core net/core/dev.c:6150 [inline]\n __netif_receive_skb+0x59/0x270 net/core/dev.c:6265\n netif_receive_skb_internal net/core/dev.c:6351 [inline]\n netif_receive_skb+0x4b/0x2d0 net/core/dev.c:6410\n...\n\nwrite to 0xffff888149f0d428 of 8 bytes by interrupt on cpu 0:\n bond_rcv_validate+0x202/0x7a0 drivers/net/bonding/bond_main.c:3335\n bond_handle_frame+0xde/0x5e0 drivers/net/bonding/bond_main.c:1533\n __netif_receive_skb_core+0x5b1/0x1950 net/core/dev.c:6039\n __netif_receive_skb_one_core net/core/dev.c:6150 [inline]\n __netif_receive_skb+0x59/0x270 net/core/dev.c:6265\n netif_receive_skb_internal net/core/dev.c:6351 [inline]\n netif_receive_skb+0x4b/0x2d0 net/core/dev.c:6410\n br_netif_receive_skb net/bridge/br_input.c:30 [inline]\n NF_HOOK include/linux/netfilter.h:318 [inline]\n...\n\nvalue changed: 0x0000000100005365 -> 0x0000000100005366', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.5 | 10 | CVSS Base Score is 4.7. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02365 |
altlinux: CVE-2026-23212 was patched at 2026-02-20, 2026-02-26, 2026-02-28, 2026-03-06, 2026-03-09
debian: CVE-2026-23212 was patched at 2026-03-18
oraclelinux: CVE-2026-23212 was patched at 2026-03-20
488.
Denial of Service - Unknown Product (CVE-2026-23555) - Medium [208]
Description: {'nvd_cve_data_all': 'Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path. Note that the crash is forced via a failing assert() statement in xenstored. In case xenstored is being built with NDEBUG #defined, an unprivileged guest trying to access the node path "/local/domain/" will result in it no longer being serviced by xenstored, other guests (including dom0) will still be serviced, but xenstored will use up all cpu time it can get.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Any guest issuing a Xenstore command accessing a node using the\n(illegal) node path "/local/domain/", will crash xenstored due to a\nclobbered error indicator in xenstored when verifying the node path.\n\nNote that the crash is forced via a failing assert() statement in\nxenstored. In case xenstored is being built with NDEBUG #defined,\nan unprivileged guest trying to access the node path "/local/domain/"\nwill result in it no longer being serviced by xenstored, other guests\n(including dom0) will still be serviced, but xenstored will use up\nall cpu time it can get.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0 | 14 | Unknown Product | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.0334 |
debian: CVE-2026-23555 was patched at 2026-03-18
489.
Incorrect Calculation - Unknown Product (CVE-2025-34297) - Medium [208]
Description: {'nvd_cve_data_all': 'KissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'KissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0 | 14 | Unknown Product | |
| 0.9 | 10 | CVSS Base Score is 8.6. According to Vulners data source | |
| 0.1 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.05059 |
debian: CVE-2025-34297 was patched at 2026-03-18
490.
Incorrect Calculation - Unknown Product (CVE-2026-3172) - Medium [208]
Description: {'nvd_cve_data_all': 'Buffer overflow in parallel HNSW index build in pgvector 0.6.0 through 0.8.1 allows a database user to leak sensitive data from other relations or crash the database server.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Buffer overflow in parallel HNSW index build in pgvector 0.6.0 through 0.8.1 allows a database user to leak sensitive data from other relations or crash the database server.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0 | 14 | Unknown Product | |
| 0.8 | 10 | CVSS Base Score is 8.1. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00055, EPSS Percentile is 0.17126 |
altlinux: CVE-2026-3172 was patched at 2026-03-02, 2026-03-03
debian: CVE-2026-3172 was patched at 2026-03-18
491.
Security Feature Bypass - Unknown Product (CVE-2026-3706) - Medium [208]
Description: {'nvd_cve_data_all': 'A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: "Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn't exist for SSH implementation, but rather it's against the internal API."', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: "Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn't exist for SSH implementation, but rather it's against the internal API."', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.9 | 15 | Security Feature Bypass | |
| 0 | 14 | Unknown Product | |
| 0.4 | 10 | CVSS Base Score is 3.7. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00933 |
debian: CVE-2026-3706 was patched at 2026-03-18
492.
Unknown Vulnerability Type - ImageMagick (CVE-2026-25988) - Medium [207]
Description: {'nvd_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks. Versions 7.1.2-15 and 6.9.13-40 contain a patch.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks. Versions 7.1.2-15 and 6.9.13-40 contain a patch.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00024, EPSS Percentile is 0.06518 |
altlinux: CVE-2026-25988 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25988 was patched at 2026-03-09, 2026-03-10, 2026-03-18
493.
Unknown Vulnerability Type - GNU C Library (CVE-2026-3904) - Medium [204]
Description: {'nvd_cve_data_all': 'Calling NSS-backed functions that support caching via nscd may call the nscd client side code and in the GNU C Library version 2.36 under high load on x86_64 systems, the client may call memcmp on inputs that are concurrently modified by other processes or threads and crash. The nscd client in the GNU C Library uses the memcmp function with inputs that may be concurrently modified by another thread, potentially resulting in spurious cache misses, which in itself is not a security issue. However in the GNU C Library version 2.36 an optimized implementation of memcmp was introduced for x86_64 which could crash when invoked with such undefined behaviour, turning this into a potential crash of the nscd client and the application that uses it. This implementation was backported to the 2.35 branch, making the nscd client in that branch vulnerable as well. Subsequently, the fix for this issue was backported to all vulnerable branches in the GNU C Library repository. It is advised that distributions that may have cherry-picked the memcpy SSE2 optimization in their copy of the GNU C Library, also apply the fix to avoid the potential crash in the nscd client.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Calling NSS-backed functions that support caching via nscd may call the \nnscd client side code and in the GNU C Library version 2.36 under high \nload on x86_64 systems, the client may call memcmp on inputs that are \nconcurrently modified by other processes or threads and crash.\n\n\n\n\nThe nscd client in the GNU C Library uses the memcmp function with \ninputs that may be concurrently modified by another thread, potentially \nresulting in spurious cache misses, which in itself is not a security \nissue.\xa0 However in the GNU C Library version 2.36 an optimized \nimplementation of memcmp was introduced for x86_64 which could crash \nwhen invoked with such undefined behaviour, turning this into a \npotential crash of the nscd client and the application that uses it. \nThis implementation was backported to the 2.35 branch, making the nscd \nclient in that branch vulnerable as well.\xa0 Subsequently, the fix for \nthis issue was backported to all vulnerable branches in the GNU C \nLibrary repository.\n\n\nIt is advised that distributions that may have cherry-picked the memcpy \nSSE2 optimization in their copy of the GNU C Library, also apply the fix \nto avoid the potential crash in the nscd client.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library | |
| 0.6 | 10 | CVSS Base Score is 6.2. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02547 |
debian: CVE-2026-3904 was patched at 2026-03-18
494.
Unknown Vulnerability Type - Keycloak (CVE-2026-0707) - Medium [204]
Description: {'nvd_cve_data_all': 'A flaw was found in Keycloak. The Keycloak Authorization header parser is overly permissive regarding the formatting of the "Bearer" authentication scheme. It accepts non-standard characters (such as tabs) as separators and tolerates case variations that deviate from RFC 6750 specifications.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in Keycloak. The Keycloak Authorization header parser is overly permissive regarding the formatting of the "Bearer" authentication scheme. It accepts non-standard characters (such as tabs) as separators and tolerates case variations that deviate from RFC 6750 specifications.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00029, EPSS Percentile is 0.08214 |
altlinux: CVE-2026-0707 was patched at 2026-03-10, 2026-03-23
495.
Unknown Vulnerability Type - OpenSSL (CVE-2026-27448) - Medium [204]
Description: {'nvd_cve_data_all': 'pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 0.14.0 and prior to version 26.0.0, if a user provided callback to `set_tlsext_servername_callback` raised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it. Starting in version 26.0.0, unhandled exceptions now result in rejecting the connection.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 0.14.0 and prior to version 26.0.0, if a user provided callback to `set_tlsext_servername_callback` raised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it. Starting in version 26.0.0, unhandled exceptions now result in rejecting the connection.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00038, EPSS Percentile is 0.11339 |
debian: CVE-2026-27448 was patched at 2026-03-18
496.
Unknown Vulnerability Type - Django (CVE-2026-25674) - Low [197]
Description: {'nvd_cve_data_all': 'An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. Race condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary `umask` change affects other threads in multi-threaded environments. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.\nRace condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary `umask` change affects other threads in multi-threaded environments.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Tarek Nakkouch for reporting this issue.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | Django is a high-level Python web framework that encourages rapid development and clean, pragmatic design. It provides built-in tools for database models, authentication, URL routing, templates, and security features, making it one of the most widely used frameworks for building scalable and maintainable web applications. | |
| 0.4 | 10 | CVSS Base Score is 3.7. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.0001, EPSS Percentile is 0.01111 |
debian: CVE-2026-25674 was patched at 2026-03-18
497.
Unknown Vulnerability Type - GNU Inetutils (CVE-2026-32772) - Low [197]
Description: {'nvd_cve_data_all': 'telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clients via NEW_ENVIRON SEND USERVAR.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clients via NEW_ENVIRON SEND USERVAR.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | GNU Inetutils is a collection of common network utilities for GNU/Linux systems. | |
| 0.3 | 10 | CVSS Base Score is 3.4. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0003, EPSS Percentile is 0.08508 |
debian: CVE-2026-32772 was patched at 2026-03-18
498.
Denial of Service - Unknown Product (CVE-2026-2739) - Low [196]
Description: {'nvd_cve_data_all': 'This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0 | 14 | Unknown Product | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.05714 |
debian: CVE-2026-2739 was patched at 2026-03-18
499.
Memory Corruption - vim (CVE-2026-28422) - Low [196]
Description: Vim is an open source, command line text editor. Prior to version 9.2.0078, a
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
| 0.2 | 10 | CVSS Base Score is 2.2. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00212 |
debian: CVE-2026-28422 was patched at 2026-03-18
ubuntu: CVE-2026-28422 was patched at 2026-03-16
500.
Path Traversal - Unknown Product (CVE-2026-21991) - Low [196]
Description: {'nvd_cve_data_all': 'A DTrace component, dtprobed, allows arbitrary file creation through crafted USDT provider names.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A DTrace component, dtprobed, allows arbitrary file creation through crafted USDT provider names.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Path Traversal | |
| 0 | 14 | Unknown Product | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 6e-05, EPSS Percentile is 0.00313 |
oraclelinux: CVE-2026-21991 was patched at 2026-03-13
501.
Path Traversal - Unknown Product (CVE-2026-23942) - Low [196]
Description: {'nvd_cve_data_all': 'Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:is_within_root/2. The SFTP server uses string prefix matching via lists:prefix/2 rather than proper path component validation when checking if a path is within the configured root directory. This allows authenticated users to access sibling directories that share a common name prefix with the configured root directory. For example, if root is set to /home/user1, paths like /home/user10 or /home/user1_backup would incorrectly be considered within the root. This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal.\n\nThis vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:is_within_root/2.\n\nThe SFTP server uses string prefix matching via lists:prefix/2 rather than proper path component validation when checking if a path is within the configured root directory. This allows authenticated users to access sibling directories that share a common name prefix with the configured root directory. For example, if root is set to /home/user1, paths like /home/user10 or /home/user1_backup would incorrectly be considered within the root.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Path Traversal | |
| 0 | 14 | Unknown Product | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to Vulners data source | |
| 0.1 | 10 | EPSS Probability is 0.0002, EPSS Percentile is 0.05456 |
debian: CVE-2026-23942 was patched at 2026-03-18
502.
Unknown Vulnerability Type - ImageMagick (CVE-2026-30929) - Low [195]
Description: {'nvd_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.0272 |
debian: CVE-2026-30929 was patched at 2026-03-18, 2026-03-19
503.
Unknown Vulnerability Type - Keycloak (CVE-2026-2733) - Low [192]
Description: {'nvd_cve_data_all': 'A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.4 | 10 | CVSS Base Score is 3.8. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00042, EPSS Percentile is 0.12859 |
altlinux: CVE-2026-2733 was patched at 2026-03-10, 2026-03-23
504.
Unknown Vulnerability Type - Mozilla Firefox (CVE-2026-2802) - Low [192]
Description: {'nvd_cve_data_all': 'Race condition in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Race condition in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation | |
| 0.4 | 10 | CVSS Base Score is 4.2. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.08807 |
altlinux: CVE-2026-2802 was patched at 2026-03-16
505.
Unknown Vulnerability Type - Zabbix (CVE-2026-23925) - Low [192]
Description: {'nvd_cve_data_all': 'An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts. Note that the User role is normally not sufficient to create and edit templates/hosts even with write permissions.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts. Note that the User role is normally not sufficient to create and edit templates/hosts even with write permissions.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Zabbix is an open-source software tool to monitor IT infrastructure such as networks, servers, virtual machines, and cloud services | |
| 0.5 | 10 | CVSS Base Score is 5.1. According to Vulners data source | |
| 0.0 | 10 | EPSS Probability is 0.00012, EPSS Percentile is 0.01579 |
altlinux: CVE-2026-23925 was patched at 2026-03-20, 2026-03-24
debian: CVE-2026-23925 was patched at 2026-03-18
506.
Unknown Vulnerability Type - Command Line Interface (CVE-2025-15558) - Low [190]
Description: {'nvd_cve_data_all': 'Docker CLI for Windows searches for plugin binaries in C:\\ProgramData\\Docker\\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, and allow privilege-escalation if the docker CLI is executed as a privileged user. This issue affects Docker CLI: through 29.1.5 and Windows binaries acting as a CLI-plugin manager using the github.com/docker/cli/cli-plugins/manager https://pkg.go.dev/github.com/docker/cli@v29.1.5+incompatible/cli-plugins/manager package, such as Docker Compose. This issue does not impact non-Windows binaries, and projects not using the plugin-manager code.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Docker CLI for Windows searches for plugin binaries in C:\\ProgramData\\Docker\\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, and allow privilege-escalation if the docker\xa0CLI is executed as a privileged user.\n\nThis issue affects Docker CLI: through 29.1.5 and Windows binaries acting as a CLI-plugin manager using the github.com/docker/cli/cli-plugins/manager https://pkg.go.dev/github.com/docker/cli@v29.1.5+incompatible/cli-plugins/manager \xa0package, such as Docker Compose.\n\nThis issue does not impact non-Windows binaries, and projects not using the plugin-manager code.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:docker:command_line_interface (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 8.0. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0002, EPSS Percentile is 0.05241 |
altlinux: CVE-2025-15558 was patched at 2026-02-19
507.
Unknown Vulnerability Type - capnproto (CVE-2026-32240) - Low [190]
Description: {'nvd_cve_data_all': 'Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:capnproto:capnproto (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00077, EPSS Percentile is 0.23024 |
debian: CVE-2026-32240 was patched at 2026-03-18
508.
Unknown Vulnerability Type - net::cidr (CVE-2021-4456) - Low [190]
Description: {'nvd_cve_data_all': 'Net::CIDR versions before 0.24 for Perl mishandle leading zeros in IP CIDR addresses, which may have unspecified impact. The functions `addr2cidr` and `cidrlookup` may return leading zeros in a CIDR string, which may in turn be parsed as octal numbers by subsequent users. In some cases an attacker may be able to leverage this to bypass access controls based on IP addresses. The documentation advises validating untrusted CIDR strings with the `cidrvalidate` function. However, this mitigation is optional and not enforced by default. In practice, users may call `addr2cidr` or `cidrlookup` with untrusted input and without validation, incorrectly assuming that this is safe.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Net::CIDR versions before 0.24 for Perl mishandle leading zeros in IP CIDR addresses, which may have unspecified impact.\n\nThe functions `addr2cidr` and `cidrlookup` may return leading zeros in a CIDR string, which may in turn be parsed as octal numbers by subsequent users. In some cases an attacker may be able to leverage this to bypass access controls based on IP addresses.\n\nThe documentation advises validating untrusted CIDR strings with the `cidrvalidate` function. However, this mitigation is optional and not enforced by default. In practice, users may call `addr2cidr` or `cidrlookup` with untrusted input and without validation, incorrectly assuming that this is safe.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:mrsam:net | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.2 | 10 | EPSS Probability is 0.00085, EPSS Percentile is 0.24786 |
debian: CVE-2021-4456 was patched at 2026-03-18
ubuntu: CVE-2021-4456 was patched at 2026-03-18
509.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68299) - Low [185]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: afs: Fix delayed allocation of a cell's anonymous key The allocation of a cell's anonymous key is done in a background thread along with other cell setup such as doing a DNS upcall. In the reported bug, this is triggered by afs_parse_source() parsing the device name given to mount() and calling afs_lookup_cell() with the name of the cell. The normal key lookup then tries to use the key description on the anonymous authentication key as the reference for request_key() - but it may not yet be set and so an oops can happen. This has been made more likely to happen by the fix for dynamic lookup failure. Fix this by firstly allocating a reference name and attaching it to the afs_cell record when the record is created. It can share the memory allocation with the cell name (unfortunately it can't just overlap the cell name by prepending it with "afs@" as the cell name already has a '.' prepended for other purposes). This reference name is then passed to request_key(). Secondly, the anon key is now allocated on demand at the point a key is requested in afs_request_key() if it is not already allocated. A mutex is used to prevent multiple allocation for a cell. Thirdly, make afs_request_key_rcu() return NULL if the anonymous key isn't yet allocated (if we need it) and then the caller can return -ECHILD to drop out of RCU-mode and afs_request_key() can be called. Note that the anonymous key is kind of necessary to make the key lookup cache work as that doesn't currently cache a negative lookup, but it's probably worth some investigation to see if NULL can be used instead.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Fix delayed allocation of a cell's anonymous key\n\nThe allocation of a cell's anonymous key is done in a background thread\nalong with other cell setup such as doing a DNS upcall. In the reported\nbug, this is triggered by afs_parse_source() parsing the device name given\nto mount() and calling afs_lookup_cell() with the name of the cell.\n\nThe normal key lookup then tries to use the key description on the\nanonymous authentication key as the reference for request_key() - but it\nmay not yet be set and so an oops can happen.\n\nThis has been made more likely to happen by the fix for dynamic lookup\nfailure.\n\nFix this by firstly allocating a reference name and attaching it to the\nafs_cell record when the record is created. It can share the memory\nallocation with the cell name (unfortunately it can't just overlap the cell\nname by prepending it with "afs@" as the cell name already has a '.'\nprepended for other purposes). This reference name is then passed to\nrequest_key().\n\nSecondly, the anon key is now allocated on demand at the point a key is\nrequested in afs_request_key() if it is not already allocated. A mutex is\nused to prevent multiple allocation for a cell.\n\nThirdly, make afs_request_key_rcu() return NULL if the anonymous key isn't\nyet allocated (if we need it) and then the caller can return -ECHILD to\ndrop out of RCU-mode and afs_request_key() can be called.\n\nNote that the anonymous key is kind of necessary to make the key lookup\ncache work as that doesn't currently cache a negative lookup, but it's\nprobably worth some investigation to see if NULL can be used instead.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.3 | 10 | EPSS Probability is 0.00103, EPSS Percentile is 0.28312 |
ubuntu: CVE-2025-68299 was patched at 2026-03-16, 2026-03-17
510.
Denial of Service - Unknown Product (CVE-2025-71264) - Low [184]
Description: {'nvd_cve_data_all': 'Mumble before 1.6.870 is prone to an out-of-bounds array access, which may result in denial of service (client crash).', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Mumble before 1.6.870 is prone to an out-of-bounds array access, which may result in denial of service (client crash).', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.7 | 15 | Denial of Service | |
| 0 | 14 | Unknown Product | |
| 0.4 | 10 | CVSS Base Score is 3.7. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00048, EPSS Percentile is 0.1494 |
debian: CVE-2025-71264 was patched at 2026-03-18
511.
Unknown Vulnerability Type - ImageMagick (CVE-2026-28686) - Low [183]
Description: {'nvd_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.7 | 10 | CVSS Base Score is 6.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.04105 |
debian: CVE-2026-28686 was patched at 2026-03-18, 2026-03-19
512.
Unknown Vulnerability Type - ImageMagick (CVE-2026-32259) - Low [183]
Description: {'nvd_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, when a memory allocation fails in the sixel encoder it would be possible to write past the end of a buffer on the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, when a memory allocation fails in the sixel encoder it would be possible to write past the end of a buffer on the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.7 | 10 | CVSS Base Score is 6.7. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.04105 |
debian: CVE-2026-32259 was patched at 2026-03-18, 2026-03-19
513.
Unknown Vulnerability Type - SPIP (CVE-2025-71242) - Low [178]
Description: {'nvd_cve_data_all': 'SPIP before 4.3.6, 4.2.17, and 4.1.20 allows unauthorized content disclosure in the private area. The application does not properly check authorization when displaying content of articles and sections (rubriques) in AJAX-loaded fragments, allowing an authenticated attacker to access restricted content. This vulnerability is not mitigated by the SPIP security screen.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'SPIP before 4.3.6, 4.2.17, and 4.1.20 allows unauthorized content disclosure in the private area. The application does not properly check authorization when displaying content of articles and sections (rubriques) in AJAX-loaded fragments, allowing an authenticated attacker to access restricted content. This vulnerability is not mitigated by the SPIP security screen.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00034, EPSS Percentile is 0.10036 |
debian: CVE-2025-71242 was patched at 2026-03-18
514.
Unknown Vulnerability Type - Traefik (CVE-2026-29054) - Low [178]
Description: {'nvd_cve_data_all': 'Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11.37 and from version 3.1.3 to 3.6.8, there is a potential vulnerability in Traefik managing the Connection header with X-Forwarded headers. When Traefik processes HTTP/1.1 requests, the protection put in place to prevent the removal of Traefik-managed X-Forwarded headers (such as X-Real-Ip, X-Forwarded-Host, X-Forwarded-Port, etc.) via the Connection header does not handle case sensitivity correctly. The Connection tokens are compared case-sensitively against the protected header names, but the actual header deletion operates case-insensitively. As a result, a remote unauthenticated client can use lowercase Connection tokens (e.g. Connection: x-real-ip) to bypass the protection and trigger the removal of Traefik-managed forwarded identity headers. This issue has been patched in versions 2.11.38 and 3.6.9.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11.37 and from version 3.1.3 to 3.6.8, there is a potential vulnerability in Traefik managing the Connection header with X-Forwarded headers. When Traefik processes HTTP/1.1 requests, the protection put in place to prevent the removal of Traefik-managed X-Forwarded headers (such as X-Real-Ip, X-Forwarded-Host, X-Forwarded-Port, etc.) via the Connection header does not handle case sensitivity correctly. The Connection tokens are compared case-sensitively against the protected header names, but the actual header deletion operates case-insensitively. As a result, a remote unauthenticated client can use lowercase Connection tokens (e.g. Connection: x-real-ip) to bypass the protection and trigger the removal of Traefik-managed forwarded identity headers. This issue has been patched in versions 2.11.38 and 3.6.9.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:traefik:traefik (exists in CPE dict) | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.01927 |
altlinux: CVE-2026-29054 was patched at 2026-03-06, 2026-03-10
515.
Unknown Vulnerability Type - ZooKeeper (CVE-2026-24308) - Low [178]
Description: {'nvd_cve_data_all': 'Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering potential production systems affected by the issue. Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering potential production systems affected by the issue.\xa0Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:apache:zookeeper (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00021, EPSS Percentile is 0.05474 |
debian: CVE-2026-24308 was patched at 2026-03-18
516.
Unknown Vulnerability Type - valkey (CVE-2025-67733) - Low [178]
Description: {'nvd_cve_data_all': 'Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:lfprojects:valkey (does NOT exist in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 7.1. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.0002, EPSS Percentile is 0.05141 |
almalinux: CVE-2025-67733 was patched at 2026-02-26, 2026-03-02
debian: CVE-2025-67733 was patched at 2026-03-18
oraclelinux: CVE-2025-67733 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2025-67733 was patched at 2026-03-02
ubuntu: CVE-2025-67733 was patched at 2026-03-18
517.
Incorrect Calculation - Unknown Product (CVE-2026-32775) - Low [172]
Description: {'nvd_cve_data_all': 'libexif through 0.6.25 has a flaw in decoding MakerNotes. If the exif_mnote_data_get_value function gets passed in a 0 size, the passed in-buffer would be overwritten due to an integer underflow.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'libexif through 0.6.25 has a flaw in decoding MakerNotes. If the exif_mnote_data_get_value function gets passed in a 0 size, the passed in-buffer would be overwritten due to an integer underflow.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Incorrect Calculation | |
| 0 | 14 | Unknown Product | |
| 0.7 | 10 | CVSS Base Score is 7.4. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.0412 |
debian: CVE-2026-32775 was patched at 2026-03-18
518.
Unknown Vulnerability Type - ImageMagick (CVE-2026-25576) - Low [171]
Description: {'nvd_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in multiple raw image format handles. The vulnerability occurs when processing images with -extract dimensions larger than -size dimensions, causing out-of-bounds memory reads from a heap-allocated buffer. Versions 7.1.2-15 and 6.9.13-40 contain a patch.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in multiple raw image format handles. The vulnerability occurs when processing images with -extract dimensions larger than -size dimensions, causing out-of-bounds memory reads from a heap-allocated buffer. Versions 7.1.2-15 and 6.9.13-40 contain a patch.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.02782 |
altlinux: CVE-2026-25576 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25576 was patched at 2026-03-09, 2026-03-10, 2026-03-18
519.
Unknown Vulnerability Type - ImageMagick (CVE-2026-28689) - Low [171]
Description: {'nvd_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.6 | 10 | CVSS Base Score is 6.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 8e-05, EPSS Percentile is 0.00726 |
debian: CVE-2026-28689 was patched at 2026-03-18, 2026-03-19
520.
Unknown Vulnerability Type - UDisks (CVE-2026-26104) - Low [171]
Description: {'nvd_cve_data_all': 'A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive cryptographic metadata can be read and written to attacker-controlled locations. This weakens the confidentiality guarantees of encrypted storage volumes.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | UDisks is a system service daemon that provides interfaces to enumerate, query, and manage storage devices such as hard drives, SSDs, removable media, and loop devices. It exposes functionality over the D-Bus system bus, allowing unprivileged applications to perform safe disk operations while privileged actions are mediated by PolicyKit. | |
| 0.6 | 10 | CVSS Base Score is 5.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.0001, EPSS Percentile is 0.0103 |
almalinux: CVE-2026-26104 was patched at 2026-03-02
altlinux: CVE-2026-26104 was patched at 2026-03-03
oraclelinux: CVE-2026-26104 was patched at 2026-03-02
521.
Unknown Vulnerability Type - Keycloak (CVE-2026-1190) - Low [169]
Description: {'nvd_cve_data_all': 'A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.8 | 14 | Keycloak is an open‑source identity and access management (IAM) solution that provides single sign‑on (SSO), user federation, identity brokering, and access control for applications and services. | |
| 0.3 | 10 | CVSS Base Score is 3.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00016, EPSS Percentile is 0.03613 |
altlinux: CVE-2026-1190 was patched at 2026-03-10, 2026-03-23
522.
Unknown Vulnerability Type - vim (CVE-2026-28419) - Low [166]
Description: {'nvd_cve_data_all': 'Vim is an open source, command line text editor. Prior to version 9.2.0075, a heap-based buffer underflow exists in Vim's Emacs-style tags file parsing logic. When processing a malformed tags file where a delimiter appears at the start of a line, Vim attempts to read memory immediately preceding the allocated buffer. Version 9.2.0075 fixes the issue.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Vim is an open source, command line text editor. Prior to version 9.2.0075, a heap-based buffer underflow exists in Vim's Emacs-style tags file parsing logic. When processing a malformed tags file where a delimiter appears at the start of a line, Vim attempts to read memory immediately preceding the allocated buffer. Version 9.2.0075 fixes the issue.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:vim:vim (exists in CPE dict) | |
| 0.7 | 10 | CVSS Base Score is 6.6. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 4e-05, EPSS Percentile is 0.00189 |
debian: CVE-2026-28419 was patched at 2026-03-18
ubuntu: CVE-2026-28419 was patched at 2026-03-16
523.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-40260) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix scx_enable() crash on helper kthread creation failure A crash was observed when the sched_ext selftests runner was terminated with Ctrl+\\ while test 15 was running: NIP [c00000000028fa58] scx_enable.constprop.0+0x358/0x12b0 LR [c00000000028fa2c] scx_enable.constprop.0+0x32c/0x12b0 Call Trace: scx_enable.constprop.0+0x32c/0x12b0 (unreliable) bpf_struct_ops_link_create+0x18c/0x22c __sys_bpf+0x23f8/0x3044 sys_bpf+0x2c/0x6c system_call_exception+0x124/0x320 system_call_vectored_common+0x15c/0x2ec kthread_run_worker() returns an ERR_PTR() on failure rather than NULL, but the current code in scx_alloc_and_add_sched() only checks for a NULL helper. Incase of failure on SIGQUIT, the error is not handled in scx_alloc_and_add_sched() and scx_enable() ends up dereferencing an error pointer. Error handling is fixed in scx_alloc_and_add_sched() to propagate PTR_ERR() into ret, so that scx_enable() jumps to the existing error path, avoiding random dereference on failure.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nsched_ext: Fix scx_enable() crash on helper kthread creation failure\n\nA crash was observed when the sched_ext selftests runner was\nterminated with Ctrl+\\ while test 15 was running:\n\nNIP [c00000000028fa58] scx_enable.constprop.0+0x358/0x12b0\nLR [c00000000028fa2c] scx_enable.constprop.0+0x32c/0x12b0\nCall Trace:\nscx_enable.constprop.0+0x32c/0x12b0 (unreliable)\nbpf_struct_ops_link_create+0x18c/0x22c\n__sys_bpf+0x23f8/0x3044\nsys_bpf+0x2c/0x6c\nsystem_call_exception+0x124/0x320\nsystem_call_vectored_common+0x15c/0x2ec\n\nkthread_run_worker() returns an ERR_PTR() on failure rather than NULL,\nbut the current code in scx_alloc_and_add_sched() only checks for a NULL\nhelper. Incase of failure on SIGQUIT, the error is not handled in\nscx_alloc_and_add_sched() and scx_enable() ends up dereferencing an\nerror pointer.\n\nError handling is fixed in scx_alloc_and_add_sched() to propagate\nPTR_ERR() into ret, so that scx_enable() jumps to the existing error\npath, avoiding random dereference on failure.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-40260 was patched at 2026-03-16, 2026-03-17
524.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-40265) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: vfat: fix missing sb_min_blocksize() return value checks When emulating an nvme device on qemu with both logical_block_size and physical_block_size set to 8 KiB, but without format, a kernel panic was triggered during the early boot stage while attempting to mount a vfat filesystem. [95553.682035] EXT4-fs (nvme0n1): unable to set blocksize [95553.684326] EXT4-fs (nvme0n1): unable to set blocksize [95553.686501] EXT4-fs (nvme0n1): unable to set blocksize [95553.696448] ISOFS: unsupported/invalid hardware sector size 8192 [95553.697117] ------------[ cut here ]------------ [95553.697567] kernel BUG at fs/buffer.c:1582! [95553.697984] Oops: invalid opcode: 0000 [#1] SMP NOPTI [95553.698602] CPU: 0 UID: 0 PID: 7212 Comm: mount Kdump: loaded Not tainted 6.18.0-rc2+ #38 PREEMPT(voluntary) [95553.699511] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [95553.700534] RIP: 0010:folio_alloc_buffers+0x1bb/0x1c0 [95553.701018] Code: 48 8b 15 e8 93 18 02 65 48 89 35 e0 93 18 02 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d 31 d2 31 c9 31 f6 31 ff c3 cc cc cc cc <0f> 0b 90 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f [95553.702648] RSP: 0018:ffffd1b0c676f990 EFLAGS: 00010246 [95553.703132] RAX: ffff8cfc4176d820 RBX: 0000000000508c48 RCX: 0000000000000001 [95553.703805] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 0000000000000000 [95553.704481] RBP: ffffd1b0c676f9c8 R08: 0000000000000000 R09: 0000000000000000 [95553.705148] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [95553.705816] R13: 0000000000002000 R14: fffff8bc8257e800 R15: 0000000000000000 [95553.706483] FS: 000072ee77315840(0000) GS:ffff8cfdd2c8d000(0000) knlGS:0000000000000000 [95553.707248] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [95553.707782] CR2: 00007d8f2a9e5a20 CR3: 0000000039d0c006 CR4: 0000000000772ef0 [95553.708439] PKRU: 55555554 [95553.708734] Call Trace: [95553.709015] <TASK> [95553.709266] __getblk_slow+0xd2/0x230 [95553.709641] ? find_get_block_common+0x8b/0x530 [95553.710084] bdev_getblk+0x77/0xa0 [95553.710449] __bread_gfp+0x22/0x140 [95553.710810] fat_fill_super+0x23a/0xfc0 [95553.711216] ? __pfx_setup+0x10/0x10 [95553.711580] ? __pfx_vfat_fill_super+0x10/0x10 [95553.712014] vfat_fill_super+0x15/0x30 [95553.712401] get_tree_bdev_flags+0x141/0x1e0 [95553.712817] get_tree_bdev+0x10/0x20 [95553.713177] vfat_get_tree+0x15/0x20 [95553.713550] vfs_get_tree+0x2a/0x100 [95553.713910] vfs_cmd_create+0x62/0xf0 [95553.714273] __do_sys_fsconfig+0x4e7/0x660 [95553.714669] __x64_sys_fsconfig+0x20/0x40 [95553.715062] x64_sys_call+0x21ee/0x26a0 [95553.715453] do_syscall_64+0x80/0x670 [95553.715816] ? __fs_parse+0x65/0x1e0 [95553.716172] ? fat_parse_param+0x103/0x4b0 [95553.716587] ? vfs_parse_fs_param_source+0x21/0xa0 [95553.717034] ? __do_sys_fsconfig+0x3d9/0x660 [95553.717548] ? __x64_sys_fsconfig+0x20/0x40 [95553.717957] ? x64_sys_call+0x21ee/0x26a0 [95553.718360] ? do_syscall_64+0xb8/0x670 [95553.718734] ? __x64_sys_fsconfig+0x20/0x40 [95553.719141] ? x64_sys_call+0x21ee/0x26a0 [95553.719545] ? do_syscall_64+0xb8/0x670 [95553.719922] ? x64_sys_call+0x1405/0x26a0 [95553.720317] ? do_syscall_64+0xb8/0x670 [95553.720702] ? __x64_sys_close+0x3e/0x90 [95553.721080] ? x64_sys_call+0x1b5e/0x26a0 [95553.721478] ? do_syscall_64+0xb8/0x670 [95553.721841] ? irqentry_exit+0x43/0x50 [95553.722211] ? exc_page_fault+0x90/0x1b0 [95553.722681] entry_SYSCALL_64_after_hwframe+0x76/0x7e [95553.723166] RIP: 0033:0x72ee774f3afe [95553.723562] Code: 73 01 c3 48 8b 0d 0a 33 0f 00 f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 49 89 ca b8 af 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d da 32 0f 00 f7 d8 64 89 01 48 [95553.725188] RSP: 002b:00007ffe97148978 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [95553.725892] RAX: ffffffffffffffda RBX: ---truncated---', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nvfat: fix missing sb_min_blocksize() return value checks\n\nWhen emulating an nvme device on qemu with both logical_block_size and\nphysical_block_size set to 8 KiB, but without format, a kernel panic\nwas triggered during the early boot stage while attempting to mount a\nvfat filesystem.\n\n[95553.682035] EXT4-fs (nvme0n1): unable to set blocksize\n[95553.684326] EXT4-fs (nvme0n1): unable to set blocksize\n[95553.686501] EXT4-fs (nvme0n1): unable to set blocksize\n[95553.696448] ISOFS: unsupported/invalid hardware sector size 8192\n[95553.697117] ------------[ cut here ]------------\n[95553.697567] kernel BUG at fs/buffer.c:1582!\n[95553.697984] Oops: invalid opcode: 0000 [#1] SMP NOPTI\n[95553.698602] CPU: 0 UID: 0 PID: 7212 Comm: mount Kdump: loaded Not tainted 6.18.0-rc2+ #38 PREEMPT(voluntary)\n[95553.699511] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[95553.700534] RIP: 0010:folio_alloc_buffers+0x1bb/0x1c0\n[95553.701018] Code: 48 8b 15 e8 93 18 02 65 48 89 35 e0 93 18 02 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d 31 d2 31 c9 31 f6 31 ff c3 cc cc cc cc <0f> 0b 90 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f\n[95553.702648] RSP: 0018:ffffd1b0c676f990 EFLAGS: 00010246\n[95553.703132] RAX: ffff8cfc4176d820 RBX: 0000000000508c48 RCX: 0000000000000001\n[95553.703805] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 0000000000000000\n[95553.704481] RBP: ffffd1b0c676f9c8 R08: 0000000000000000 R09: 0000000000000000\n[95553.705148] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001\n[95553.705816] R13: 0000000000002000 R14: fffff8bc8257e800 R15: 0000000000000000\n[95553.706483] FS: 000072ee77315840(0000) GS:ffff8cfdd2c8d000(0000) knlGS:0000000000000000\n[95553.707248] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[95553.707782] CR2: 00007d8f2a9e5a20 CR3: 0000000039d0c006 CR4: 0000000000772ef0\n[95553.708439] PKRU: 55555554\n[95553.708734] Call Trace:\n[95553.709015] <TASK>\n[95553.709266] __getblk_slow+0xd2/0x230\n[95553.709641] ? find_get_block_common+0x8b/0x530\n[95553.710084] bdev_getblk+0x77/0xa0\n[95553.710449] __bread_gfp+0x22/0x140\n[95553.710810] fat_fill_super+0x23a/0xfc0\n[95553.711216] ? __pfx_setup+0x10/0x10\n[95553.711580] ? __pfx_vfat_fill_super+0x10/0x10\n[95553.712014] vfat_fill_super+0x15/0x30\n[95553.712401] get_tree_bdev_flags+0x141/0x1e0\n[95553.712817] get_tree_bdev+0x10/0x20\n[95553.713177] vfat_get_tree+0x15/0x20\n[95553.713550] vfs_get_tree+0x2a/0x100\n[95553.713910] vfs_cmd_create+0x62/0xf0\n[95553.714273] __do_sys_fsconfig+0x4e7/0x660\n[95553.714669] __x64_sys_fsconfig+0x20/0x40\n[95553.715062] x64_sys_call+0x21ee/0x26a0\n[95553.715453] do_syscall_64+0x80/0x670\n[95553.715816] ? __fs_parse+0x65/0x1e0\n[95553.716172] ? fat_parse_param+0x103/0x4b0\n[95553.716587] ? vfs_parse_fs_param_source+0x21/0xa0\n[95553.717034] ? __do_sys_fsconfig+0x3d9/0x660\n[95553.717548] ? __x64_sys_fsconfig+0x20/0x40\n[95553.717957] ? x64_sys_call+0x21ee/0x26a0\n[95553.718360] ? do_syscall_64+0xb8/0x670\n[95553.718734] ? __x64_sys_fsconfig+0x20/0x40\n[95553.719141] ? x64_sys_call+0x21ee/0x26a0\n[95553.719545] ? do_syscall_64+0xb8/0x670\n[95553.719922] ? x64_sys_call+0x1405/0x26a0\n[95553.720317] ? do_syscall_64+0xb8/0x670\n[95553.720702] ? __x64_sys_close+0x3e/0x90\n[95553.721080] ? x64_sys_call+0x1b5e/0x26a0\n[95553.721478] ? do_syscall_64+0xb8/0x670\n[95553.721841] ? irqentry_exit+0x43/0x50\n[95553.722211] ? exc_page_fault+0x90/0x1b0\n[95553.722681] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[95553.723166] RIP: 0033:0x72ee774f3afe\n[95553.723562] Code: 73 01 c3 48 8b 0d 0a 33 0f 00 f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 49 89 ca b8 af 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d da 32 0f 00 f7 d8 64 89 01 48\n[95553.725188] RSP: 002b:00007ffe97148978 EFLAGS: 00000246 ORIG_RAX: 00000000000001af\n[95553.725892] RAX: ffffffffffffffda RBX: \n---truncated---', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-40265 was patched at 2026-03-16, 2026-03-17
525.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68212) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized 'offp' in statmount_string() In statmount_string(), most flags assign an output offset pointer (offp) which is later updated with the string offset. However, the STATMOUNT_MNT_UIDMAP and STATMOUNT_MNT_GIDMAP cases directly set the struct fields instead of using offp. This leaves offp uninitialized, leading to a possible uninitialized dereference when *offp is updated. Fix it by assigning offp for UIDMAP and GIDMAP as well, keeping the code path consistent.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nfs: Fix uninitialized 'offp' in statmount_string()\n\nIn statmount_string(), most flags assign an output offset pointer (offp)\nwhich is later updated with the string offset. However, the\nSTATMOUNT_MNT_UIDMAP and STATMOUNT_MNT_GIDMAP cases directly set the\nstruct fields instead of using offp. This leaves offp uninitialized,\nleading to a possible uninitialized dereference when *offp is updated.\n\nFix it by assigning offp for UIDMAP and GIDMAP as well, keeping the code\npath consistent.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-68212 was patched at 2026-03-16, 2026-03-17
526.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68221) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: mptcp: fix address removal logic in mptcp_pm_nl_rm_addr Fix inverted WARN_ON_ONCE condition that prevented normal address removal counter updates. The current code only executes decrement logic when the counter is already 0 (abnormal state), while normal removals (counter > 0) are ignored.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix address removal logic in mptcp_pm_nl_rm_addr\n\nFix inverted WARN_ON_ONCE condition that prevented normal address\nremoval counter updates. The current code only executes decrement\nlogic when the counter is already 0 (abnormal state), while\nnormal removals (counter > 0) are ignored.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-68221 was patched at 2026-03-16, 2026-03-17
527.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68225) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: lib/test_kho: check if KHO is enabled We must check whether KHO is enabled prior to issuing KHO commands, otherwise KHO internal data structures are not initialized.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nlib/test_kho: check if KHO is enabled\n\nWe must check whether KHO is enabled prior to issuing KHO commands,\notherwise KHO internal data structures are not initialized.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-68225 was patched at 2026-03-16, 2026-03-17
528.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68228) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: drm/plane: Fix create_in_format_blob() return value create_in_format_blob() is either supposed to return a valid pointer or an error, but never NULL. The caller will dereference the blob when it is not an error, and thus will oops if NULL returned. Return proper error values in the failure cases.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/plane: Fix create_in_format_blob() return value\n\ncreate_in_format_blob() is either supposed to return a valid\npointer or an error, but never NULL. The caller will dereference\nthe blob when it is not an error, and thus will oops if NULL\nreturned. Return proper error values in the failure cases.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-68228 was patched at 2026-03-16, 2026-03-17
529.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68234) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: io_uring/cmd_net: fix wrong argument types for skb_queue_splice() If timestamp retriving needs to be retried and the local list of SKB's already has entries, then it's spliced back into the socket queue. However, the arguments for the splice helper are transposed, causing exactly the wrong direction of splicing into the on-stack list. Fix that up.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/cmd_net: fix wrong argument types for skb_queue_splice()\n\nIf timestamp retriving needs to be retried and the local list of\nSKB's already has entries, then it's spliced back into the socket\nqueue. However, the arguments for the splice helper are transposed,\ncausing exactly the wrong direction of splicing into the on-stack\nlist. Fix that up.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-68234 was patched at 2026-03-16, 2026-03-17
530.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68262) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: crypto: zstd - fix double-free in per-CPU stream cleanup The crypto/zstd module has a double-free bug that occurs when multiple tfms are allocated and freed. The issue happens because zstd_streams (per-CPU contexts) are freed in zstd_exit() during every tfm destruction, rather than being managed at the module level. When multiple tfms exist, each tfm exit attempts to free the same shared per-CPU streams, resulting in a double-free. This leads to a stack trace similar to: BUG: Bad page state in process kworker/u16:1 pfn:106fd93 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fd93 flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) page_type: 0xffffffff() raw: 0017ffffc0000000 dead000000000100 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: nonzero entire_mapcount Modules linked in: ... CPU: 3 UID: 0 PID: 2506 Comm: kworker/u16:1 Kdump: loaded Tainted: G B Hardware name: ... Workqueue: btrfs-delalloc btrfs_work_helper Call Trace: <TASK> dump_stack_lvl+0x5d/0x80 bad_page+0x71/0xd0 free_unref_page_prepare+0x24e/0x490 free_unref_page+0x60/0x170 crypto_acomp_free_streams+0x5d/0xc0 crypto_acomp_exit_tfm+0x23/0x50 crypto_destroy_tfm+0x60/0xc0 ... Change the lifecycle management of zstd_streams to free the streams only once during module cleanup.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: zstd - fix double-free in per-CPU stream cleanup\n\nThe crypto/zstd module has a double-free bug that occurs when multiple\ntfms are allocated and freed.\n\nThe issue happens because zstd_streams (per-CPU contexts) are freed in\nzstd_exit() during every tfm destruction, rather than being managed at\nthe module level. When multiple tfms exist, each tfm exit attempts to\nfree the same shared per-CPU streams, resulting in a double-free.\n\nThis leads to a stack trace similar to:\n\n BUG: Bad page state in process kworker/u16:1 pfn:106fd93\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fd93\n flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)\n page_type: 0xffffffff()\n raw: 0017ffffc0000000 dead000000000100 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\n page dumped because: nonzero entire_mapcount\n Modules linked in: ...\n CPU: 3 UID: 0 PID: 2506 Comm: kworker/u16:1 Kdump: loaded Tainted: G B\n Hardware name: ...\n Workqueue: btrfs-delalloc btrfs_work_helper\n Call Trace:\n <TASK>\n dump_stack_lvl+0x5d/0x80\n bad_page+0x71/0xd0\n free_unref_page_prepare+0x24e/0x490\n free_unref_page+0x60/0x170\n crypto_acomp_free_streams+0x5d/0xc0\n crypto_acomp_exit_tfm+0x23/0x50\n crypto_destroy_tfm+0x60/0xc0\n ...\n\nChange the lifecycle management of zstd_streams to free the streams only\nonce during module cleanup.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68262 was patched at 2026-03-16, 2026-03-17
531.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68281) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list "struct sdca_control" declares "values" field as integer array. But the memory allocated to it is of char array. This causes crash for sdca_parse_function API. This patch addresses the issue by allocating correct data size.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list\n\n"struct sdca_control" declares "values" field as integer array.\nBut the memory allocated to it is of char array. This causes\ncrash for sdca_parse_function API. This patch addresses the\nissue by allocating correct data size.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.0909 |
ubuntu: CVE-2025-68281 was patched at 2026-03-16, 2026-03-17
532.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68294) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: io_uring/net: ensure vectored buffer node import is tied to notification When support for vectored registered buffers was added, the import itself is using 'req' rather than the notification io_kiocb, sr->notif. For non-vectored imports, sr->notif is correctly used. This is important as the lifetime of the two may be different. Use the correct io_kiocb for the vectored buffer import.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/net: ensure vectored buffer node import is tied to notification\n\nWhen support for vectored registered buffers was added, the import\nitself is using 'req' rather than the notification io_kiocb, sr->notif.\nFor non-vectored imports, sr->notif is correctly used. This is important\nas the lifetime of the two may be different. Use the correct io_kiocb\nfor the vectored buffer import.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00027, EPSS Percentile is 0.077 |
ubuntu: CVE-2025-68294 was patched at 2026-03-16, 2026-03-17
533.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68300) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: fs/namespace: fix reference leak in grab_requested_mnt_ns lookup_mnt_ns() already takes a reference on mnt_ns. grab_requested_mnt_ns() doesn't need to take an extra reference.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nfs/namespace: fix reference leak in grab_requested_mnt_ns\n\nlookup_mnt_ns() already takes a reference on mnt_ns.\ngrab_requested_mnt_ns() doesn't need to take an extra reference.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
oraclelinux: CVE-2025-68300 was patched at 2026-02-20
ubuntu: CVE-2025-68300 was patched at 2026-03-16, 2026-03-17
534.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68370) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: coresight: tmc: add the handle of the event to the path The handle is essential for retrieving the AUX_EVENT of each CPU and is required in perf mode. It has been added to the coresight_path so that dependent devices can access it from the path when needed. The existing bug can be reproduced with: perf record -e cs_etm//k -C 0-9 dd if=/dev/zero of=/dev/null Showing an oops as follows: Unable to handle kernel paging request at virtual address 000f6e84934ed19e Call trace: tmc_etr_get_buffer+0x30/0x80 [coresight_tmc] (P) catu_enable_hw+0xbc/0x3d0 [coresight_catu] catu_enable+0x70/0xe0 [coresight_catu] coresight_enable_path+0xb0/0x258 [coresight]', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: tmc: add the handle of the event to the path\n\nThe handle is essential for retrieving the AUX_EVENT of each CPU and is\nrequired in perf mode. It has been added to the coresight_path so that\ndependent devices can access it from the path when needed.\n\nThe existing bug can be reproduced with:\nperf record -e cs_etm//k -C 0-9 dd if=/dev/zero of=/dev/null\n\nShowing an oops as follows:\nUnable to handle kernel paging request at virtual address 000f6e84934ed19e\n\nCall trace:\n tmc_etr_get_buffer+0x30/0x80 [coresight_tmc] (P)\n catu_enable_hw+0xbc/0x3d0 [coresight_catu]\n catu_enable+0x70/0xe0 [coresight_catu]\n coresight_enable_path+0xb0/0x258 [coresight]', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68370 was patched at 2026-03-16, 2026-03-17
535.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68726) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: crypto: aead - Fix reqsize handling Commit afddce13ce81d ("crypto: api - Add reqsize to crypto_alg") introduced cra_reqsize field in crypto_alg struct to replace type specific reqsize fields. It looks like this was introduced specifically for ahash and acomp from the commit description as subsequent commits add necessary changes in these alg frameworks. However, this is being recommended for use in all crypto algs instead of setting reqsize using crypto_*_set_reqsize(). Using cra_reqsize in aead algorithms, hence, causes memory corruptions and crashes as the underlying functions in the algorithm framework have not been updated to set the reqsize properly from cra_reqsize. [1] Add proper set_reqsize calls in the aead init function to properly initialize reqsize for these algorithms in the framework. [1]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: aead - Fix reqsize handling\n\nCommit afddce13ce81d ("crypto: api - Add reqsize to crypto_alg")\nintroduced cra_reqsize field in crypto_alg struct to replace type\nspecific reqsize fields. It looks like this was introduced specifically\nfor ahash and acomp from the commit description as subsequent commits\nadd necessary changes in these alg frameworks.\n\nHowever, this is being recommended for use in all crypto algs\ninstead of setting reqsize using crypto_*_set_reqsize(). Using\ncra_reqsize in aead algorithms, hence, causes memory corruptions and\ncrashes as the underlying functions in the algorithm framework have not\nbeen updated to set the reqsize properly from cra_reqsize. [1]\n\nAdd proper set_reqsize calls in the aead init function to properly\ninitialize reqsize for these algorithms in the framework.\n\n[1]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68726 was patched at 2026-03-16, 2026-03-17
536.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68739) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: hisi: Fix potential UAF in OPP handling Ensure all required data is acquired before calling dev_pm_opp_put(opp) to maintain correct resource acquisition and release order.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: hisi: Fix potential UAF in OPP handling\n\nEnsure all required data is acquired before calling dev_pm_opp_put(opp)\nto maintain correct resource acquisition and release order.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68739 was patched at 2026-03-16, 2026-03-17
537.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68743) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: mshv: Fix create memory region overlap check The current check is incorrect; it only checks if the beginning or end of a region is within an existing region. This doesn't account for userspace specifying a region that begins before and ends after an existing region. Change the logic to a range intersection check against gfns and uaddrs for each region. Remove mshv_partition_region_by_uaddr() as it is no longer used.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nmshv: Fix create memory region overlap check\n\nThe current check is incorrect; it only checks if the beginning or end\nof a region is within an existing region. This doesn't account for\nuserspace specifying a region that begins before and ends after an\nexisting region.\n\nChange the logic to a range intersection check against gfns and uaddrs\nfor each region.\n\nRemove mshv_partition_region_by_uaddr() as it is no longer used.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68743 was patched at 2026-03-16, 2026-03-17
538.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68752) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: iavf: Implement settime64 with -EOPNOTSUPP ptp_clock_settime() assumes every ptp_clock has implemented settime64(). Stub it with -EOPNOTSUPP to prevent a NULL dereference. The fix is similar to commit 329d050bbe63 ("gve: Implement settime64 with -EOPNOTSUPP").', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Implement settime64 with -EOPNOTSUPP\n\nptp_clock_settime() assumes every ptp_clock has implemented settime64().\nStub it with -EOPNOTSUPP to prevent a NULL dereference.\n\nThe fix is similar to commit 329d050bbe63 ("gve: Implement settime64\nwith -EOPNOTSUPP").', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68752 was patched at 2026-03-16, 2026-03-17
539.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68754) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: rtc: amlogic-a4: fix double free caused by devm The clock obtained via devm_clk_get_enabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clk_disable_unprepare() in error path and remove function causes double free. Remove the redundant clk_disable_unprepare() calls from the probe error path and aml_rtc_remove(), allowing the devm framework to automatically manage the clock lifecycle.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nrtc: amlogic-a4: fix double free caused by devm\n\nThe clock obtained via devm_clk_get_enabled() is automatically managed\nby devres and will be disabled and freed on driver detach. Manually\ncalling clk_disable_unprepare() in error path and remove function\ncauses double free.\n\nRemove the redundant clk_disable_unprepare() calls from the probe\nerror path and aml_rtc_remove(), allowing the devm framework to\nautomatically manage the clock lifecycle.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68754 was patched at 2026-03-16, 2026-03-17
540.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-68762) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: net: netpoll: initialize work queue before error checks Prevent a kernel warning when netconsole setup fails on devices with IFF_DISABLE_NETPOLL flag. The warning (at kernel/workqueue.c:4242 in __flush_work) occurs because the cleanup path tries to cancel an uninitialized work queue. When __netpoll_setup() encounters a device with IFF_DISABLE_NETPOLL, it fails early and calls skb_pool_flush() for cleanup. This function calls cancel_work_sync(&np->refill_wq), but refill_wq hasn't been initialized yet, triggering the warning. Move INIT_WORK() to the beginning of __netpoll_setup(), ensuring the work queue is properly initialized before any potential failure points. This allows the cleanup path to safely cancel the work queue regardless of where the setup fails.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netpoll: initialize work queue before error checks\n\nPrevent a kernel warning when netconsole setup fails on devices with\nIFF_DISABLE_NETPOLL flag. The warning (at kernel/workqueue.c:4242 in\n__flush_work) occurs because the cleanup path tries to cancel an\nuninitialized work queue.\n\nWhen __netpoll_setup() encounters a device with IFF_DISABLE_NETPOLL,\nit fails early and calls skb_pool_flush() for cleanup. This function\ncalls cancel_work_sync(&np->refill_wq), but refill_wq hasn't been\ninitialized yet, triggering the warning.\n\nMove INIT_WORK() to the beginning of __netpoll_setup(), ensuring the\nwork queue is properly initialized before any potential failure points.\nThis allows the cleanup path to safely cancel the work queue regardless\nof where the setup fails.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00025, EPSS Percentile is 0.06771 |
ubuntu: CVE-2025-68762 was patched at 2026-03-16, 2026-03-17
541.
Unknown Vulnerability Type - Linux Kernel (CVE-2025-71239) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: audit: add fchmodat2() to change attributes class fchmodat2(), introduced in version 6.6 is currently not in the change attribute class of audit. Calling fchmodat2() to change a file attribute in the same fashion than chmod() or fchmodat() will bypass audit rules such as: -w /tmp/test -p rwa -k test_rwa The current patch adds fchmodat2() to the change attributes class.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\naudit: add fchmodat2() to change attributes class\n\nfchmodat2(), introduced in version 6.6 is currently not in the change\nattribute class of audit. Calling fchmodat2() to change a file\nattribute in the same fashion than chmod() or fchmodat() will bypass\naudit rules such as:\n\n-w /tmp/test -p rwa -k test_rwa\n\nThe current patch adds fchmodat2() to the change attributes class.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.09235 |
debian: CVE-2025-71239 was patched at 2026-03-18
542.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23243) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: RDMA/umad: Reject negative data_len in ib_umad_write ib_umad_write computes data_len from user-controlled count and the MAD header sizes. With a mismatched user MAD header size and RMPP header length, data_len can become negative and reach ib_create_send_mad(). This can make the padding calculation exceed the segment size and trigger an out-of-bounds memset in alloc_send_rmpp_list(). Add an explicit check to reject negative data_len before creating the send buffer. KASAN splat: [ 211.363464] BUG: KASAN: slab-out-of-bounds in ib_create_send_mad+0xa01/0x11b0 [ 211.364077] Write of size 220 at addr ffff88800c3fa1f8 by task spray_thread/102 [ 211.365867] ib_create_send_mad+0xa01/0x11b0 [ 211.365887] ib_umad_write+0x853/0x1c80', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/umad: Reject negative data_len in ib_umad_write\n\nib_umad_write computes data_len from user-controlled count and the\nMAD header sizes. With a mismatched user MAD header size and RMPP\nheader length, data_len can become negative and reach ib_create_send_mad().\nThis can make the padding calculation exceed the segment size and trigger\nan out-of-bounds memset in alloc_send_rmpp_list().\n\nAdd an explicit check to reject negative data_len before creating the\nsend buffer.\n\nKASAN splat:\n[ 211.363464] BUG: KASAN: slab-out-of-bounds in ib_create_send_mad+0xa01/0x11b0\n[ 211.364077] Write of size 220 at addr ffff88800c3fa1f8 by task spray_thread/102\n[ 211.365867] ib_create_send_mad+0xa01/0x11b0\n[ 211.365887] ib_umad_write+0x853/0x1c80', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.09235 |
debian: CVE-2026-23243 was patched at 2026-03-18
543.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23244) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: nvme: fix memory allocation in nvme_pr_read_keys() nvme_pr_read_keys() takes num_keys from userspace and uses it to calculate the allocation size for rse via struct_size(). The upper limit is PR_KEYS_MAX (64K). A malicious or buggy userspace can pass a large num_keys value that results in a 4MB allocation attempt at most, causing a warning in the page allocator when the order exceeds MAX_PAGE_ORDER. To fix this, use kvzalloc() instead of kzalloc(). This bug has the same reasoning and fix with the patch below: https://lore.kernel.org/linux-block/20251212013510.3576091-1-kartikey406@gmail.com/ Warning log: WARNING: mm/page_alloc.c:5216 at __alloc_frozen_pages_noprof+0x5aa/0x2300 mm/page_alloc.c:5216, CPU#1: syz-executor117/272 Modules linked in: CPU: 1 UID: 0 PID: 272 Comm: syz-executor117 Not tainted 6.19.0 #1 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:__alloc_frozen_pages_noprof+0x5aa/0x2300 mm/page_alloc.c:5216 Code: ff 83 bd a8 fe ff ff 0a 0f 86 69 fb ff ff 0f b6 1d f9 f9 c4 04 80 fb 01 0f 87 3b 76 30 ff 83 e3 01 75 09 c6 05 e4 f9 c4 04 01 <0f> 0b 48 c7 85 70 fe ff ff 00 00 00 00 e9 8f fd ff ff 31 c0 e9 0d RSP: 0018:ffffc90000fcf450 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 1ffff920001f9ea0 RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000040dc0 RBP: ffffc90000fcf648 R08: ffff88800b6c3380 R09: 0000000000000001 R10: ffffc90000fcf840 R11: ffff88807ffad280 R12: 0000000000000000 R13: 0000000000040dc0 R14: 0000000000000001 R15: ffffc90000fcf620 FS: 0000555565db33c0(0000) GS:ffff8880be26c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002000000c CR3: 0000000003b72000 CR4: 00000000000006f0 Call Trace: <TASK> alloc_pages_mpol+0x236/0x4d0 mm/mempolicy.c:2486 alloc_frozen_pages_noprof+0x149/0x180 mm/mempolicy.c:2557 ___kmalloc_large_node+0x10c/0x140 mm/slub.c:5598 __kmalloc_large_node_noprof+0x25/0xc0 mm/slub.c:5629 __do_kmalloc_node mm/slub.c:5645 [inline] __kmalloc_noprof+0x483/0x6f0 mm/slub.c:5669 kmalloc_noprof include/linux/slab.h:961 [inline] kzalloc_noprof include/linux/slab.h:1094 [inline] nvme_pr_read_keys+0x8f/0x4c0 drivers/nvme/host/pr.c:245 blkdev_pr_read_keys block/ioctl.c:456 [inline] blkdev_common_ioctl+0x1b71/0x29b0 block/ioctl.c:730 blkdev_ioctl+0x299/0x700 block/ioctl.c:786 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0x1bf/0x220 fs/ioctl.c:583 x64_sys_call+0x1280/0x21b0 mnt/fuzznvme_1/fuzznvme/linux-build/v6.19/./arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x71/0x330 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fb893d3108d Code: 28 c3 e8 46 1e 00 00 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffff61f2f38 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ffff61f3138 RCX: 00007fb893d3108d RDX: 0000000020000040 RSI: 00000000c01070ce RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000000000000 R09: 00007ffff61f3138 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffff61f3128 R14: 00007fb893dae530 R15: 0000000000000001 </TASK>', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: fix memory allocation in nvme_pr_read_keys()\n\nnvme_pr_read_keys() takes num_keys from userspace and uses it to\ncalculate the allocation size for rse via struct_size(). The upper\nlimit is PR_KEYS_MAX (64K).\n\nA malicious or buggy userspace can pass a large num_keys value that\nresults in a 4MB allocation attempt at most, causing a warning in\nthe page allocator when the order exceeds MAX_PAGE_ORDER.\n\nTo fix this, use kvzalloc() instead of kzalloc().\n\nThis bug has the same reasoning and fix with the patch below:\nhttps://lore.kernel.org/linux-block/20251212013510.3576091-1-kartikey406@gmail.com/\n\nWarning log:\nWARNING: mm/page_alloc.c:5216 at __alloc_frozen_pages_noprof+0x5aa/0x2300 mm/page_alloc.c:5216, CPU#1: syz-executor117/272\nModules linked in:\nCPU: 1 UID: 0 PID: 272 Comm: syz-executor117 Not tainted 6.19.0 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:__alloc_frozen_pages_noprof+0x5aa/0x2300 mm/page_alloc.c:5216\nCode: ff 83 bd a8 fe ff ff 0a 0f 86 69 fb ff ff 0f b6 1d f9 f9 c4 04 80 fb 01 0f 87 3b 76 30 ff 83 e3 01 75 09 c6 05 e4 f9 c4 04 01 <0f> 0b 48 c7 85 70 fe ff ff 00 00 00 00 e9 8f fd ff ff 31 c0 e9 0d\nRSP: 0018:ffffc90000fcf450 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 1ffff920001f9ea0\nRDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000040dc0\nRBP: ffffc90000fcf648 R08: ffff88800b6c3380 R09: 0000000000000001\nR10: ffffc90000fcf840 R11: ffff88807ffad280 R12: 0000000000000000\nR13: 0000000000040dc0 R14: 0000000000000001 R15: ffffc90000fcf620\nFS: 0000555565db33c0(0000) GS:ffff8880be26c000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000002000000c CR3: 0000000003b72000 CR4: 00000000000006f0\nCall Trace:\n <TASK>\n alloc_pages_mpol+0x236/0x4d0 mm/mempolicy.c:2486\n alloc_frozen_pages_noprof+0x149/0x180 mm/mempolicy.c:2557\n ___kmalloc_large_node+0x10c/0x140 mm/slub.c:5598\n __kmalloc_large_node_noprof+0x25/0xc0 mm/slub.c:5629\n __do_kmalloc_node mm/slub.c:5645 [inline]\n __kmalloc_noprof+0x483/0x6f0 mm/slub.c:5669\n kmalloc_noprof include/linux/slab.h:961 [inline]\n kzalloc_noprof include/linux/slab.h:1094 [inline]\n nvme_pr_read_keys+0x8f/0x4c0 drivers/nvme/host/pr.c:245\n blkdev_pr_read_keys block/ioctl.c:456 [inline]\n blkdev_common_ioctl+0x1b71/0x29b0 block/ioctl.c:730\n blkdev_ioctl+0x299/0x700 block/ioctl.c:786\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl fs/ioctl.c:583 [inline]\n __x64_sys_ioctl+0x1bf/0x220 fs/ioctl.c:583\n x64_sys_call+0x1280/0x21b0 mnt/fuzznvme_1/fuzznvme/linux-build/v6.19/./arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x71/0x330 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7fb893d3108d\nCode: 28 c3 e8 46 1e 00 00 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffff61f2f38 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007ffff61f3138 RCX: 00007fb893d3108d\nRDX: 0000000020000040 RSI: 00000000c01070ce RDI: 0000000000000003\nRBP: 0000000000000001 R08: 0000000000000000 R09: 00007ffff61f3138\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001\nR13: 00007ffff61f3128 R14: 00007fb893dae530 R15: 0000000000000001\n </TASK>', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00024, EPSS Percentile is 0.06303 |
debian: CVE-2026-23244 was patched at 2026-03-18
544.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23245) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can be replaced while the hrtimer callback or dump path is walking the schedule list. Convert the parameters to an RCU-protected snapshot and swap updates under tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits the entry list, preserve the existing schedule so the effective state is unchanged.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_gate: snapshot parameters with RCU on replace\n\nThe gate action can be replaced while the hrtimer callback or dump path is\nwalking the schedule list.\n\nConvert the parameters to an RCU-protected snapshot and swap updates under\ntcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits\nthe entry list, preserve the existing schedule so the effective state is\nunchanged.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00032, EPSS Percentile is 0.09235 |
debian: CVE-2026-23245 was patched at 2026-03-18
545.
Unknown Vulnerability Type - Linux Kernel (CVE-2026-23247) - Low [161]
Description: {'nvd_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved: tcp: secure_seq: add back ports to TS offset This reverts 28ee1b746f49 ("secure_seq: downgrade to per-host timestamp offsets") tcp_tw_recycle went away in 2017. Zhouyan Deng reported off-path TCP source port leakage via SYN cookie side-channel that can be fixed in multiple ways. One of them is to bring back TCP ports in TS offset randomization. As a bonus, we perform a single siphash() computation to provide both an ISN and a TS offset.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: secure_seq: add back ports to TS offset\n\nThis reverts 28ee1b746f49 ("secure_seq: downgrade to per-host timestamp offsets")\n\ntcp_tw_recycle went away in 2017.\n\nZhouyan Deng reported off-path TCP source port leakage via\nSYN cookie side-channel that can be fixed in multiple ways.\n\nOne of them is to bring back TCP ports in TS offset randomization.\n\nAs a bonus, we perform a single siphash() computation\nto provide both an ISN and a TS offset.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.9 | 14 | The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.0584 |
debian: CVE-2026-23247 was patched at 2026-03-18
546.
Unknown Vulnerability Type - Redis (CVE-2026-1527) - Low [159]
Description: {'nvd_cve_data_all': 'ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\\r\\n) to: * Inject arbitrary HTTP headers * Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch) The vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters: // lib/dispatcher/client-h1.js:1121 if (upgrade) { header += `connection: upgrade\\r\\nupgrade: ${upgrade}\\r\\n` }', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImpactWhen an application passes user-controlled input to the\xa0upgrade\xa0option of\xa0client.request(), an attacker can inject CRLF sequences (\\r\\n) to:\n\n * Inject arbitrary HTTP headers\n * Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)\nThe vulnerability exists because undici writes the\xa0upgrade\xa0value directly to the socket without validating for invalid header characters:\n\n// lib/dispatcher/client-h1.js:1121\nif (upgrade) {\n header += `connection: upgrade\\r\\nupgrade: ${upgrade}\\r\\n`\n}', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability | |
| 0.5 | 10 | CVSS Base Score is 4.6. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 9e-05, EPSS Percentile is 0.00951 |
debian: CVE-2026-1527 was patched at 2026-03-18
547.
Unknown Vulnerability Type - Pypdf (CVE-2026-28804) - Low [154]
Description: {'nvd_cve_data_all': 'pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.5, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires accessing a stream which uses the /ASCIIHexDecode filter. This issue has been patched in version 6.7.5.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.5, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires accessing a stream which uses the /ASCIIHexDecode filter. This issue has been patched in version 6.7.5.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | PyPDF is a Python library for reading, manipulating, and writing PDF files, including extraction, splitting, merging, and encryption features. | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.13932 |
debian: CVE-2026-28804 was patched at 2026-03-18
548.
Unknown Vulnerability Type - Werkzeug (CVE-2026-21860) - Low [154]
Description: {'nvd_cve_data_all': 'Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. This issue has been patched in version 3.1.5.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. This issue has been patched in version 3.1.5.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Werkzeug is a comprehensive WSGI web application library | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00022, EPSS Percentile is 0.05885 |
altlinux: CVE-2026-21860 was patched at 2026-03-13
549.
Unknown Vulnerability Type - Kubernetes (CVE-2026-24513) - Low [152]
Description: {'nvd_cve_data_all': 'A security issue was discovered in ingress-nginx where the protection afforded by the `auth-url` Ingress annotation may not be effective in the presence of a specific misconfiguration. If the ingress-nginx controller is configured with a default custom-errors configuration that includes HTTP errors 401 or 403, and if the configured default custom-errors backend is defective and fails to respect the X-Code HTTP header, then an Ingress with the `auth-url` annotation may be accessed even when authentication fails. Note that the built-in custom-errors backend works correctly. To trigger this issue requires an administrator to specifically configure ingress-nginx with a broken external component.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A security issue was discovered in ingress-nginx\xa0where the protection afforded by the `auth-url` Ingress annotation may not be effective in the presence of a specific misconfiguration.\n\nIf the ingress-nginx controller is configured with a default custom-errors configuration that includes HTTP errors 401 or 403, and if the configured default custom-errors backend is defective and fails to respect the X-Code HTTP header, then an Ingress with the `auth-url` annotation may be accessed even when authentication fails.\n\nNote that the built-in custom-errors backend works correctly. To trigger this issue requires an administrator to specifically configure ingress-nginx with a broken external component.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.7 | 14 | Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management | |
| 0.3 | 10 | CVSS Base Score is 3.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.02084 |
redos: CVE-2026-24513 was patched at 2026-03-11
550.
Memory Corruption - Unknown Product (CVE-2026-23865) - Low [148]
Description: {'nvd_cve_data_all': 'An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0 | 14 | Unknown Product | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02393 |
debian: CVE-2026-23865 was patched at 2026-03-18
ubuntu: CVE-2026-23865 was patched at 2026-03-12
551.
Memory Corruption - Unknown Product (CVE-2026-23868) - Low [148]
Description: {'nvd_cve_data_all': 'Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be possible.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be possible.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0 | 14 | Unknown Product | |
| 0.5 | 10 | CVSS Base Score is 5.1. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.04105 |
debian: CVE-2026-23868 was patched at 2026-03-18
552.
Memory Corruption - Unknown Product (CVE-2026-3713) - Low [148]
Description: {'nvd_cve_data_all': 'A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0 | 14 | Unknown Product | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.02786 |
debian: CVE-2026-3713 was patched at 2026-03-18
553.
Memory Corruption - Unknown Product (CVE-2026-3994) - Low [148]
Description: {'nvd_cve_data_all': 'A vulnerability was detected in rui314 mold up to 2.40.4. This issue affects the function mold::ObjectFilemold::X86_64::initialize_sections of the file src/input-files.cc of the component Object File Handler. Performing a manipulation results in heap-based buffer overflow. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A vulnerability was detected in rui314 mold up to 2.40.4. This issue affects the function mold::ObjectFilemold::X86_64::initialize_sections of the file src/input-files.cc of the component Object File Handler. Performing a manipulation results in heap-based buffer overflow. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0 | 14 | Unknown Product | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.0268 |
debian: CVE-2026-3994 was patched at 2026-03-18
554.
Unknown Vulnerability Type - ImageMagick (CVE-2026-27799) - Low [147]
Description: {'nvd_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. Versions 7.1.2-15 and 6.9.13-40 contain a patch.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. Versions 7.1.2-15 and 6.9.13-40 contain a patch.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.6 | 14 | ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images | |
| 0.4 | 10 | CVSS Base Score is 4.4. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00015, EPSS Percentile is 0.03347 |
altlinux: CVE-2026-27799 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-27799 was patched at 2026-03-09, 2026-03-10, 2026-03-18
555.
Unknown Vulnerability Type - Unknown Product (CVE-2026-0846) - Low [142]
Description: {'nvd_cve_data_all': 'A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.9 | 10 | CVSS Base Score is 8.6. According to NVD data source | |
| 0.3 | 10 | EPSS Probability is 0.00102, EPSS Percentile is 0.28025 |
debian: CVE-2026-0846 was patched at 2026-03-18
556.
Unknown Vulnerability Type - gitea (CVE-2025-68940) - Low [142]
Description: {'nvd_cve_data_all': 'In Gitea before 1.22.5, branch deletion permissions are not adequately enforced after merging a pull request.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In Gitea before 1.22.5, branch deletion permissions are not adequately enforced after merging a pull request.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:gitea:gitea (exists in CPE dict) | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02552 |
redos: CVE-2025-68940 was patched at 2026-02-24
557.
Unknown Vulnerability Type - gitea (CVE-2025-68941) - Low [142]
Description: {'nvd_cve_data_all': 'Gitea before 1.22.3 mishandles access to a private resource upon receiving an API token with scope limited to public resources.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Gitea before 1.22.3 mishandles access to a private resource upon receiving an API token with scope limited to public resources.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Product detected by a:gitea:gitea (exists in CPE dict) | |
| 0.5 | 10 | CVSS Base Score is 5.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00013, EPSS Percentile is 0.01995 |
redos: CVE-2025-68941 was patched at 2026-02-24
558.
Unknown Vulnerability Type - Flask (CVE-2026-27205) - Low [130]
Description: {'nvd_cve_data_all': 'Flask is a web server gateway interface (WSGI) web application framework. In versions 3.1.2 and below, when the session object is accessed, Flask should set the Vary: Cookie header., resulting in a Use of Cache Containing Sensitive Information vulnerability. The logic instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python in operator were overlooked. The severity and risk depend on the application being hosted behind a caching proxy that doesn't ignore responses with cookies, not setting a Cache-Control header to mark pages as private or non-cacheable, and accessing the session in a way that only touches keys without reading values or mutating the session. The issue has been fixed in version 3.1.3.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Flask is a web server gateway interface (WSGI) web application framework. In versions 3.1.2 and below, when the session object is accessed, Flask should set the Vary: Cookie header., resulting in a Use of Cache Containing Sensitive Information vulnerability. The logic instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python in operator were overlooked. The severity and risk depend on the application being hosted behind a caching proxy that doesn't ignore responses with cookies, not setting a Cache-Control header to mark pages as private or non-cacheable, and accessing the session in a way that only touches keys without reading values or mutating the session. The issue has been fixed in version 3.1.3.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.5 | 14 | Flask is a lightweight WSGI web application framework | |
| 0.4 | 10 | CVSS Base Score is 4.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00011, EPSS Percentile is 0.0136 |
debian: CVE-2026-27205 was patched at 2026-03-18
ubuntu: CVE-2026-27205 was patched at 2026-03-18
559.
Memory Corruption - Unknown Product (CVE-2026-2889) - Low [125]
Description: {'nvd_cve_data_all': 'A vulnerability was detected in CCExtractor up to 0.96.5. Affected is the function processmp4 in the library src/lib_ccx/mp4.c. Performing a manipulation results in use after free. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 0.96.6 is able to address this issue. The patch is named fd7271bae238ccb3ae8a71304ea64f0886324925. You should upgrade the affected component.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A vulnerability was detected in CCExtractor up to 0.96.5. Affected is the function processmp4 in the library src/lib_ccx/mp4.c. Performing a manipulation results in use after free. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 0.96.6 is able to address this issue. The patch is named fd7271bae238ccb3ae8a71304ea64f0886324925. You should upgrade the affected component.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0 | 14 | Unknown Product | |
| 0.3 | 10 | CVSS Base Score is 3.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00016, EPSS Percentile is 0.03483 |
debian: CVE-2026-2889 was patched at 2026-03-18
560.
Memory Corruption - Unknown Product (CVE-2026-2903) - Low [125]
Description: {'nvd_cve_data_all': 'A flaw has been found in skvadrik re2c up to 4.4. Impacted is the function check_and_merge_special_rules of the file src/parse/ast.cc. This manipulation causes null pointer dereference. The attack can only be executed locally. The exploit has been published and may be used. Patch name: febeb977936f9519a25d9fbd10ff8256358cdb97. It is suggested to install a patch to address this issue.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A flaw has been found in skvadrik re2c up to 4.4. Impacted is the function check_and_merge_special_rules of the file src/parse/ast.cc. This manipulation causes null pointer dereference. The attack can only be executed locally. The exploit has been published and may be used. Patch name: febeb977936f9519a25d9fbd10ff8256358cdb97. It is suggested to install a patch to address this issue.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0 | 14 | Unknown Product | |
| 0.3 | 10 | CVSS Base Score is 3.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00017, EPSS Percentile is 0.03877 |
debian: CVE-2026-2903 was patched at 2026-03-18
561.
Memory Corruption - Unknown Product (CVE-2026-3949) - Low [125]
Description: {'nvd_cve_data_all': 'A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0.5 | 15 | Memory Corruption | |
| 0 | 14 | Unknown Product | |
| 0.3 | 10 | CVSS Base Score is 3.3. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00014, EPSS Percentile is 0.02703 |
debian: CVE-2026-3949 was patched at 2026-03-18
562.
Unknown Vulnerability Type - Unknown Product (CVE-2026-25679) - Low [107]
Description: {'nvd_cve_data_all': 'url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.8 | 10 | CVSS Base Score is 7.5. According to NVD data source | |
| 0.1 | 10 | EPSS Probability is 0.00031, EPSS Percentile is 0.08836 |
altlinux: CVE-2026-25679 was patched at 2026-03-10, 2026-03-23
563.
Unknown Vulnerability Type - GitHub (CVE-2026-26958) - Low [104]
Description: {'nvd_cve_data_all': 'filippo.io/edwards25519 is a Go library implementing the edwards25519 elliptic curve with APIs for building cryptographic primitives. In versions 1.1.0 and earlier, MultiScalarMult produces invalid results or undefined behavior if the receiver is not the identity point. If (*Point).MultiScalarMult is called on an initialized point that is not the identity point, it returns an incorrect result. If the method is called on an uninitialized point, the behavior is undefined. In particular, if the receiver is the zero value, MultiScalarMult returns an invalid point that compares Equal to every other point. Note that MultiScalarMult is a rarely used, advanced API. For example, users who depend on filippo.io/edwards25519 only through github.com/go-sql-driver/mysql are not affected. This issue has been fixed in version 1.1.1.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'filippo.io/edwards25519 is a Go library implementing the edwards25519 elliptic curve with APIs for building cryptographic primitives. In versions 1.1.0 and earlier, MultiScalarMult produces invalid results or undefined behavior if the receiver is not the identity point. If (*Point).MultiScalarMult is called on an initialized point that is not the identity point, it returns an incorrect result. If the method is called on an uninitialized point, the behavior is undefined. In particular, if the receiver is the zero value, MultiScalarMult returns an invalid point that compares Equal to every other point. Note that MultiScalarMult is a rarely used, advanced API. For example, users who depend on filippo.io/edwards25519 only through github.com/go-sql-driver/mysql are not affected. This issue has been fixed in version 1.1.1.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0.2 | 14 | GitHub, Inc. is an Internet hosting service for software development and version control using Git | |
| 0.6 | 10 | CVSS Base Score is 6.3. According to Vulners data source | |
| 0.0 | 10 | EPSS Probability is 0.00018, EPSS Percentile is 0.04287 |
debian: CVE-2026-26958 was patched at 2026-03-18
564.
Unknown Vulnerability Type - Unknown Product (CVE-2026-23554) - Low [95]
Description: {'nvd_cve_data_all': 'The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications done under the same locked region only issue a single flush. Freeing of paging structures however is not deferred until the flushing is done, and can result in freed pages transiently being present in cached state. Such stale entries can point to memory ranges not owned by the guest, thus allowing access to unintended memory regions.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'The Intel EPT paging code uses an optimization to defer flushing of any cached\nEPT state until the p2m lock is dropped, so that multiple modifications done\nunder the same locked region only issue a single flush.\n\nFreeing of paging structures however is not deferred until the flushing is\ndone, and can result in freed pages transiently being present in cached state.\nSuch stale entries can point to memory ranges not owned by the guest, thus\nallowing access to unintended memory regions.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.8 | 10 | CVSS Base Score is 7.8. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 0.00012, EPSS Percentile is 0.01625 |
debian: CVE-2026-23554 was patched at 2026-03-18
565.
Unknown Vulnerability Type - Unknown Product (CVE-2026-4224) - Low [71]
Description: {'nvd_cve_data_all': 'When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'When an Expat parser with a registered ElementDeclHandler parses an inline\ndocument type definition containing a deeply nested content model a C stack\noverflow occurs.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.6 | 10 | CVSS Base Score is 6.0. According to Vulners data source | |
| 0.0 | 10 | EPSS Probability is 0.00019, EPSS Percentile is 0.04762 |
debian: CVE-2026-4224 was patched at 2026-03-18
566.
Unknown Vulnerability Type - Unknown Product (CVE-2026-27139) - Low [23]
Description: {'nvd_cve_data_all': 'On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.2 | 10 | CVSS Base Score is 2.5. According to NVD data source | |
| 0.0 | 10 | EPSS Probability is 5e-05, EPSS Percentile is 0.00209 |
altlinux: CVE-2026-27139 was patched at 2026-03-10, 2026-03-23
debian: CVE-2026-27139 was patched at 2026-03-18
567.
Unknown Vulnerability Type - Unknown Product (CVE-2025-14821) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual " "that will use it when announcing a new security problem. When the candidate has been " "publicized, the details for this candidate will be provided.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
altlinux: CVE-2025-14821 was patched at 2026-03-11, 2026-03-12
568.
Unknown Vulnerability Type - Unknown Product (CVE-2025-38213) - Low [0]
Description: {'nvd_cve_data_all': 'Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
redos: CVE-2025-38213 was patched at 2026-02-20
569.
Unknown Vulnerability Type - Unknown Product (CVE-2025-68789) - Low [0]
Description: {'nvd_cve_data_all': 'Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
oraclelinux: CVE-2025-68789 was patched at 2026-02-20
570.
Unknown Vulnerability Type - Unknown Product (CVE-2026-1609) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual " "that will use it when announcing a new security problem. When the candidate has been " "publicized, the details for this candidate will be provided.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
altlinux: CVE-2026-1609 was patched at 2026-03-10, 2026-03-23
571.
Unknown Vulnerability Type - Unknown Product (CVE-2026-2708) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual " "that will use it when announcing a new security problem. When the candidate has been " "publicized, the details for this candidate will be provided.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2026-2708 was patched at 2026-03-18
572.
Unknown Vulnerability Type - Unknown Product (CVE-2026-3184) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual " "that will use it when announcing a new security problem. When the candidate has been " "publicized, the details for this candidate will be provided.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2026-3184 was patched at 2026-03-18
573.
Unknown Vulnerability Type - Unknown Product (CVE-2026-3195) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual " "that will use it when announcing a new security problem. When the candidate has been " "publicized, the details for this candidate will be provided.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
altlinux: CVE-2026-31958 was patched at 2026-03-18
debian: CVE-2026-3195 was patched at 2026-03-18
debian: CVE-2026-31958 was patched at 2026-03-18
574.
Unknown Vulnerability Type - Unknown Product (CVE-2026-3196) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual " "that will use it when announcing a new security problem. When the candidate has been " "publicized, the details for this candidate will be provided.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2026-3196 was patched at 2026-03-18
575.
Unknown Vulnerability Type - Unknown Product (CVE-2026-3312) - Low [0]
Description: {'nvd_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'This candidate has been reserved by an organization or individual " "that will use it when announcing a new security problem. When the candidate has been " "publicized, the details for this candidate will be provided.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
| Component | Value | Weight | Comment |
|---|---|---|---|
| 0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
| 0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
| 0 | 15 | Unknown Vulnerability Type | |
| 0 | 14 | Unknown Product | |
| 0.0 | 10 | CVSS Base Score is NA. No data. | |
| 0 | 10 | EPSS Probability is 0, EPSS Percentile is 0 |
debian: CVE-2026-3312 was patched at 2026-03-18
debian: CVE-2026-3909 was patched at 2026-03-16, 2026-03-18
debian: CVE-2026-3910 was patched at 2026-03-16, 2026-03-18
debian: CVE-2025-14009 was patched at 2026-03-18
debian: CVE-2025-69649 was patched at 2026-03-18
debian: CVE-2025-69650 was patched at 2026-03-18
debian: CVE-2025-69652 was patched at 2026-03-18
debian: CVE-2026-27606 was patched at 2026-03-18
oraclelinux: CVE-2026-27606 was patched at 2026-03-13
altlinux: CVE-2026-27590 was patched at 2026-03-04, 2026-03-05
debian: CVE-2026-27590 was patched at 2026-03-18
debian: CVE-2026-26064 was patched at 2026-03-18
debian: CVE-2026-26065 was patched at 2026-03-18
debian: CVE-2026-20777 was patched at 2026-03-18
debian: CVE-2026-22891 was patched at 2026-03-18
debian: CVE-2026-27475 was patched at 2026-03-03, 2026-03-18
debian: CVE-2025-69651 was patched at 2026-03-18
debian: CVE-2026-28370 was patched at 2026-03-18
debian: CVE-2026-26200 was patched at 2026-03-18
debian: CVE-2026-28296 was patched at 2026-03-18
debian: CVE-2026-30928 was patched at 2026-03-18
debian: CVE-2026-32596 was patched at 2026-03-18
debian: CVE-2025-69534 was patched at 2026-03-18
debian: CVE-2026-28434 was patched at 2026-03-18
debian: CVE-2026-28490 was patched at 2026-03-18
debian: CVE-2026-3099 was patched at 2026-03-18
debian: CVE-2026-27624 was patched at 2026-03-18
debian: CVE-2026-27824 was patched at 2026-03-18
altlinux: CVE-2026-3783 was patched at 2026-03-16
debian: CVE-2026-3783 was patched at 2026-03-18
ubuntu: CVE-2026-3783 was patched at 2026-03-11, 2026-03-16
debian: CVE-2026-4271 was patched at 2026-03-18
debian: CVE-2026-32314 was patched at 2026-03-18
debian: CVE-2026-28435 was patched at 2026-03-18
debian: CVE-2026-31870 was patched at 2026-03-18
debian: CVE-2026-3442 was patched at 2026-03-18
altlinux: CVE-2026-27015 was patched at 2026-02-27
debian: CVE-2026-27015 was patched at 2026-03-18
debian: CVE-2026-31884 was patched at 2026-03-18
ubuntu: CVE-2026-27015 was patched at 2026-03-18
altlinux: CVE-2026-3201 was patched at 2026-02-27
altlinux: CVE-2026-3203 was patched at 2026-02-27
debian: CVE-2026-3201 was patched at 2026-03-18
debian: CVE-2026-3203 was patched at 2026-03-18
altlinux: CVE-2026-30922 was patched at 2026-03-20
debian: CVE-2026-30922 was patched at 2026-03-18
redos: CVE-2026-24514 was patched at 2026-03-11
debian: CVE-2026-27888 was patched at 2026-03-18
debian: CVE-2026-26278 was patched at 2026-03-18
debian: CVE-2026-27932 was patched at 2026-03-18
debian: CVE-2026-27601 was patched at 2026-03-18
debian: CVE-2026-32141 was patched at 2026-03-18
debian: CVE-2026-26996 was patched at 2026-03-18
debian: CVE-2026-27903 was patched at 2026-03-18
debian: CVE-2026-27904 was patched at 2026-03-18
debian: CVE-2026-2243 was patched at 2026-03-18
debian: CVE-2026-3388 was patched at 2026-03-18
debian: CVE-2026-32777 was patched at 2026-03-18
debian: CVE-2026-32837 was patched at 2026-03-18
debian: CVE-2026-31899 was patched at 2026-03-18
debian: CVE-2024-14027 was patched at 2026-03-18
debian: CVE-2026-26331 was patched at 2026-03-18
debian: CVE-2026-32608 was patched at 2026-03-18
debian: CVE-2019-25355 was patched at 2026-03-18
debian: CVE-2026-27699 was patched at 2026-03-18
debian: CVE-2026-30853 was patched at 2026-03-18
debian: CVE-2026-22860 was patched at 2026-03-18, 2026-03-23
ubuntu: CVE-2026-22860 was patched at 2026-02-26
debian: CVE-2026-26960 was patched at 2026-03-18
debian: CVE-2026-29786 was patched at 2026-03-18
debian: CVE-2026-28372 was patched at 2026-02-19, 2026-03-18
debian: CVE-2026-3888 was patched at 2026-03-18, 2026-03-19
ubuntu: CVE-2026-3888 was patched at 2026-03-17
altlinux: CVE-2026-25941 was patched at 2026-02-27
debian: CVE-2026-25941 was patched at 2026-03-18
ubuntu: CVE-2026-25941 was patched at 2026-03-18
altlinux: CVE-2026-1529 was patched at 2026-03-10, 2026-03-23
debian: CVE-2026-32627 was patched at 2026-03-18
debian: CVE-2026-27962 was patched at 2026-03-18
debian: CVE-2026-28498 was patched at 2026-03-18
debian: CVE-2026-28802 was patched at 2026-03-18
altlinux: CVE-2026-27585 was patched at 2026-03-04, 2026-03-05
altlinux: CVE-2026-27589 was patched at 2026-03-04, 2026-03-05
debian: CVE-2026-27585 was patched at 2026-03-18
debian: CVE-2026-27587 was patched at 2026-03-18
debian: CVE-2026-27588 was patched at 2026-03-18
debian: CVE-2026-27589 was patched at 2026-03-18
debian: CVE-2026-32597 was patched at 2026-03-18
altlinux: CVE-2026-24122 was patched at 2026-03-17
debian: CVE-2026-24122 was patched at 2026-03-18
debian: CVE-2026-32746 was patched at 2026-03-18
altlinux: CVE-2026-25942 was patched at 2026-02-27
altlinux: CVE-2026-25952 was patched at 2026-02-27
altlinux: CVE-2026-25953 was patched at 2026-02-27
altlinux: CVE-2026-25954 was patched at 2026-02-27
altlinux: CVE-2026-25955 was patched at 2026-02-27
altlinux: CVE-2026-25959 was patched at 2026-02-27
altlinux: CVE-2026-25997 was patched at 2026-02-27
altlinux: CVE-2026-26271 was patched at 2026-02-27
altlinux: CVE-2026-26955 was patched at 2026-02-27
altlinux: CVE-2026-26965 was patched at 2026-02-27
altlinux: CVE-2026-26986 was patched at 2026-02-27
debian: CVE-2026-25942 was patched at 2026-03-18
debian: CVE-2026-25952 was patched at 2026-03-18
debian: CVE-2026-25953 was patched at 2026-03-18
debian: CVE-2026-25954 was patched at 2026-03-18
debian: CVE-2026-25955 was patched at 2026-03-18
debian: CVE-2026-25959 was patched at 2026-03-18
debian: CVE-2026-25997 was patched at 2026-03-18
debian: CVE-2026-26271 was patched at 2026-03-18
debian: CVE-2026-26955 was patched at 2026-03-18
debian: CVE-2026-26965 was patched at 2026-03-18
debian: CVE-2026-26986 was patched at 2026-03-18
debian: CVE-2026-29774 was patched at 2026-03-18
debian: CVE-2026-29775 was patched at 2026-03-18
debian: CVE-2026-31806 was patched at 2026-03-18
debian: CVE-2026-31883 was patched at 2026-03-18
debian: CVE-2026-31885 was patched at 2026-03-18
debian: CVE-2026-31897 was patched at 2026-03-18
ubuntu: CVE-2026-25942 was patched at 2026-03-18
ubuntu: CVE-2026-25952 was patched at 2026-03-18
ubuntu: CVE-2026-25953 was patched at 2026-03-18
ubuntu: CVE-2026-25954 was patched at 2026-03-18
ubuntu: CVE-2026-25955 was patched at 2026-03-18
ubuntu: CVE-2026-25959 was patched at 2026-03-18
ubuntu: CVE-2026-25997 was patched at 2026-03-18
ubuntu: CVE-2026-26271 was patched at 2026-03-18
ubuntu: CVE-2026-26955 was patched at 2026-03-18
ubuntu: CVE-2026-26965 was patched at 2026-03-18
ubuntu: CVE-2026-26986 was patched at 2026-03-18
debian: CVE-2022-38072 was patched at 2026-03-18
debian: CVE-2026-2653 was patched at 2026-03-18
debian: CVE-2026-27168 was patched at 2026-03-18
debian: CVE-2023-26920 was patched at 2026-03-18
debian: CVE-2026-29076 was patched at 2026-03-18
altlinux: CVE-2026-3805 was patched at 2026-03-16
debian: CVE-2026-3805 was patched at 2026-03-18
ubuntu: CVE-2026-3805 was patched at 2026-03-11
debian: CVE-2026-2704 was patched at 2026-03-18
debian: CVE-2026-2705 was patched at 2026-03-18
debian: CVE-2026-3408 was patched at 2026-03-18
altlinux: CVE-2026-25884 was patched at 2026-03-09
debian: CVE-2026-25884 was patched at 2026-03-18
ubuntu: CVE-2026-25884 was patched at 2026-03-18
debian: CVE-2026-2913 was patched at 2026-03-18
debian: CVE-2026-3145 was patched at 2026-03-18
debian: CVE-2026-3146 was patched at 2026-03-18
debian: CVE-2026-3147 was patched at 2026-03-18
debian: CVE-2026-3281 was patched at 2026-03-18
debian: CVE-2026-3282 was patched at 2026-03-18
debian: CVE-2026-32829 was patched at 2026-03-18
debian: CVE-2026-3283 was patched at 2026-03-18
debian: CVE-2026-32837 was patched at 2026-03-18
debian: CVE-2026-2659 was patched at 2026-03-18
debian: CVE-2026-2661 was patched at 2026-03-18
debian: CVE-2026-3389 was patched at 2026-03-18
debian: CVE-2025-64736 was patched at 2026-03-18
debian: CVE-2026-27622 was patched at 2026-03-18
debian: CVE-2026-3606 was patched at 2026-03-18
debian: CVE-2025-61147 was patched at 2026-03-18
altlinux: CVE-2026-27470 was patched at 2026-03-03
debian: CVE-2026-27470 was patched at 2026-03-18
debian: CVE-2026-26198 was patched at 2026-03-18
debian: CVE-2026-28350 was patched at 2026-03-18
debian: CVE-2026-3632 was patched at 2026-03-18
debian: CVE-2026-25896 was patched at 2026-03-18
debian: CVE-2026-28348 was patched at 2026-03-18
debian: CVE-2026-25500 was patched at 2026-03-18
ubuntu: CVE-2026-25500 was patched at 2026-02-26
altlinux: CVE-2026-27586 was patched at 2026-03-04, 2026-03-05
debian: CVE-2026-27586 was patched at 2026-03-18
altlinux: CVE-2026-27951 was patched at 2026-02-27
debian: CVE-2026-27951 was patched at 2026-03-18
debian: CVE-2026-29776 was patched at 2026-03-18
ubuntu: CVE-2026-27951 was patched at 2026-03-18
debian: CVE-2026-27809 was patched at 2026-03-18
debian: CVE-2026-31814 was patched at 2026-03-18
debian: CVE-2026-3284 was patched at 2026-03-18
debian: CVE-2026-27837 was patched at 2026-03-18
debian: CVE-2026-27810 was patched at 2026-03-18
debian: CVE-2026-3633 was patched at 2026-03-18
debian: CVE-2026-3634 was patched at 2026-03-18
altlinux: CVE-2026-2603 was patched at 2026-03-10, 2026-03-23
altlinux: CVE-2026-3047 was patched at 2026-03-10, 2026-03-23
almalinux: CVE-2026-2768 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2768 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2800 was patched at 2026-03-16
debian: CVE-2026-2768 was patched at 2026-02-25, 2026-02-28, 2026-03-18
oraclelinux: CVE-2026-2768 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2768 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
debian: CVE-2026-3541 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3542 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3543 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3932 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3934 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3938 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3939 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3940 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-22205 was patched at 2026-03-03, 2026-03-18
altlinux: CVE-2026-25966 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25966 was patched at 2026-03-09, 2026-03-18
altlinux: CVE-2026-1965 was patched at 2026-03-16
debian: CVE-2026-1965 was patched at 2026-03-18
ubuntu: CVE-2026-1965 was patched at 2026-03-11, 2026-03-16
altlinux: CVE-2026-33550 was patched at 2026-03-05, 2026-03-10
debian: CVE-2026-33550 was patched at 2026-03-25
debian: CVE-2025-15581 was patched at 2026-02-28, 2026-03-18
debian: CVE-2026-32953 was patched at 2026-03-18
debian: CVE-2026-4105 was patched at 2026-03-18
debian: CVE-2026-27206 was patched at 2026-03-18
almalinux: CVE-2026-0797 was patched at 2026-03-10, 2026-03-19
almalinux: CVE-2026-2044 was patched at 2026-03-10, 2026-03-19
almalinux: CVE-2026-2045 was patched at 2026-03-10, 2026-03-19
almalinux: CVE-2026-2047 was patched at 2026-03-10
almalinux: CVE-2026-2048 was patched at 2026-03-10, 2026-03-19
debian: CVE-2026-0797 was patched at 2026-03-03, 2026-03-18
debian: CVE-2026-2044 was patched at 2026-03-03, 2026-03-18
debian: CVE-2026-2045 was patched at 2026-03-03, 2026-03-18
debian: CVE-2026-2047 was patched at 2026-03-18
debian: CVE-2026-2048 was patched at 2026-03-03, 2026-03-18
oraclelinux: CVE-2026-0797 was patched at 2026-03-10, 2026-03-19
oraclelinux: CVE-2026-2044 was patched at 2026-03-10, 2026-03-19
oraclelinux: CVE-2026-2045 was patched at 2026-03-10, 2026-03-19
oraclelinux: CVE-2026-2047 was patched at 2026-03-10
oraclelinux: CVE-2026-2048 was patched at 2026-03-10, 2026-03-19
redhat: CVE-2026-0797 was patched at 2026-03-10, 2026-03-19, 2026-03-23
redhat: CVE-2026-2044 was patched at 2026-03-10, 2026-03-19, 2026-03-23
redhat: CVE-2026-2045 was patched at 2026-03-10, 2026-03-19, 2026-03-23
redhat: CVE-2026-2047 was patched at 2026-03-10
redhat: CVE-2026-2048 was patched at 2026-03-10, 2026-03-19, 2026-03-23
redos: CVE-2026-2047 was patched at 2026-03-19
almalinux: CVE-2026-2792 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2793 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2792 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2793 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2807 was patched at 2026-03-16
debian: CVE-2026-2792 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2793 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27932 was patched at 2026-03-18
oraclelinux: CVE-2026-2792 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2793 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2792 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2793 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redos: CVE-2025-46295 was patched at 2026-02-24
debian: CVE-2026-2920 was patched at 2026-03-18
debian: CVE-2026-2921 was patched at 2026-03-17, 2026-03-18
debian: CVE-2026-2922 was patched at 2026-03-18
debian: CVE-2026-2923 was patched at 2026-03-18
debian: CVE-2026-3081 was patched at 2026-03-18
debian: CVE-2026-3082 was patched at 2026-03-18
debian: CVE-2026-3083 was patched at 2026-03-18
debian: CVE-2026-30838 was patched at 2026-03-18
debian: CVE-2026-3084 was patched at 2026-03-18
debian: CVE-2026-3085 was patched at 2026-03-18
debian: CVE-2026-30853 was patched at 2026-03-18
debian: CVE-2026-3086 was patched at 2026-03-18
debian: CVE-2026-31900 was patched at 2026-03-18
redos: CVE-2025-15566 was patched at 2026-03-10
redos: CVE-2026-1580 was patched at 2026-03-10
redos: CVE-2026-24512 was patched at 2026-03-11
almalinux: CVE-2025-14905 was patched at 2026-02-24
altlinux: CVE-2025-14905 was patched at 2026-02-27
debian: CVE-2025-14905 was patched at 2026-03-18
oraclelinux: CVE-2025-14905 was patched at 2026-02-24, 2026-03-24
redhat: CVE-2025-14905 was patched at 2026-02-24, 2026-03-10, 2026-03-17, 2026-03-23, 2026-03-24
debian: CVE-2026-22206 was patched at 2026-03-03, 2026-03-18
debian: CVE-2026-27894 was patched at 2026-03-18
debian: CVE-2026-27895 was patched at 2026-03-18
debian: CVE-2025-61982 was patched at 2026-03-18
debian: CVE-2026-0847 was patched at 2026-03-18
debian: CVE-2026-0848 was patched at 2026-03-18
debian: CVE-2026-28364 was patched at 2026-03-18
debian: CVE-2026-3545 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3916 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3924 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3928 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3929 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3930 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3941 was patched at 2026-03-12, 2026-03-18
almalinux: CVE-2026-2761 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2790 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2761 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2790 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2761 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2790 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27903 was patched at 2026-03-18
debian: CVE-2026-27904 was patched at 2026-03-18
oraclelinux: CVE-2026-2761 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2790 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2761 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2790 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
altlinux: CVE-2026-1486 was patched at 2026-03-10, 2026-03-23
debian: CVE-2026-2673 was patched at 2026-03-18
altlinux: CVE-2025-54368 was patched at 2026-03-03, 2026-03-10
debian: CVE-2025-11143 was patched at 2026-03-18
debian: CVE-2026-23941 was patched at 2026-03-18
debian: CVE-2025-40931 was patched at 2026-03-18
debian: CVE-2025-40932 was patched at 2026-03-18
debian: CVE-2026-28500 was patched at 2026-03-18
debian: CVE-2026-28421 was patched at 2026-03-18
ubuntu: CVE-2026-28421 was patched at 2026-03-16
debian: CVE-2026-24281 was patched at 2026-03-18
almalinux: CVE-2025-12801 was patched at 2026-03-05
debian: CVE-2025-12801 was patched at 2026-03-18
oraclelinux: CVE-2025-12801 was patched at 2026-03-05, 2026-03-06
redhat: CVE-2025-12801 was patched at 2026-03-05, 2026-03-06
debian: CVE-2026-26994 was patched at 2026-03-18
debian: CVE-2025-71240 was patched at 2026-03-18
redos: CVE-2025-68939 was patched at 2026-02-24
debian: CVE-2026-3644 was patched at 2026-03-18
debian: CVE-2026-3706 was patched at 2026-03-18
almalinux: CVE-2026-26130 was patched at 2026-03-12
oraclelinux: CVE-2026-26130 was patched at 2026-03-12, 2026-03-13
redhat: CVE-2026-26130 was patched at 2026-03-12
ubuntu: CVE-2026-26130 was patched at 2026-03-11
debian: CVE-2026-31812 was patched at 2026-03-18
debian: CVE-2026-28356 was patched at 2026-03-12, 2026-03-18
almalinux: CVE-2026-2777 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2780 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2782 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2777 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2780 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2782 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2777 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2780 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27809 was patched at 2026-03-18
debian: CVE-2026-2782 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27824 was patched at 2026-03-18
oraclelinux: CVE-2026-2777 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2780 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2782 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2777 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2780 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2782 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
altlinux: CVE-2026-24484 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-24485 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25796 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25798 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25799 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25967 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25970 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25985 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25989 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-26066 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-26283 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-24484 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-24485 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25796 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25798 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25799 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25967 was patched at 2026-03-09, 2026-03-18
debian: CVE-2026-25970 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25985 was patched at 2026-03-09, 2026-03-18
debian: CVE-2026-25989 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-26066 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-26283 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-31853 was patched at 2026-03-18, 2026-03-19
redhat: CVE-2026-25985 was patched at 2026-03-24
altlinux: CVE-2026-23067 was patched at 2026-02-26
altlinux: CVE-2026-23082 was patched at 2026-02-26
altlinux: CVE-2026-23109 was patched at 2026-02-26
altlinux: CVE-2026-23235 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
altlinux: CVE-2026-23238 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2025-71265 was patched at 2026-03-18
debian: CVE-2025-71266 was patched at 2026-03-18
debian: CVE-2025-71267 was patched at 2026-03-18
debian: CVE-2026-23235 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-23238 was patched at 2026-03-12, 2026-03-18
oraclelinux: CVE-2026-23082 was patched at 2026-03-20
oraclelinux: CVE-2026-23235 was patched at 2026-03-20
debian: CVE-2026-23943 was patched at 2026-03-18
debian: CVE-2026-1526 was patched at 2026-03-18
debian: CVE-2026-2229 was patched at 2026-03-18
debian: CVE-2026-2581 was patched at 2026-03-18
debian: CVE-2026-1605 was patched at 2026-03-18
debian: CVE-2026-2436 was patched at 2026-03-18
debian: CVE-2026-4359 was patched at 2026-03-18
redos: CVE-2026-1850 was patched at 2026-03-11
redos: CVE-2025-68151 was patched at 2026-03-10
debian: CVE-2026-27204 was patched at 2026-03-18
altlinux: CVE-2026-3202 was patched at 2026-02-27
altlinux: CVE-2026-2575 was patched at 2026-03-10, 2026-03-23
debian: CVE-2026-27024 was patched at 2026-03-18
debian: CVE-2026-27026 was patched at 2026-03-18
debian: CVE-2026-27628 was patched at 2026-03-18
debian: CVE-2026-28351 was patched at 2026-03-18
debian: CVE-2026-31826 was patched at 2026-03-18
debian: CVE-2025-69653 was patched at 2026-03-18
debian: CVE-2025-69654 was patched at 2026-03-18
altlinux: CVE-2026-27596 was patched at 2026-03-09
altlinux: CVE-2026-27631 was patched at 2026-03-09
debian: CVE-2026-27596 was patched at 2026-03-18
debian: CVE-2026-27631 was patched at 2026-03-18
ubuntu: CVE-2026-27596 was patched at 2026-03-18
ubuntu: CVE-2026-27631 was patched at 2026-03-18
redos: CVE-2025-68383 was patched at 2026-03-10
debian: CVE-2026-21619 was patched at 2026-03-18
altlinux: CVE-2026-31958 was patched at 2026-03-18
debian: CVE-2026-31958 was patched at 2026-03-18
almalinux: CVE-2026-26103 was patched at 2026-03-02
altlinux: CVE-2026-26103 was patched at 2026-03-03
oraclelinux: CVE-2026-26103 was patched at 2026-03-02
almalinux: CVE-2026-4111 was patched at 2026-03-19
debian: CVE-2026-4111 was patched at 2026-03-18
oraclelinux: CVE-2026-4111 was patched at 2026-03-19
redhat: CVE-2026-4111 was patched at 2026-03-19
redos: CVE-2025-68388 was patched at 2026-03-10
altlinux: CVE-2026-25949 was patched at 2026-02-20
altlinux: CVE-2026-26998 was patched at 2026-03-06, 2026-03-10
altlinux: CVE-2026-26999 was patched at 2026-03-06, 2026-03-10
debian: CVE-2026-27572 was patched at 2026-03-18
debian: CVE-2025-71264 was patched at 2026-03-18
debian: CVE-2026-2219 was patched at 2026-03-18
debian: CVE-2026-23555 was patched at 2026-03-18
debian: CVE-2026-2739 was patched at 2026-03-18
debian: CVE-2026-30405 was patched at 2026-03-18
debian: CVE-2026-32635 was patched at 2026-03-18
debian: CVE-2025-71241 was patched at 2026-03-18
debian: CVE-2026-26223 was patched at 2026-03-03, 2026-03-18
debian: CVE-2026-26345 was patched at 2026-03-03, 2026-03-18
debian: CVE-2026-27473 was patched at 2026-03-03, 2026-03-18
debian: CVE-2026-27474 was patched at 2026-03-03, 2026-03-18
altlinux: CVE-2025-71276 was patched at 2026-03-05, 2026-03-10
altlinux: CVE-2026-3054 was patched at 2026-03-05
debian: CVE-2025-71276 was patched at 2026-03-25
debian: CVE-2026-3054 was patched at 2026-03-18
debian: CVE-2026-30838 was patched at 2026-03-18
debian: CVE-2025-15599 was patched at 2026-03-18
debian: CVE-2026-0540 was patched at 2026-03-18
altlinux: CVE-2026-27142 was patched at 2026-03-10, 2026-03-23
debian: CVE-2026-27142 was patched at 2026-03-18
debian: CVE-2026-3884 was patched at 2026-03-18
debian: CVE-2026-32640 was patched at 2026-03-18
altlinux: CVE-2026-25797 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25797 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-27830 was patched at 2026-03-18
redhat: CVE-2026-0603 was patched at 2026-03-18
altlinux: CVE-2026-2092 was patched at 2026-03-10, 2026-03-23
almalinux: CVE-2026-2783 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2783 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2803 was patched at 2026-03-16
debian: CVE-2026-2783 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27830 was patched at 2026-03-18
debian: CVE-2026-27837 was patched at 2026-03-18
oraclelinux: CVE-2026-2783 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2783 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
altlinux: CVE-2026-24481 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25898 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25982 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-24481 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25898 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25982 was patched at 2026-03-09, 2026-03-10, 2026-03-18
ubuntu: CVE-2026-25898 was patched at 2026-03-04
debian: CVE-2025-70873 was patched at 2026-03-18
debian: CVE-2026-3441 was patched at 2026-03-18
debian: CVE-2026-2297 was patched at 2026-03-18
debian: CVE-2026-27970 was patched at 2026-03-18
altlinux: CVE-2025-14778 was patched at 2026-03-10, 2026-03-23
altlinux: CVE-2026-2007 was patched at 2026-03-03
debian: CVE-2026-1525 was patched at 2026-03-18
debian: CVE-2026-28417 was patched at 2026-03-18
ubuntu: CVE-2026-28417 was patched at 2026-03-16
debian: CVE-2026-27982 was patched at 2026-03-18
debian: CVE-2025-71244 was patched at 2026-03-18
almalinux: CVE-2026-2762 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2774 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2781 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2762 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2774 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2781 was patched at 2026-03-16, 2026-03-24
debian: CVE-2026-2762 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27622 was patched at 2026-03-18
debian: CVE-2026-27624 was patched at 2026-03-18
debian: CVE-2026-27628 was patched at 2026-03-18
debian: CVE-2026-2774 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2781 was patched at 2026-02-25, 2026-02-26, 2026-02-28, 2026-03-18
debian: CVE-2026-27810 was patched at 2026-03-18
oraclelinux: CVE-2026-2762 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2774 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2781 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2762 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2774 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2781 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
ubuntu: CVE-2026-2781 was patched at 2026-03-04, 2026-03-05
debian: CVE-2026-2649 was patched at 2026-02-20, 2026-03-18
debian: CVE-2026-3536 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3538 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3914 was patched at 2026-03-12, 2026-03-18
altlinux: CVE-2026-25897 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25897 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-28493 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-30937 was patched at 2026-03-18, 2026-03-19
ubuntu: CVE-2026-25897 was patched at 2026-03-04
debian: CVE-2025-66168 was patched at 2026-03-18
debian: CVE-2026-32239 was patched at 2026-03-18
altlinux: CVE-2026-3172 was patched at 2026-03-02, 2026-03-03
debian: CVE-2025-34297 was patched at 2026-03-18
debian: CVE-2026-3172 was patched at 2026-03-18
debian: CVE-2026-32775 was patched at 2026-03-18
debian: CVE-2026-2648 was patched at 2026-02-20, 2026-03-18
debian: CVE-2026-2650 was patched at 2026-02-20, 2026-03-18
debian: CVE-2026-3061 was patched at 2026-02-26, 2026-03-18
debian: CVE-2026-3062 was patched at 2026-02-26, 2026-03-18
debian: CVE-2026-3537 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3539 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3540 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3544 was patched at 2026-03-05, 2026-03-18
debian: CVE-2026-3913 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3915 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3917 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3918 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3919 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3920 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3921 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3922 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3923 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3926 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3931 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3936 was patched at 2026-03-12, 2026-03-18
almalinux: CVE-2026-2758 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2763 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2764 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2765 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2766 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2767 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2769 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2770 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2771 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2772 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2773 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2776 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2778 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2779 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2785 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2786 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2787 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2788 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2789 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2758 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-27585 was patched at 2026-03-04, 2026-03-05
altlinux: CVE-2026-27586 was patched at 2026-03-04, 2026-03-05
altlinux: CVE-2026-27589 was patched at 2026-03-04, 2026-03-05
altlinux: CVE-2026-2763 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-27631 was patched at 2026-03-09
altlinux: CVE-2026-2764 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2765 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2766 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2767 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2769 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2770 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2771 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2772 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2773 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2776 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2778 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2779 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-27798 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-27799 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-2785 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2786 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2787 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2788 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2789 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2795 was patched at 2026-03-16
altlinux: CVE-2026-27950 was patched at 2026-02-27
altlinux: CVE-2026-27951 was patched at 2026-02-27
altlinux: CVE-2026-2797 was patched at 2026-03-16
altlinux: CVE-2026-2798 was patched at 2026-03-16
altlinux: CVE-2026-2799 was patched at 2026-03-16
altlinux: CVE-2026-2804 was patched at 2026-03-16
altlinux: CVE-2026-2805 was patched at 2026-03-16
debian: CVE-2026-2758 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27585 was patched at 2026-03-18
debian: CVE-2026-27586 was patched at 2026-03-18
debian: CVE-2026-27587 was patched at 2026-03-18
debian: CVE-2026-27588 was patched at 2026-03-18
debian: CVE-2026-27589 was patched at 2026-03-18
debian: CVE-2026-2763 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27631 was patched at 2026-03-18
debian: CVE-2026-2764 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2765 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2766 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2767 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2769 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27699 was patched at 2026-03-18
debian: CVE-2026-2770 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2771 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2772 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2773 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2776 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2778 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2779 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27798 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-27799 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-2785 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2786 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2787 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2788 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27888 was patched at 2026-03-18
debian: CVE-2026-2789 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27894 was patched at 2026-03-18
debian: CVE-2026-27895 was patched at 2026-03-18
debian: CVE-2026-27950 was patched at 2026-03-18
debian: CVE-2026-27951 was patched at 2026-03-18
debian: CVE-2026-27970 was patched at 2026-03-18
debian: CVE-2026-27982 was patched at 2026-03-18
oraclelinux: CVE-2026-2758 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2763 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2764 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2765 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2766 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2767 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2769 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2770 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2771 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2772 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2773 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2776 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2778 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2779 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2785 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2786 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2787 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2788 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2789 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2758 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2763 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2764 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2765 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2766 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2767 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2769 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2770 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2771 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2772 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2773 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2776 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2778 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2779 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2785 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2786 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2787 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2788 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2789 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
ubuntu: CVE-2026-27631 was patched at 2026-03-18
ubuntu: CVE-2026-27950 was patched at 2026-03-18
ubuntu: CVE-2026-27951 was patched at 2026-03-18
debian: CVE-2026-27459 was patched at 2026-03-18
redos: CVE-2025-67896 was patched at 2026-03-10
almalinux: CVE-2025-40249 was patched at 2026-03-09
altlinux: CVE-2025-71238 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
altlinux: CVE-2026-23077 was patched at 2026-02-26
altlinux: CVE-2026-23092 was patched at 2026-02-26
altlinux: CVE-2026-23115 was patched at 2026-02-26
altlinux: CVE-2026-23117 was patched at 2026-02-26
altlinux: CVE-2026-23127 was patched at 2026-02-26
altlinux: CVE-2026-23130 was patched at 2026-02-26
altlinux: CVE-2026-23153 was patched at 2026-02-26
altlinux: CVE-2026-23155 was patched at 2026-02-20, 2026-03-06, 2026-03-09
altlinux: CVE-2026-23162 was patched at 2026-02-26
altlinux: CVE-2026-23184 was patched at 2026-02-26
altlinux: CVE-2026-23185 was patched at 2026-02-26
altlinux: CVE-2026-23192 was patched at 2026-02-26
altlinux: CVE-2026-23194 was patched at 2026-02-26
altlinux: CVE-2026-23195 was patched at 2026-02-26
altlinux: CVE-2026-23196 was patched at 2026-02-26
altlinux: CVE-2026-23197 was patched at 2026-02-26
altlinux: CVE-2026-23218 was patched at 2026-02-26
altlinux: CVE-2026-23221 was patched at 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
altlinux: CVE-2026-23226 was patched at 2026-02-26
altlinux: CVE-2026-23227 was patched at 2026-02-26
altlinux: CVE-2026-23231 was patched at 2026-03-02, 2026-03-14
altlinux: CVE-2026-23233 was patched at 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-18
altlinux: CVE-2026-23234 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
altlinux: CVE-2026-23237 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2025-71238 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-23221 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-23226 was patched at 2026-03-18
debian: CVE-2026-23227 was patched at 2026-03-18
debian: CVE-2026-23231 was patched at 2026-03-18
debian: CVE-2026-23233 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-23234 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-23237 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-23239 was patched at 2026-03-18
debian: CVE-2026-23240 was patched at 2026-03-18
debian: CVE-2026-23242 was patched at 2026-03-18
debian: CVE-2026-23246 was patched at 2026-03-18
oraclelinux: CVE-2025-40249 was patched at 2026-03-10
oraclelinux: CVE-2025-71238 was patched at 2026-03-20
oraclelinux: CVE-2026-23155 was patched at 2026-03-20
oraclelinux: CVE-2026-23221 was patched at 2026-03-20
oraclelinux: CVE-2026-23233 was patched at 2026-03-20
oraclelinux: CVE-2026-23234 was patched at 2026-03-20
oraclelinux: CVE-2026-23237 was patched at 2026-03-20
ubuntu: CVE-2025-40249 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-40255 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-40290 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68232 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68323 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68326 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68373 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68375 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68738 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68760 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-71128 was patched at 2026-03-16, 2026-03-17
altlinux: CVE-2026-25637 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25638 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25794 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25795 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25968 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25969 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25971 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25983 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25986 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25987 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-26284 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-26983 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-27798 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25637 was patched at 2026-03-09, 2026-03-18
debian: CVE-2026-25638 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25794 was patched at 2026-03-09, 2026-03-18
debian: CVE-2026-25795 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25968 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25969 was patched at 2026-03-09, 2026-03-18
debian: CVE-2026-25971 was patched at 2026-03-09, 2026-03-18
debian: CVE-2026-25983 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25986 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25987 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-26284 was patched at 2026-03-09, 2026-03-18
debian: CVE-2026-26983 was patched at 2026-03-09, 2026-03-18
debian: CVE-2026-27798 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-28494 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-28687 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-28688 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-28690 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-28692 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-28693 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-30883 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-30931 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-30935 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-30936 was patched at 2026-03-18, 2026-03-19
ubuntu: CVE-2026-25968 was patched at 2026-03-04
ubuntu: CVE-2026-25983 was patched at 2026-03-04
ubuntu: CVE-2026-25986 was patched at 2026-03-04
ubuntu: CVE-2026-25987 was patched at 2026-03-04
ubuntu: CVE-2026-26284 was patched at 2026-03-04
almalinux: CVE-2026-26127 was patched at 2026-03-12
oraclelinux: CVE-2026-26127 was patched at 2026-03-12, 2026-03-13
redhat: CVE-2026-26127 was patched at 2026-03-12
ubuntu: CVE-2026-26127 was patched at 2026-03-11
altlinux: CVE-2026-27950 was patched at 2026-02-27
debian: CVE-2026-27950 was patched at 2026-03-18
ubuntu: CVE-2026-27950 was patched at 2026-03-18
altlinux: CVE-2026-3731 was patched at 2026-03-11, 2026-03-12
debian: CVE-2026-3731 was patched at 2026-03-18
ubuntu: CVE-2026-3731 was patched at 2026-03-16
debian: CVE-2026-27942 was patched at 2026-03-18
debian: CVE-2026-27571 was patched at 2026-03-18
almalinux: CVE-2026-21863 was patched at 2026-02-26, 2026-03-02
debian: CVE-2026-21863 was patched at 2026-03-18
oraclelinux: CVE-2026-21863 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-21863 was patched at 2026-03-02
ubuntu: CVE-2026-21863 was patched at 2026-03-18
debian: CVE-2026-4177 was patched at 2026-03-18, 2026-03-22
debian: CVE-2026-4015 was patched at 2026-03-18
debian: CVE-2026-4016 was patched at 2026-03-18
debian: CVE-2026-4185 was patched at 2026-03-18
debian: CVE-2026-27025 was patched at 2026-03-18
debian: CVE-2026-32776 was patched at 2026-03-18
debian: CVE-2026-32778 was patched at 2026-03-18
debian: CVE-2026-28418 was patched at 2026-03-18
debian: CVE-2026-28420 was patched at 2026-03-18
debian: CVE-2026-28422 was patched at 2026-03-18
ubuntu: CVE-2026-28418 was patched at 2026-03-16
ubuntu: CVE-2026-28420 was patched at 2026-03-16
ubuntu: CVE-2026-28422 was patched at 2026-03-16
debian: CVE-2026-23865 was patched at 2026-03-18
debian: CVE-2026-23868 was patched at 2026-03-18
debian: CVE-2026-2889 was patched at 2026-03-18
debian: CVE-2026-2903 was patched at 2026-03-18
debian: CVE-2026-29063 was patched at 2026-03-18
debian: CVE-2026-3713 was patched at 2026-03-18
debian: CVE-2026-3949 was patched at 2026-03-18
debian: CVE-2026-3994 was patched at 2026-03-18
ubuntu: CVE-2026-23865 was patched at 2026-03-12
altlinux: CVE-2026-25965 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25965 was patched at 2026-03-09, 2026-03-10, 2026-03-18
redhat: CVE-2026-25965 was patched at 2026-03-24
debian: CVE-2026-32274 was patched at 2026-03-18
debian: CVE-2026-23907 was patched at 2026-03-18
debian: CVE-2026-21620 was patched at 2026-03-18
debian: CVE-2026-23942 was patched at 2026-03-18
oraclelinux: CVE-2026-21991 was patched at 2026-03-13
debian: CVE-2026-27472 was patched at 2026-03-03, 2026-03-18
debian: CVE-2026-28295 was patched at 2026-03-18
debian: CVE-2026-3925 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3927 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3935 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3937 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-3942 was patched at 2026-03-12, 2026-03-18
almalinux: CVE-2026-2757 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2759 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2760 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2775 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2784 was patched at 2026-02-25, 2026-03-02
almalinux: CVE-2026-2791 was patched at 2026-02-25, 2026-03-02
altlinux: CVE-2026-2757 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2759 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-27590 was patched at 2026-03-04, 2026-03-05
altlinux: CVE-2026-27596 was patched at 2026-03-09
altlinux: CVE-2026-2760 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2775 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2784 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2791 was patched at 2026-03-16, 2026-03-24
altlinux: CVE-2026-2794 was patched at 2026-03-16
altlinux: CVE-2026-2796 was patched at 2026-03-16
altlinux: CVE-2026-2801 was patched at 2026-03-16
altlinux: CVE-2026-2802 was patched at 2026-03-16
altlinux: CVE-2026-2806 was patched at 2026-03-16
debian: CVE-2026-2757 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27571 was patched at 2026-03-18
debian: CVE-2026-27572 was patched at 2026-03-18
debian: CVE-2026-2759 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27590 was patched at 2026-03-18
debian: CVE-2026-27596 was patched at 2026-03-18
debian: CVE-2026-2760 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27601 was patched at 2026-03-18
debian: CVE-2026-27606 was patched at 2026-03-18
debian: CVE-2026-2775 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2784 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-2791 was patched at 2026-02-25, 2026-02-28, 2026-03-18
debian: CVE-2026-27942 was patched at 2026-03-18
debian: CVE-2026-27962 was patched at 2026-03-18
oraclelinux: CVE-2026-2757 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2759 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2760 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-27606 was patched at 2026-03-13
oraclelinux: CVE-2026-2775 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2784 was patched at 2026-02-26, 2026-03-02
oraclelinux: CVE-2026-2791 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2026-2757 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2759 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2760 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2775 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2784 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
redhat: CVE-2026-2791 was patched at 2026-02-25, 2026-03-02, 2026-03-09, 2026-03-10, 2026-03-12
ubuntu: CVE-2026-27596 was patched at 2026-03-18
altlinux: CVE-2025-71227 was patched at 2026-02-26
altlinux: CVE-2025-71230 was patched at 2026-02-26
altlinux: CVE-2026-23079 was patched at 2026-02-26
altlinux: CVE-2026-23081 was patched at 2026-02-26
altlinux: CVE-2026-23106 was patched at 2026-02-26
altlinux: CVE-2026-23114 was patched at 2026-02-26
altlinux: CVE-2026-23122 was patched at 2026-02-26
altlinux: CVE-2026-23132 was patched at 2026-02-26
altlinux: CVE-2026-23134 was patched at 2026-02-26
altlinux: CVE-2026-23147 was patched at 2026-02-26
altlinux: CVE-2026-23149 was patched at 2026-02-26
altlinux: CVE-2026-23165 was patched at 2026-02-26
altlinux: CVE-2026-23186 was patched at 2026-02-26
altlinux: CVE-2026-23203 was patched at 2026-02-26
altlinux: CVE-2026-23211 was patched at 2026-02-26
altlinux: CVE-2026-23212 was patched at 2026-02-20, 2026-02-26, 2026-02-28, 2026-03-06, 2026-03-09
altlinux: CVE-2026-23217 was patched at 2026-02-26
altlinux: CVE-2026-23236 was patched at 2026-02-20, 2026-02-26, 2026-03-06, 2026-03-09, 2026-03-14, 2026-03-18
debian: CVE-2025-71227 was patched at 2026-03-18
debian: CVE-2025-71239 was patched at 2026-03-18
debian: CVE-2026-23212 was patched at 2026-03-18
debian: CVE-2026-23217 was patched at 2026-03-18
debian: CVE-2026-23236 was patched at 2026-03-12, 2026-03-18
debian: CVE-2026-23243 was patched at 2026-03-18
debian: CVE-2026-23244 was patched at 2026-03-18
debian: CVE-2026-23245 was patched at 2026-03-18
debian: CVE-2026-23247 was patched at 2026-03-18
oraclelinux: CVE-2025-38276 was patched at 2026-02-20
oraclelinux: CVE-2025-38357 was patched at 2026-02-20
oraclelinux: CVE-2025-68300 was patched at 2026-02-20
oraclelinux: CVE-2026-23212 was patched at 2026-03-20
oraclelinux: CVE-2026-23236 was patched at 2026-03-20
ubuntu: CVE-2025-40260 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-40265 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68212 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68221 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68225 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68228 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68234 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68262 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68281 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68294 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68299 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68300 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68370 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68726 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68739 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68743 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68752 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68754 was patched at 2026-03-16, 2026-03-17
ubuntu: CVE-2025-68762 was patched at 2026-03-16, 2026-03-17
debian: CVE-2026-32829 was patched at 2026-03-18
debian: CVE-2026-28384 was patched at 2026-03-18
debian: CVE-2026-3063 was patched at 2026-02-26, 2026-03-18
altlinux: CVE-2026-0707 was patched at 2026-03-10, 2026-03-23
altlinux: CVE-2026-1190 was patched at 2026-03-10, 2026-03-23
altlinux: CVE-2026-2733 was patched at 2026-03-10, 2026-03-23
altlinux: CVE-2026-3009 was patched at 2026-03-10, 2026-03-23
debian: CVE-2026-3497 was patched at 2026-03-18
ubuntu: CVE-2026-3497 was patched at 2026-03-12
altlinux: CVE-2026-25576 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-25988 was patched at 2026-03-03, 2026-03-04
altlinux: CVE-2026-27799 was patched at 2026-03-03, 2026-03-04
debian: CVE-2026-25576 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-25988 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-27799 was patched at 2026-03-09, 2026-03-10, 2026-03-18
debian: CVE-2026-28686 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-28689 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-28691 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-30929 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-32259 was patched at 2026-03-18, 2026-03-19
debian: CVE-2026-3381 was patched at 2026-03-18
debian: CVE-2026-1528 was patched at 2026-03-18
debian: CVE-2026-2808 was patched at 2026-03-18
redos: CVE-2026-24513 was patched at 2026-03-11
debian: CVE-2026-3904 was patched at 2026-03-18
debian: CVE-2026-27448 was patched at 2026-03-18
debian: CVE-2026-25674 was patched at 2026-03-18
debian: CVE-2026-32772 was patched at 2026-03-18
altlinux: CVE-2026-23925 was patched at 2026-03-20, 2026-03-24
debian: CVE-2026-23925 was patched at 2026-03-18
altlinux: CVE-2025-15558 was patched at 2026-02-19
debian: CVE-2026-32240 was patched at 2026-03-18
debian: CVE-2021-4456 was patched at 2026-03-18
ubuntu: CVE-2021-4456 was patched at 2026-03-18
debian: CVE-2025-71242 was patched at 2026-03-18
altlinux: CVE-2026-29054 was patched at 2026-03-06, 2026-03-10
debian: CVE-2026-24308 was patched at 2026-03-18
almalinux: CVE-2025-67733 was patched at 2026-02-26, 2026-03-02
debian: CVE-2025-67733 was patched at 2026-03-18
oraclelinux: CVE-2025-67733 was patched at 2026-02-26, 2026-03-02
redhat: CVE-2025-67733 was patched at 2026-03-02
ubuntu: CVE-2025-67733 was patched at 2026-03-18
almalinux: CVE-2026-26104 was patched at 2026-03-02
altlinux: CVE-2026-26104 was patched at 2026-03-03
oraclelinux: CVE-2026-26104 was patched at 2026-03-02
debian: CVE-2026-28419 was patched at 2026-03-18
ubuntu: CVE-2026-28419 was patched at 2026-03-16
debian: CVE-2026-1527 was patched at 2026-03-18
debian: CVE-2026-28804 was patched at 2026-03-18
altlinux: CVE-2026-21860 was patched at 2026-03-13
altlinux: CVE-2025-14821 was patched at 2026-03-11, 2026-03-12
altlinux: CVE-2026-1609 was patched at 2026-03-10, 2026-03-23
altlinux: CVE-2026-25679 was patched at 2026-03-10, 2026-03-23
altlinux: CVE-2026-27139 was patched at 2026-03-10, 2026-03-23
altlinux: CVE-2026-31958 was patched at 2026-03-18
debian: CVE-2026-0846 was patched at 2026-03-18
debian: CVE-2026-23554 was patched at 2026-03-18
debian: CVE-2026-2708 was patched at 2026-03-18
debian: CVE-2026-27139 was patched at 2026-03-18
debian: CVE-2026-3184 was patched at 2026-03-18
debian: CVE-2026-3195 was patched at 2026-03-18
debian: CVE-2026-31958 was patched at 2026-03-18
debian: CVE-2026-3196 was patched at 2026-03-18
debian: CVE-2026-3312 was patched at 2026-03-18
debian: CVE-2026-4224 was patched at 2026-03-18
oraclelinux: CVE-2025-68789 was patched at 2026-02-20
redos: CVE-2025-38213 was patched at 2026-02-20
redos: CVE-2025-68940 was patched at 2026-02-24
redos: CVE-2025-68941 was patched at 2026-02-24
debian: CVE-2026-27205 was patched at 2026-03-18
ubuntu: CVE-2026-27205 was patched at 2026-03-18
debian: CVE-2026-26958 was patched at 2026-03-18