CWE-682

Incorrect Calculation

8 CVEs Avg CVSS 5.8 MITRE
1
CRITICAL
2
HIGH
3
MEDIUM
2
LOW
0
POC
0
KEV

Monthly

CVE-2026-1229 CRITICAL PATCH Act Now

Incorrect computation in CIRCL cryptographic library's CombinedMult function for secp384r1 (P-384) curve. Produces wrong elliptic curve multiplication results for specific inputs, potentially breaking ECDSA signature verification.

Github Circl Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-24783 HIGH PATCH This Week

Incorrect rounding in the mulDiv() function of soroban-fixed-point-math versions 1.3.0 and 1.4.0 allows attackers to manipulate fixed-point arithmetic results in Soroban smart contracts by exploiting sign handling when both the intermediate product and divisor are negative. This affects all signed FixedPoint implementations (i64, i128, I256) and could enable financial miscalculations or loss of funds in dependent contracts. A patch is available in versions 1.3.1 and 1.4.1.

Information Disclosure Soroban Fixed Point Math
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-21911 MEDIUM This Month

MAC learning failures in Juniper Junos OS Evolved's Layer 2 Control Protocol Daemon can be triggered by a network-adjacent attacker who repeatedly toggles the management interface, causing label-switched interface MAC address learning to halt while generating excessive logs and consuming high CPU resources. This calculation error (CWE-682) affects availability through denial of service and currently has no available patch. The attack requires network adjacency but no authentication or user interaction.

Juniper Junos Os Evolved
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-59047 LOW PATCH Monitor

matrix-sdk-base is the base component to build a Matrix client library. Rated low severity (CVSS 2.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub
CVSS 4.0
2.7
EPSS
0.1%
CVE-2025-5372 MEDIUM PATCH This Month

A security vulnerability in libssh (CVSS 5.0). Remediation should follow standard vulnerability management procedures.

OpenSSL Information Disclosure Ubuntu Debian Openshift Container Platform +4
NVD
CVSS 3.1
5.0
EPSS
0.1%
CVE-2025-4435 HIGH PATCH This Week

Logic flaw in Python's TarFile module where the documented behavior of errorlevel=0 (skip filtered members) contradicts the actual implementation (extract filtered members anyway). This affects any application using Python's tarfile library with extraction filters, allowing attackers to extract files that should be blocked, potentially leading to path traversal or extraction of malicious content. The vulnerability has a high CVSS score (7.5) with network-accessible attack vector and no authentication required, though exploitation requires the application to implement extraction filters expecting them to be respected.

Python Path Traversal Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-26622 LOW PATCH Monitor

vyper is a Pythonic Smart Contract Language for the EVM. Rated low severity (CVSS 2.3), this vulnerability is remotely exploitable.

Information Disclosure Vyper
NVD GitHub
CVSS 4.0
2.3
EPSS
0.1%
CVE-2024-25883 MEDIUM This Month

The mstatus register in RSD commit 3d13a updates incorrectly, leading to processing errors. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-1229
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Incorrect computation in CIRCL cryptographic library's CombinedMult function for secp384r1 (P-384) curve. Produces wrong elliptic curve multiplication results for specific inputs, potentially breaking ECDSA signature verification.

Github Circl Suse
NVD GitHub
CVE-2026-24783
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Incorrect rounding in the mulDiv() function of soroban-fixed-point-math versions 1.3.0 and 1.4.0 allows attackers to manipulate fixed-point arithmetic results in Soroban smart contracts by exploiting sign handling when both the intermediate product and divisor are negative. This affects all signed FixedPoint implementations (i64, i128, I256) and could enable financial miscalculations or loss of funds in dependent contracts. A patch is available in versions 1.3.1 and 1.4.1.

Information Disclosure Soroban Fixed Point Math
NVD GitHub
CVE-2026-21911
EPSS 0% CVSS 6.5
MEDIUM This Month

MAC learning failures in Juniper Junos OS Evolved's Layer 2 Control Protocol Daemon can be triggered by a network-adjacent attacker who repeatedly toggles the management interface, causing label-switched interface MAC address learning to halt while generating excessive logs and consuming high CPU resources. This calculation error (CWE-682) affects availability through denial of service and currently has no available patch. The attack requires network adjacency but no authentication or user interaction.

Juniper Junos Os Evolved
NVD
CVE-2025-59047
EPSS 0% CVSS 2.7
LOW PATCH Monitor

matrix-sdk-base is the base component to build a Matrix client library. Rated low severity (CVSS 2.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub
CVE-2025-5372
EPSS 0% CVSS 5.0
MEDIUM PATCH This Month

A security vulnerability in libssh (CVSS 5.0). Remediation should follow standard vulnerability management procedures.

OpenSSL Information Disclosure Ubuntu +6
NVD
CVE-2025-4435
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Logic flaw in Python's TarFile module where the documented behavior of errorlevel=0 (skip filtered members) contradicts the actual implementation (extract filtered members anyway). This affects any application using Python's tarfile library with extraction filters, allowing attackers to extract files that should be blocked, potentially leading to path traversal or extraction of malicious content. The vulnerability has a high CVSS score (7.5) with network-accessible attack vector and no authentication required, though exploitation requires the application to implement extraction filters expecting them to be respected.

Python Path Traversal Redhat +1
NVD GitHub
CVE-2025-26622
EPSS 0% CVSS 2.3
LOW PATCH Monitor

vyper is a Pythonic Smart Contract Language for the EVM. Rated low severity (CVSS 2.3), this vulnerability is remotely exploitable.

Information Disclosure Vyper
NVD GitHub
CVE-2024-25883
EPSS 0% CVSS 5.3
MEDIUM This Month

The mstatus register in RSD commit 3d13a updates incorrectly, leading to processing errors. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy