Redhat

5103 CVEs vendor

Monthly

CVE-2026-25989 HIGH PATCH This Week

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to denial of service when processing maliciously crafted SVG files due to an off-by-one error in boundary validation. An unauthenticated remote attacker can trigger an integer underflow by bypassing the flawed size check, causing the application to crash or become unresponsive. No patch is currently available for affected deployments.

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25988 MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 contain a memory leak in the MSL parser where improper stack index management causes images to remain allocated after error conditions. An attacker could trigger this vulnerability by supplying a specially crafted image file, potentially leading to denial of service through resource exhaustion. No patch is currently available for affected systems.

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25987 MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Buffer Overflow Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-25986 MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to a heap buffer overflow in the YUV image decoder that allows remote attackers to trigger a denial of service condition by processing specially crafted YUV 4:2:2 images. The vulnerability stems from an off-by-one write error in the pixel processing loop that exceeds allocated buffer boundaries. No patch is currently available for affected installations.

Buffer Overflow Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25985 HIGH PATCH This Week

Imagemagick versions up to 7.1.2-15 is affected by allocation of resources without limits or throttling (CVSS 7.5).

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25983 MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to a heap-use-after-free condition when processing specially crafted MSL scripts, allowing unauthenticated remote attackers to cause denial of service. The vulnerability occurs when the operation element handler frees image data while the parser continues accessing it, leading to memory corruption during subsequent parsing operations. No patch is currently available for affected versions.

Use After Free Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25982 MEDIUM PATCH This Month

Medium severity vulnerability in ImageMagick. A heap out-of-bounds read vulnerability exists in the `coders/dcm.c` module. When processing DICOM files with a specific configuration, the decoder loop incorrectly reads bytes per iteration. This causes the function to read past the end of the allocated buffer, potentially leading to a Denial of Service (crash) or Information Disclosure (leaking heap memory into the image).

Denial Of Service Information Disclosure Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25971 MEDIUM PATCH This Month

Medium severity vulnerability in ImageMagick. # Magick fails to check for circular references between two MSLs, leading to a stack overflow.

Stack Overflow Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-25970 MEDIUM PATCH This Month

A signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows. ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==143838==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 #0 0x7f379d5adb53 (/lib/x86_64-linux-gnu/libc.so.6+0xc4b53) ```

Integer Overflow Memory Corruption Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25969 MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 contain a memory leak in the ASHLAR image coder where allocated memory fails to release upon exception handling, potentially causing denial of service through resource exhaustion on affected systems. An unauthenticated remote attacker can trigger this condition by processing specially crafted ASHLAR image files. No patch is currently available.

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25968 HIGH PATCH This Week

High severity vulnerability in ImageMagick. A stack buffer overflow occurs when processing the an attribute in msl.c. A long value overflows a fixed-size stack buffer, leading to memory corruption.

Buffer Overflow Memory Corruption Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
7.4
EPSS
0.1%
CVE-2026-25967 HIGH PATCH This Week

Stack-based buffer overflow in ImageMagick versions before 7.1.2-15 allows remote attackers to crash the application and potentially corrupt memory by submitting specially crafted FTXT image files. The vulnerability requires high complexity to exploit but impacts both confidentiality and availability of affected systems. No patch is currently available for this HIGH severity issue (CVSS 7.4).

Buffer Overflow Stack Overflow Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVSS 3.1
7.4
EPSS
0.1%
CVE-2026-25966 MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 allow local attackers to bypass the secure policy's stdin/stdout restrictions by using fd:<n> pseudo-filenames (e.g., fd:0, fd:1), enabling unauthorized reading and writing to standard streams. This vulnerability affects systems relying on ImageMagick's default security policies to prevent stream manipulation. No patch is currently available, though administrators can manually update their security policy configuration as a workaround.

Authentication Bypass Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-25965 HIGH PATCH This Week

ImageMagick before versions 7.1.2-15 and 6.9.13-40 allows local attackers to bypass path security policies and disclose sensitive files through path traversal sequences in filenames, as the policy enforcement occurs before filesystem resolution normalizes the paths. An attacker with local access can read restricted files like those in /etc/ even when policy-secure.xml is applied. A patch is not yet available, making this a significant risk for systems relying on ImageMagick's security policies for file access control.

Path Traversal Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
8.6
EPSS
0.0%
CVE-2026-25898 MEDIUM PATCH This Month

ImageMagick's UIL and XPM image encoders fail to validate pixel index values before using them as array subscripts, allowing an attacker to craft malicious images that trigger out-of-bounds reads in HDRI builds. Exploitation can result in information disclosure or denial of service through process crashes. Versions prior to 7.1.2-15 and 6.9.13-40 are affected, and no patch is currently available.

Buffer Overflow Denial Of Service Information Disclosure Imagemagick Redhat +1
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25897 MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 contain an integer overflow in the SUN image decoder that allows heap buffer overflow on 32-bit systems when processing specially crafted image files. Attackers can trigger this vulnerability remotely without authentication to cause denial of service or potentially achieve code execution. A patch is currently unavailable, leaving affected 32-bit installations at risk until updates are released.

Integer Overflow Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25799 MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25798 MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Null Pointer Dereference Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25797 MEDIUM PATCH This Month

Arbitrary code injection in ImageMagick's PostScript and HTML encoders allows attackers to inject malicious code that executes when files are processed by downstream applications like Ghostscript or web viewers. The vulnerability affects versions prior to 7.1.2-15 and 6.9.13-40 due to insufficient input sanitization in the ps and html coders. Users processing untrusted image files are at risk of code execution, though no patch is currently available.

RCE Code Injection Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.7
EPSS
0.0%
CVE-2026-25796 MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25795 MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Null Pointer Dereference Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25794 HIGH PATCH GHSA This Week

Integer overflow in ImageMagick's UHDR image decoder allows remote attackers to trigger heap buffer overflows by supplying specially crafted images with large dimensions, potentially crashing the application or corrupting heap memory. The vulnerability affects ImageMagick versions prior to 7.1.2-15 and requires no user interaction or authentication to exploit. Organizations using vulnerable versions should upgrade immediately, as no workaround is available.

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
8.2
EPSS
0.1%
CVE-2026-25638 MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 contain a memory leak in the MSL image coder that allows unauthenticated remote attackers to cause denial of service through resource exhaustion when processing specially crafted MSL image files. The vulnerability exists because the WriteMSLImage function fails to release allocated memory during early function returns. An attacker can exploit this over the network without authentication to exhaust server memory and crash the application.

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25637 MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Denial Of Service Imagemagick Magick.Net Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25576 MEDIUM PATCH This Month

Heap buffer over-read in ImageMagick and Magick.Net raw image format handlers allows local attackers to read sensitive data from heap memory when processing specially crafted images with mismatched extraction and size parameters. The vulnerability affects ImageMagick versions prior to 7.1.2-15 and 6.9.13-40, potentially exposing confidential information through out-of-bounds memory access. A patch is available for affected users.

Buffer Overflow Imagemagick Magick.Net Redhat Suse
NVD GitHub
CVSS 3.1
5.1
EPSS
0.0%
CVE-2026-24485 HIGH PATCH This Week

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 7.5 HIGH]

Denial Of Service Magick.Net Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-24484 MEDIUM PATCH This Month

ImageMagick and Magick.NET fail to properly validate nested MVG-to-SVG conversions, allowing unauthenticated remote attackers to trigger denial of service conditions. Affected versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to resource exhaustion attacks through specially crafted image files. A patch is available for both products.

Denial Of Service Imagemagick Magick.Net Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-27623 HIGH PATCH This Week

Denial of service in Valkey 9.0.0 through 9.0.2 allows unauthenticated network attackers to crash the server by exploiting improper networking state handling after empty requests. An attacker can trigger an assertion failure that causes the Valkey process to abort, impacting availability for all users. No patch is currently available; network isolation is recommended as a mitigation.

Code Injection Valkey Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-21863 HIGH PATCH This Week

Out-of-bounds read in Valkey clusterbus port processing allows network-adjacent attackers to crash affected systems by sending specially crafted packets that bypass buffer validation checks. This vulnerability affects Valkey versions prior to 9.0.2, 8.1.6, 8.0.7, and 7.2.12, impacting any deployment exposing the clusterbus port to untrusted networks. Patches are available and administrators should restrict clusterbus access with network ACLs as an immediate mitigation.

Denial Of Service Valkey Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-67733 HIGH PATCH This Week

Valkey is a distributed key-value database. [CVSS 8.5 HIGH]

RCE Valkey Redhat Suse
NVD GitHub
CVSS 3.1
8.5
EPSS
0.0%
CVE-2025-61145 MEDIUM POC PATCH This Month

libtiff up to v4.7.1 was discovered to contain a double free via the component tools/tiffcrop.c. [CVSS 5.0 MEDIUM]

Information Disclosure Libtiff Redhat Suse
NVD GitHub
CVSS 3.1
5.0
EPSS
0.0%
CVE-2025-61144 HIGH POC PATCH This Week

libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. [CVSS 7.3 HIGH]

Stack Overflow Libtiff Redhat Suse
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-61143 MEDIUM PATCH This Month

libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. [CVSS 5.5 MEDIUM]

Null Pointer Dereference Libtiff Redhat Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-25747 HIGH POC PATCH This Week

Deserialization of Untrusted Data vulnerability in Apache Camel LevelDB component. The Camel-LevelDB DefaultLevelDBSerializer class deserializes data read from the LevelDB aggregation repository using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. [CVSS 8.8 HIGH]

Apache Java Deserialization Camel Redhat
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-27205 MEDIUM PATCH This Month

Flask versions 3.1.2 and earlier fail to set proper cache headers when the session object is accessed through certain methods like the Python `in` operator, allowing cached responses containing user-specific session data to be served to other users. An attacker can exploit this to access sensitive information from cached responses if the application runs behind a caching proxy that doesn't ignore Set-Cookie headers. This requires the vulnerable application to lack explicit Cache-Control headers and access session data in ways that bypass normal cache-control logic.

Python Flask Redhat Suse
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-27134 HIGH This Week

Strimzi Kafka Operator versions 0.49.0-0.50.0 incorrectly trusts all intermediate CAs in a multistage certificate chain for mTLS authentication, allowing any user with a certificate signed by any CA in the chain to authenticate to Kafka listeners. This authentication bypass affects only deployments using custom Cluster or Clients CA with multi-level CA chains. No patch is currently available.

Apache Kubernetes Strimzi Kafka Operator Redhat
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-2048 HIGH PATCH This Week

GIMP is vulnerable to out-of-bounds memory write during XWD file parsing due to insufficient input validation, enabling arbitrary code execution when a user opens a malicious image file. This high-severity vulnerability (CVSS 7.8) affects local attackers who can craft specially crafted XWD files to corrupt memory and execute code with the privileges of the GIMP process. No patch is currently available.

RCE Gimp Redhat Suse
NVD VulDB
CVSS 3.0
7.8
EPSS
0.1%
CVE-2026-2047 HIGH PATCH This Week

Remote code execution in GIMP through heap buffer overflow during ICNS file parsing allows attackers to execute arbitrary code when a user opens a malicious image file. The vulnerability stems from insufficient validation of user-supplied data lengths before copying to heap memory, requiring only user interaction to trigger. A patch is available for affected installations.

RCE Buffer Overflow Heap Overflow Gimp Redhat +1
NVD VulDB
CVSS 3.0
7.8
EPSS
0.1%
CVE-2026-2045 HIGH PATCH This Week

Out-of-bounds write in GIMP's XWD file parser enables arbitrary code execution when users open malicious image files, requiring no special privileges or system access. Insufficient input validation during XWD file parsing allows attackers to overflow allocated buffers and execute code with the privileges of the affected user. A patch is available to address this vulnerability.

RCE Gimp Redhat Suse
NVD VulDB
CVSS 3.0
7.8
EPSS
0.1%
CVE-2026-2044 HIGH PATCH This Week

Arbitrary code execution in GIMP occurs when processing specially crafted PGM image files due to uninitialized memory access during file parsing. An attacker can exploit this vulnerability by tricking users into opening a malicious PGM file, resulting in code execution with the privileges of the GIMP process. A patch is available for this high-severity vulnerability (CVSS 7.8).

RCE Gimp Redhat Suse
NVD VulDB
CVSS 3.0
7.8
EPSS
0.1%
CVE-2026-27133 MEDIUM This Month

Strimzi versions 0.47.0 through 0.50.0 improperly trust all certificates in a CA chain rather than only the intended signing authority, allowing Kafka Connect and MirrorMaker 2 operands to accept connections from brokers with certificates signed by intermediate CAs. An attacker could leverage this improper certificate validation to establish unauthorized connections to Kafka clusters using alternate CA-signed certificates from the trusted chain. This vulnerability requires high privileges to configure the CA chain and has no available patch at this time.

Apache Kubernetes Strimzi Redhat
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-27125 MEDIUM PATCH This Month

Svelte versions prior to 5.51.5 improperly enumerate prototype chain properties during server-side rendering attribute spreading, allowing polluted Object.prototype properties to inject unexpected attributes into SSR output or cause rendering errors. This vulnerability affects applications using SSR where the prototype chain has been previously manipulated, though client-side rendering is unaffected. The issue requires prototype pollution as a precondition but can lead to information disclosure or denial of service in vulnerable SSR environments.

Code Injection Svelte Redhat
NVD GitHub
CVSS 3.1
6.8
EPSS
0.1%
CVE-2026-27122 MEDIUM PATCH This Month

HTML injection in Svelte's server-side rendering occurs when the `<svelte:element>` tag parameter fails to sanitize user-supplied tag names, allowing attackers to inject malicious HTML into rendered output. This affects Svelte versions prior to 5.51.5 and requires user interaction to exploit, with client-side rendering remaining unaffected. An authenticated attacker can achieve limited information disclosure or modify page content for affected users.

XSS Svelte Redhat
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-27121 MEDIUM PATCH This Month

Server-side rendering in Svelte versions before 5.51.5 fails to sanitize event handler properties when spreading untrusted data as HTML attributes, enabling stored or reflected XSS attacks. An attacker can inject malicious event handlers into rendered pages if an application spreads user-controlled or external data as element attributes, causing arbitrary JavaScript execution in victim browsers. No patch is currently available.

XSS Svelte Redhat
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-27119 MEDIUM PATCH This Month

Improper HTML escaping in Svelte versions 5.39.3 through 5.51.4 allows HTML injection attacks through unescaped option element content during server-side rendering, enabling attackers to inject malicious HTML into SSR output. Client-side rendering is unaffected, and the vulnerability is limited to applications using vulnerable Svelte versions on the server. This medium-severity flaw requires upgrading to version 5.51.5 or later, as no patch is currently available for affected versions.

XSS Svelte Redhat
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-27026 MEDIUM PATCH This Month

Pypdf versions up to 6.7.1 is affected by allocation of resources without limits or throttling (CVSS 5.5).

Python Pypdf Redhat Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-27025 MEDIUM PATCH This Month

Resource exhaustion in pypdf versions prior to 6.7.1 occurs when processing maliciously crafted PDF files with manipulated /ToUnicode font entries, causing excessive memory consumption and processing delays during text extraction operations. A local attacker with file access can exploit this to degrade system performance, though no code execution or data compromise is possible. The vulnerability affects Python environments using pypdf and is remedied by upgrading to version 6.7.1 or later.

Python Pypdf Redhat Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-27024 MEDIUM PATCH This Month

Pypdf versions up to 6.7.1 is affected by loop with unreachable exit condition (infinite loop) (CVSS 5.5).

Python Pypdf Redhat Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-0797 HIGH PATCH This Week

GIMP's ICO file parser fails to properly validate buffer lengths, enabling heap-based buffer overflow when processing malicious image files. An attacker can exploit this vulnerability to achieve remote code execution on affected systems by tricking users into opening specially crafted ICO files. A patch is available to address this high-severity flaw (CVSS 7.8).

RCE Buffer Overflow Heap Overflow Gimp Redhat +1
NVD VulDB
CVSS 3.0
7.8
EPSS
0.1%
CVE-2026-25896 CRITICAL POC PATCH Act Now

ReDoS in fast-xml-parser before fix via crafted XML. PoC and patch available.

XSS Fast Xml Parser Redhat
NVD GitHub VulDB
CVSS 3.1
9.3
EPSS
0.0%
CVE-2026-2818 HIGH This Week

Spring Data Geode's snapshot import feature on Windows systems is vulnerable to path traversal attacks that enable attackers to write arbitrary files outside the intended extraction directory. Remote attackers can exploit this vulnerability without authentication to potentially overwrite critical system or application files. No patch is currently available.

Windows Spring Path Traversal Redhat
NVD HeroDevs
CVSS 3.1
8.2
EPSS
0.1%
CVE-2026-2739 MEDIUM PATCH This Month

This affects versions of the package bn.j versions up to 5.2.3. is affected by loop with unreachable exit condition (infinite loop) (CVSS 5.3).

Denial Of Service Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-26996 HIGH POC PATCH This Week

Minimatch versions 10.2.0 and below suffer from catastrophic backtracking in regular expression processing when glob patterns contain multiple consecutive wildcards, enabling denial of service attacks with exponential time complexity. Applications that process user-supplied glob patterns are vulnerable to CPU exhaustion, with worst-case scenarios causing indefinite hangs; public exploit code exists for this vulnerability. The issue is resolved in version 10.2.1.

Denial Of Service Minimatch Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-26994 MEDIUM PATCH This Month

uTLS versions 1.6.7 and below fail to validate TLS 1.3 downgrade protection mechanisms, allowing network attackers to force ClientHello modifications that cause servers to respond with lower TLS versions while bypassing detection checks. An active attacker can exploit this to downgrade encrypted connections to TLS 1.2 or earlier, potentially exposing traffic to known cryptographic weaknesses. Affected users of uTLS, Red Hat, and other TLS implementations should update to patched versions immediately.

Redhat Tls Utls Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-26960 HIGH POC PATCH This Week

Path traversal in node-tar versions 7.5.7 and earlier allows local attackers to read and write arbitrary files outside the extraction directory by crafting malicious tar archives containing hardlinks that bypass extraction path validation. Public exploit code exists for this vulnerability, which affects default extraction configurations in Node.js and related Tar implementations. The vulnerability has been patched in node-tar 7.5.8.

D-Link Node.js Tar Redhat Suse
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-26967 MEDIUM PATCH This Month

PJSIP versions 2.16 and below contain a heap buffer overflow in the H.264 video unpacketizer that fails to properly validate NAL unit size fields in malformed SRTP packets, allowing remote attackers to trigger memory corruption on systems receiving H.264 video streams. The vulnerability has a CVSS score of 5.3 and enables information disclosure through heap memory access. A patch is available for affected deployments.

Github Buffer Overflow Heap Overflow Pjsip Redhat
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-26963 MEDIUM PATCH This Month

Cilium versions 1.18.0-1.18.5 with Native Routing, WireGuard, and Node Encryption enabled incorrectly allow cross-node Pod traffic that should be blocked, enabling unauthorized network access between isolated workloads. An attacker with network access to pods on different nodes can bypass network segmentation policies to access restricted services. The vulnerability affects deployments using these specific Cilium configurations and is resolved in version 1.18.6.

Wireguard Cilium Redhat Suse
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-26318 HIGH POC PATCH This Week

Command injection in systeminformation versions before 5.31.0 allows local attackers with user privileges to execute arbitrary system commands through unsanitized output parsing in the versions() function. Public exploit code exists for this vulnerability, which provides complete system compromise capabilities including information disclosure, modification, and denial of service. Upgrade to version 5.31.0 or later to remediate.

Node.js Command Injection Systeminformation Redhat Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-26280 HIGH POC PATCH This Week

Arbitrary command execution in systeminformation versions before 5.30.8 allows local attackers to execute OS commands through an unsanitized network interface parameter in the wifiNetworks() function's retry logic. Applications passing user-controlled input to this function are vulnerable to privilege escalation attacks running with Node.js process permissions. Public exploit code exists for this vulnerability; a patch is available.

Node.js Command Injection Systeminformation Redhat Suse
NVD GitHub
CVSS 3.1
8.4
EPSS
0.1%
CVE-2026-26278 HIGH POC PATCH This Week

Fast XML Parser versions 4.1.3 through 5.3.5 are vulnerable to XML entity expansion attacks that allow remote attackers to cause denial of service by forcing unbounded entity expansion with minimal payload sizes. Public exploit code exists for this vulnerability, enabling attackers to freeze or severely degrade application performance. Upgrade to version 5.3.6 or disable entity processing using the `processEntities: false` option to mitigate the risk.

XXE Denial Of Service Fast Xml Parser Redhat Suse
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-26200 HIGH POC PATCH This Week

Heap buffer overflow in HDF5 versions prior to 1.14.4-2 allows attackers to trigger denial-of-service or potentially achieve code execution by crafting malicious h5 files. The vulnerability affects any system parsing untrusted HDF5 data files and has public exploit code available. A patch is not yet available, leaving affected deployments at risk.

RCE Buffer Overflow Heap Overflow Hdf5 Redhat +1
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-2817 MEDIUM This Month

Spring Data Geode's snapshot import functionality uses predictable temporary directories with overly permissive permissions, allowing local users on shared systems to read cache data belonging to other users. An attacker with basic local privileges can access and extract snapshot contents without authorization, compromising the confidentiality of sensitive cached information. No patch is currently available for this medium-severity vulnerability.

Spring Redhat
NVD HeroDevs
CVSS 3.1
4.4
EPSS
0.0%
CVE-2026-2243 MEDIUM PATCH This Month

QEMU's VMDK image parser is vulnerable to an out-of-bounds read when processing maliciously crafted disk images, allowing local attackers to leak sensitive information or trigger denial of service. This vulnerability affects systems running QEMU with untrusted VMDK input and currently lacks an available patch.

Denial Of Service Redhat Suse
NVD
CVSS 3.1
5.1
EPSS
0.0%
CVE-2026-24834 CRITICAL POC PATCH Act Now

Incorrect permissions in Kata Containers allow container escape via file permission manipulation. PoC and patch available.

Privilege Escalation RCE Kata Containers Redhat Suse
NVD GitHub
CVSS 3.1
9.3
EPSS
0.0%
CVE-2025-69725 MEDIUM PATCH This Month

An Open Redirect vulnerability in the go-chi/chi >=5.2.2 RedirectSlashes function allows remote attackers to redirect victim users to malicious websites using the legitimate website domain. [CVSS 4.7 MEDIUM]

Open Redirect Redhat Suse
NVD GitHub
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-25940 HIGH PATCH This Week

jsPDF versions prior to 4.2.0 allow attackers to inject arbitrary PDF objects including malicious JavaScript through unsanitized input to the Acroform module, which executes when users interact with form elements. An attacker who can control input passed to vulnerable API members can achieve code execution on the victim's system. The vulnerability is fixed in jsPDF 4.2.0 and can be mitigated by sanitizing all user input before passing it to affected Acroform properties and methods.

XSS Jspdf Redhat
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-25755 HIGH POC PATCH This Week

Arbitrary PDF object injection in jsPDF before 4.2.0 allows unauthenticated attackers to execute malicious actions or manipulate document structure through unvalidated input to the addJS method, affecting any user opening a crafted PDF. Public exploit code exists for this vulnerability. The issue is resolved in jsPDF 4.2.0, with a temporary mitigation of escaping parentheses in user-supplied JavaScript before passing it to addJS.

RCE Code Injection Jspdf Redhat
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-25535 HIGH POC PATCH This Week

Denial of service in jsPDF prior to version 4.2.0 allows remote attackers to trigger out-of-memory conditions by supplying specially crafted GIF files with oversized dimension headers to the addImage or html methods. Public exploit code exists for this vulnerability, affecting applications that process untrusted image data. Upgrade to jsPDF 4.2.0 or sanitize image inputs before processing.

Denial Of Service Jspdf Redhat
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-2681 MEDIUM This Month

The blst cryptographic library is vulnerable to an out-of-bounds stack write in the blst_sha256_bcopy routine when processing zero-length salt parameters in key generation functions, allowing remote attackers to trigger memory corruption and process crashes. Applications that expose blst_keygen_v5() or similar functions to untrusted input are susceptible to denial-of-service attacks. No patch is currently available for this vulnerability.

Memory Corruption Redhat
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-2650 HIGH PATCH This Week

Google Chrome versions before 145.0.7632.109 contain a heap buffer overflow in the Media component that can be triggered by a remote attacker through a specially crafted HTML page, potentially leading to heap corruption and arbitrary code execution. The vulnerability requires user interaction to exploit and affects all Chrome users who encounter a malicious webpage. No patch is currently available for this high-severity issue.

Google Buffer Overflow Chrome Redhat Suse
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-2649 HIGH PATCH This Week

Heap corruption in Google Chrome's V8 engine prior to version 145.0.7632.109 can be triggered through integer overflow vulnerabilities when processing malicious HTML pages. An unauthenticated attacker can exploit this by tricking users into visiting a crafted webpage, potentially achieving arbitrary code execution with high impact to confidentiality, integrity, and availability. No patch is currently available for this vulnerability.

Google Integer Overflow Chrome Redhat Suse
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-2648 HIGH PATCH This Week

Google Chrome's PDFium library contains a heap buffer overflow vulnerability that enables remote attackers to execute arbitrary code or corrupt memory by opening specially crafted PDF files, affecting all users without requiring authentication or special user interaction. The vulnerability impacts Chrome versions prior to 145.0.7632.109 with a high CVSS score of 8.8, though no patch is currently available. An attacker can exploit this to achieve complete compromise of the affected system including confidentiality, integrity, and availability of data.

Buffer Overflow Chrome Google Redhat Suse
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-1200 MEDIUM This Month

Memory corruption in the rgaufman/live555 fork's `increaseBufferTo` function can be triggered by remote attackers with low privileges, causing segmentation faults and potential system instability. The vulnerability requires network access but no user interaction, affecting systems running vulnerable versions of the affected library. No patch is currently available for this issue.

Memory Corruption Redhat Suse
NVD GitHub
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-0665 MEDIUM PATCH This Month

QEMU's KVM Xen guest support contains an off-by-one error in the physdev hypercall interface that allows authenticated guest users to trigger out-of-bounds heap memory access within the hypervisor process. This vulnerability can lead to denial of service through memory corruption, potentially affecting virtualized environments running QEMU with Xen guest support enabled. No patch is currently available.

Memory Corruption Denial Of Service Redhat Suse
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-1272 HIGH PATCH This Week

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. [CVSS 7.7 HIGH]

Linux Redhat Suse Linux Kernel
NVD
CVSS 3.1
7.7
EPSS
0.0%
CVE-2025-14876 MEDIUM PATCH This Month

A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. [CVSS 5.5 MEDIUM]

Denial Of Service Redhat Suse
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-10256 MEDIUM PATCH This Month

A NULL pointer dereference vulnerability exists in FFmpeg’s Firequalizer filter (libavfilter/af_firequalizer.c) due to a missing check on the return value of av_malloc_array() in the config_input() function. [CVSS 5.3 MEDIUM]

Null Pointer Dereference Denial Of Service Ffmpeg Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-0577 MEDIUM PATCH This Month

An insufficient entropy vulnerability was found in glibc. The getrandom and arc4random family of functions may return predictable randomness if these functions are called again after the fork, which happens concurrently with a call to any of these functions. [CVSS 4.8 MEDIUM]

Information Disclosure Redhat Suse
NVD
CVSS 3.1
4.8
EPSS
0.1%
CVE-2026-25500 MEDIUM POC PATCH This Month

Rack's Directory module fails to sanitize filenames when generating HTML directory listings, allowing attackers to craft files with javascript: scheme names that execute arbitrary code when clicked. Authenticated users or those with access to directories containing maliciously named files can trigger stored XSS attacks affecting other users viewing the directory index. Public exploit code exists for versions prior to 2.2.22, 3.1.20, and 3.2.5.

Ruby Rack Redhat Suse
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-22860 HIGH POC PATCH This Week

Directory traversal in Rack versions prior to 2.2.22, 3.1.20, and 3.2.5 allows unauthenticated remote attackers to list directories outside the configured root by exploiting a string prefix matching flaw in path validation. An attacker can craft requests with path traversal sequences to enumerate sensitive directories if the target path shares a common prefix with the configured root directory. Public exploit code exists for this vulnerability.

Ruby Rack Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-24708 HIGH This Week

OpenStack Nova compute nodes using the Flat image backend can have their host data destroyed when an authenticated user crafts a malicious QCOW header on a disk image and triggers a resize operation, causing qemu-img to execute without format restrictions. Affected versions include Nova before 30.2.2, 31.x before 31.2.1, and 32.x before 32.1.1, with no patch currently available. This vulnerability requires low privileges and user interaction but impacts the integrity and availability of the host system across trust boundaries.

Information Disclosure Redhat
NVD
CVSS 3.1
8.2
EPSS
0.0%
CVE-2025-14009 CRITICAL POC PATCH Act Now

Critical code execution vulnerability in NLTK (Natural Language Toolkit) downloader component. The _unzip_iter function can be exploited to achieve arbitrary code execution through crafted downloads. CVSS 10.0, EPSS 0.57%. PoC available.

Python RCE AI / ML Nltk Redhat +1
NVD
CVSS 3.0
10.0
EPSS
0.6%
CVE-2026-23230 HIGH PATCH This Week

Linux kernel SMB client denial of service vulnerability caused by concurrent bitfield updates in the cached_fid structure that can corrupt flag states through read-modify-write races. A local attacker with standard privileges can trigger this race condition to cause availability disruptions by forcing inconsistent flag states in cached file handle management. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Redhat Suse
NVD VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-23229 MEDIUM PATCH This Month

The Linux kernel's virtio-crypto driver lacks proper synchronization when handling virtqueue notifications from multiple processes, causing data corruption and system hangs when processing cryptographic operations concurrently. Local attackers with user privileges can trigger denial of service by running parallel crypto workloads, as demonstrated through multi-process OpenSSL benchmarks that expose race conditions in the virtcrypto_done_task() handler. No patch is currently available for this medium-severity vulnerability affecting systems running virtio-crypto with builtin backends.

Linux OpenSSL Information Disclosure Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23228 MEDIUM PATCH This Month

The Linux kernel ksmbd server leaks the active_num_conn counter when kthread_run() fails during TCP connection initialization, allowing local authenticated users to exhaust connection tracking resources and cause a denial of service. The vulnerability stems from improper cleanup that fails to decrement the counter when freeing the transport structure. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23227 HIGH PATCH This Week

The Exynos Virtual Display driver in the Linux kernel lacks proper synchronization when allocating and freeing memory structures, enabling use-after-free conditions through race conditions between concurrent operations. A local attacker with unprivileged access can exploit this vulnerability to cause memory corruption or achieve information disclosure by manipulating display connector operations. No patch is currently available for this high-severity vulnerability affecting Linux systems with Samsung Exynos graphics hardware.

Linux Use After Free Information Disclosure Samsung Memory Corruption +2
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23226 HIGH PATCH This Week

The Linux kernel ksmbd subsystem contains a use-after-free vulnerability in multi-channel session handling due to missing synchronization on the ksmbd_chann_list xarray, allowing a local attacker with user privileges to cause memory corruption and potentially execute arbitrary code. The vulnerability affects the channel lookup and deletion operations between multiple concurrent sessions. A patch is available to add proper locking mechanisms to protect xarray access.

Linux Use After Free Memory Corruption Information Disclosure Redhat +1
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-23225 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: sched/mmcid: Don't assume CID is CPU owned on mode switch Shinichiro reported a KASAN UAF, which is actually an out of bounds access in the MMCID management code.

Linux Information Disclosure Redhat Suse
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23224 HIGH PATCH This Week

The Linux kernel erofs file system contains a use-after-free vulnerability in direct I/O file-backed mount operations that allows local attackers with user privileges to cause memory corruption and potentially achieve code execution or denial of service. The vulnerability occurs when accessing files through the directio option, where freed memory is subsequently accessed during I/O operations. A patch is not currently available, making this a critical concern for systems running affected Linux kernel versions.

Linux Information Disclosure Memory Corruption Use After Free Redhat +1
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23223 HIGH PATCH This Week

Use-after-free vulnerability in Linux kernel XFS subsystem allows local attackers with unprivileged access to cause memory corruption and potential privilege escalation through improper pointer dereferencing in the btree block owner checking function. The flaw stems from attempting to access freed memory due to incorrect temporal ordering of operations when determining cursor aliases. This vulnerability affects all Linux systems using XFS and currently lacks a patch.

Linux Information Disclosure Memory Corruption Use After Free Linux Kernel +2
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-25989
EPSS 0% CVSS 7.5
HIGH PATCH This Week

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to denial of service when processing maliciously crafted SVG files due to an off-by-one error in boundary validation. An unauthenticated remote attacker can trigger an integer underflow by bypassing the flawed size check, causing the application to crash or become unresponsive. No patch is currently available for affected deployments.

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-25988
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 contain a memory leak in the MSL parser where improper stack index management causes images to remain allocated after error conditions. An attacker could trigger this vulnerability by supplying a specially crafted image file, potentially leading to denial of service through resource exhaustion. No patch is currently available for affected systems.

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-25987
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Buffer Overflow Denial Of Service Imagemagick +2
NVD GitHub
CVE-2026-25986
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to a heap buffer overflow in the YUV image decoder that allows remote attackers to trigger a denial of service condition by processing specially crafted YUV 4:2:2 images. The vulnerability stems from an off-by-one write error in the pixel processing loop that exceeds allocated buffer boundaries. No patch is currently available for affected installations.

Buffer Overflow Imagemagick Redhat +1
NVD GitHub
CVE-2026-25985
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Imagemagick versions up to 7.1.2-15 is affected by allocation of resources without limits or throttling (CVSS 7.5).

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-25983
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to a heap-use-after-free condition when processing specially crafted MSL scripts, allowing unauthenticated remote attackers to cause denial of service. The vulnerability occurs when the operation element handler frees image data while the parser continues accessing it, leading to memory corruption during subsequent parsing operations. No patch is currently available for affected versions.

Use After Free Imagemagick Redhat +1
NVD GitHub
CVE-2026-25982
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Medium severity vulnerability in ImageMagick. A heap out-of-bounds read vulnerability exists in the `coders/dcm.c` module. When processing DICOM files with a specific configuration, the decoder loop incorrectly reads bytes per iteration. This causes the function to read past the end of the allocated buffer, potentially leading to a Denial of Service (crash) or Information Disclosure (leaking heap memory into the image).

Denial Of Service Information Disclosure Imagemagick +2
NVD GitHub
CVE-2026-25971
EPSS 0% CVSS 6.2
MEDIUM PATCH This Month

Medium severity vulnerability in ImageMagick. # Magick fails to check for circular references between two MSLs, leading to a stack overflow.

Stack Overflow Imagemagick Redhat +1
NVD GitHub
CVE-2026-25970
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows. ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==143838==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 #0 0x7f379d5adb53 (/lib/x86_64-linux-gnu/libc.so.6+0xc4b53) ```

Integer Overflow Memory Corruption Denial Of Service +3
NVD GitHub
CVE-2026-25969
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 contain a memory leak in the ASHLAR image coder where allocated memory fails to release upon exception handling, potentially causing denial of service through resource exhaustion on affected systems. An unauthenticated remote attacker can trigger this condition by processing specially crafted ASHLAR image files. No patch is currently available.

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-25968
EPSS 0% CVSS 7.4
HIGH PATCH This Week

High severity vulnerability in ImageMagick. A stack buffer overflow occurs when processing the an attribute in msl.c. A long value overflows a fixed-size stack buffer, leading to memory corruption.

Buffer Overflow Memory Corruption Imagemagick +2
NVD GitHub
CVE-2026-25967
EPSS 0% CVSS 7.4
HIGH PATCH This Week

Stack-based buffer overflow in ImageMagick versions before 7.1.2-15 allows remote attackers to crash the application and potentially corrupt memory by submitting specially crafted FTXT image files. The vulnerability requires high complexity to exploit but impacts both confidentiality and availability of affected systems. No patch is currently available for this HIGH severity issue (CVSS 7.4).

Buffer Overflow Stack Overflow Denial Of Service +3
NVD GitHub
CVE-2026-25966
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 allow local attackers to bypass the secure policy's stdin/stdout restrictions by using fd:<n> pseudo-filenames (e.g., fd:0, fd:1), enabling unauthorized reading and writing to standard streams. This vulnerability affects systems relying on ImageMagick's default security policies to prevent stream manipulation. No patch is currently available, though administrators can manually update their security policy configuration as a workaround.

Authentication Bypass Imagemagick Redhat +1
NVD GitHub
CVE-2026-25965
EPSS 0% CVSS 8.6
HIGH PATCH This Week

ImageMagick before versions 7.1.2-15 and 6.9.13-40 allows local attackers to bypass path security policies and disclose sensitive files through path traversal sequences in filenames, as the policy enforcement occurs before filesystem resolution normalizes the paths. An attacker with local access can read restricted files like those in /etc/ even when policy-secure.xml is applied. A patch is not yet available, making this a significant risk for systems relying on ImageMagick's security policies for file access control.

Path Traversal Imagemagick Redhat +1
NVD GitHub
CVE-2026-25898
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

ImageMagick's UIL and XPM image encoders fail to validate pixel index values before using them as array subscripts, allowing an attacker to craft malicious images that trigger out-of-bounds reads in HDRI builds. Exploitation can result in information disclosure or denial of service through process crashes. Versions prior to 7.1.2-15 and 6.9.13-40 are affected, and no patch is currently available.

Buffer Overflow Denial Of Service Information Disclosure +3
NVD GitHub
CVE-2026-25897
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 contain an integer overflow in the SUN image decoder that allows heap buffer overflow on 32-bit systems when processing specially crafted image files. Attackers can trigger this vulnerability remotely without authentication to cause denial of service or potentially achieve code execution. A patch is currently unavailable, leaving affected 32-bit installations at risk until updates are released.

Integer Overflow Imagemagick Redhat +1
NVD GitHub
CVE-2026-25799
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-25798
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Null Pointer Dereference Denial Of Service Imagemagick +2
NVD GitHub
CVE-2026-25797
EPSS 0% CVSS 5.7
MEDIUM PATCH This Month

Arbitrary code injection in ImageMagick's PostScript and HTML encoders allows attackers to inject malicious code that executes when files are processed by downstream applications like Ghostscript or web viewers. The vulnerability affects versions prior to 7.1.2-15 and 6.9.13-40 due to insufficient input sanitization in the ps and html coders. Users processing untrusted image files are at risk of code execution, though no patch is currently available.

RCE Code Injection Imagemagick +2
NVD GitHub
CVE-2026-25796
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-25795
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Null Pointer Dereference Denial Of Service Imagemagick +2
NVD GitHub
CVE-2026-25794
EPSS 0% CVSS 8.2
HIGH PATCH This Week

Integer overflow in ImageMagick's UHDR image decoder allows remote attackers to trigger heap buffer overflows by supplying specially crafted images with large dimensions, potentially crashing the application or corrupting heap memory. The vulnerability affects ImageMagick versions prior to 7.1.2-15 and requires no user interaction or authentication to exploit. Organizations using vulnerable versions should upgrade immediately, as no workaround is available.

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-25638
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 contain a memory leak in the MSL image coder that allows unauthenticated remote attackers to cause denial of service through resource exhaustion when processing specially crafted MSL image files. The vulnerability exists because the WriteMSLImage function fails to release allocated memory during early function returns. An attacker can exploit this over the network without authentication to exhaust server memory and crash the application.

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-25637
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 5.3 MEDIUM]

Denial Of Service Imagemagick Magick.Net +2
NVD GitHub
CVE-2026-25576
EPSS 0% CVSS 5.1
MEDIUM PATCH This Month

Heap buffer over-read in ImageMagick and Magick.Net raw image format handlers allows local attackers to read sensitive data from heap memory when processing specially crafted images with mismatched extraction and size parameters. The vulnerability affects ImageMagick versions prior to 7.1.2-15 and 6.9.13-40, potentially exposing confidential information through out-of-bounds memory access. A patch is available for affected users.

Buffer Overflow Imagemagick Magick.Net +2
NVD GitHub
CVE-2026-24485
EPSS 0% CVSS 7.5
HIGH PATCH This Week

ImageMagick is free and open-source software used for editing and manipulating digital images. [CVSS 7.5 HIGH]

Denial Of Service Magick.Net Imagemagick +2
NVD GitHub
CVE-2026-24484
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick and Magick.NET fail to properly validate nested MVG-to-SVG conversions, allowing unauthenticated remote attackers to trigger denial of service conditions. Affected versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to resource exhaustion attacks through specially crafted image files. A patch is available for both products.

Denial Of Service Imagemagick Magick.Net +2
NVD GitHub
CVE-2026-27623
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Denial of service in Valkey 9.0.0 through 9.0.2 allows unauthenticated network attackers to crash the server by exploiting improper networking state handling after empty requests. An attacker can trigger an assertion failure that causes the Valkey process to abort, impacting availability for all users. No patch is currently available; network isolation is recommended as a mitigation.

Code Injection Valkey Redhat +1
NVD GitHub
CVE-2026-21863
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Out-of-bounds read in Valkey clusterbus port processing allows network-adjacent attackers to crash affected systems by sending specially crafted packets that bypass buffer validation checks. This vulnerability affects Valkey versions prior to 9.0.2, 8.1.6, 8.0.7, and 7.2.12, impacting any deployment exposing the clusterbus port to untrusted networks. Patches are available and administrators should restrict clusterbus access with network ACLs as an immediate mitigation.

Denial Of Service Valkey Redhat +1
NVD GitHub
CVE-2025-67733
EPSS 0% CVSS 8.5
HIGH PATCH This Week

Valkey is a distributed key-value database. [CVSS 8.5 HIGH]

RCE Valkey Redhat +1
NVD GitHub
CVE-2025-61145
EPSS 0% CVSS 5.0
MEDIUM POC PATCH This Month

libtiff up to v4.7.1 was discovered to contain a double free via the component tools/tiffcrop.c. [CVSS 5.0 MEDIUM]

Information Disclosure Libtiff Redhat +1
NVD GitHub
CVE-2025-61144
EPSS 0% CVSS 7.3
HIGH POC PATCH This Week

libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. [CVSS 7.3 HIGH]

Stack Overflow Libtiff Redhat +1
NVD GitHub
CVE-2025-61143
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. [CVSS 5.5 MEDIUM]

Null Pointer Dereference Libtiff Redhat +1
NVD GitHub
CVE-2026-25747
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Deserialization of Untrusted Data vulnerability in Apache Camel LevelDB component. The Camel-LevelDB DefaultLevelDBSerializer class deserializes data read from the LevelDB aggregation repository using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. [CVSS 8.8 HIGH]

Apache Java Deserialization +2
NVD GitHub
CVE-2026-27205
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Flask versions 3.1.2 and earlier fail to set proper cache headers when the session object is accessed through certain methods like the Python `in` operator, allowing cached responses containing user-specific session data to be served to other users. An attacker can exploit this to access sensitive information from cached responses if the application runs behind a caching proxy that doesn't ignore Set-Cookie headers. This requires the vulnerable application to lack explicit Cache-Control headers and access session data in ways that bypass normal cache-control logic.

Python Flask Redhat +1
NVD GitHub
CVE-2026-27134
EPSS 0% CVSS 8.1
HIGH This Week

Strimzi Kafka Operator versions 0.49.0-0.50.0 incorrectly trusts all intermediate CAs in a multistage certificate chain for mTLS authentication, allowing any user with a certificate signed by any CA in the chain to authenticate to Kafka listeners. This authentication bypass affects only deployments using custom Cluster or Clients CA with multi-level CA chains. No patch is currently available.

Apache Kubernetes Strimzi Kafka Operator +1
NVD GitHub
CVE-2026-2048
EPSS 0% CVSS 7.8
HIGH PATCH This Week

GIMP is vulnerable to out-of-bounds memory write during XWD file parsing due to insufficient input validation, enabling arbitrary code execution when a user opens a malicious image file. This high-severity vulnerability (CVSS 7.8) affects local attackers who can craft specially crafted XWD files to corrupt memory and execute code with the privileges of the GIMP process. No patch is currently available.

RCE Gimp Redhat +1
NVD VulDB
CVE-2026-2047
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Remote code execution in GIMP through heap buffer overflow during ICNS file parsing allows attackers to execute arbitrary code when a user opens a malicious image file. The vulnerability stems from insufficient validation of user-supplied data lengths before copying to heap memory, requiring only user interaction to trigger. A patch is available for affected installations.

RCE Buffer Overflow Heap Overflow +3
NVD VulDB
CVE-2026-2045
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Out-of-bounds write in GIMP's XWD file parser enables arbitrary code execution when users open malicious image files, requiring no special privileges or system access. Insufficient input validation during XWD file parsing allows attackers to overflow allocated buffers and execute code with the privileges of the affected user. A patch is available to address this vulnerability.

RCE Gimp Redhat +1
NVD VulDB
CVE-2026-2044
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Arbitrary code execution in GIMP occurs when processing specially crafted PGM image files due to uninitialized memory access during file parsing. An attacker can exploit this vulnerability by tricking users into opening a malicious PGM file, resulting in code execution with the privileges of the GIMP process. A patch is available for this high-severity vulnerability (CVSS 7.8).

RCE Gimp Redhat +1
NVD VulDB
CVE-2026-27133
EPSS 0% CVSS 5.9
MEDIUM This Month

Strimzi versions 0.47.0 through 0.50.0 improperly trust all certificates in a CA chain rather than only the intended signing authority, allowing Kafka Connect and MirrorMaker 2 operands to accept connections from brokers with certificates signed by intermediate CAs. An attacker could leverage this improper certificate validation to establish unauthorized connections to Kafka clusters using alternate CA-signed certificates from the trusted chain. This vulnerability requires high privileges to configure the CA chain and has no available patch at this time.

Apache Kubernetes Strimzi +1
NVD GitHub
CVE-2026-27125
EPSS 0% CVSS 6.8
MEDIUM PATCH This Month

Svelte versions prior to 5.51.5 improperly enumerate prototype chain properties during server-side rendering attribute spreading, allowing polluted Object.prototype properties to inject unexpected attributes into SSR output or cause rendering errors. This vulnerability affects applications using SSR where the prototype chain has been previously manipulated, though client-side rendering is unaffected. The issue requires prototype pollution as a precondition but can lead to information disclosure or denial of service in vulnerable SSR environments.

Code Injection Svelte Redhat
NVD GitHub
CVE-2026-27122
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

HTML injection in Svelte's server-side rendering occurs when the `<svelte:element>` tag parameter fails to sanitize user-supplied tag names, allowing attackers to inject malicious HTML into rendered output. This affects Svelte versions prior to 5.51.5 and requires user interaction to exploit, with client-side rendering remaining unaffected. An authenticated attacker can achieve limited information disclosure or modify page content for affected users.

XSS Svelte Redhat
NVD GitHub
CVE-2026-27121
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Server-side rendering in Svelte versions before 5.51.5 fails to sanitize event handler properties when spreading untrusted data as HTML attributes, enabling stored or reflected XSS attacks. An attacker can inject malicious event handlers into rendered pages if an application spreads user-controlled or external data as element attributes, causing arbitrary JavaScript execution in victim browsers. No patch is currently available.

XSS Svelte Redhat
NVD GitHub
CVE-2026-27119
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Improper HTML escaping in Svelte versions 5.39.3 through 5.51.4 allows HTML injection attacks through unescaped option element content during server-side rendering, enabling attackers to inject malicious HTML into SSR output. Client-side rendering is unaffected, and the vulnerability is limited to applications using vulnerable Svelte versions on the server. This medium-severity flaw requires upgrading to version 5.51.5 or later, as no patch is currently available for affected versions.

XSS Svelte Redhat
NVD GitHub
CVE-2026-27026
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Pypdf versions up to 6.7.1 is affected by allocation of resources without limits or throttling (CVSS 5.5).

Python Pypdf Redhat +1
NVD GitHub
CVE-2026-27025
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Resource exhaustion in pypdf versions prior to 6.7.1 occurs when processing maliciously crafted PDF files with manipulated /ToUnicode font entries, causing excessive memory consumption and processing delays during text extraction operations. A local attacker with file access can exploit this to degrade system performance, though no code execution or data compromise is possible. The vulnerability affects Python environments using pypdf and is remedied by upgrading to version 6.7.1 or later.

Python Pypdf Redhat +1
NVD GitHub
CVE-2026-27024
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Pypdf versions up to 6.7.1 is affected by loop with unreachable exit condition (infinite loop) (CVSS 5.5).

Python Pypdf Redhat +1
NVD GitHub
CVE-2026-0797
EPSS 0% CVSS 7.8
HIGH PATCH This Week

GIMP's ICO file parser fails to properly validate buffer lengths, enabling heap-based buffer overflow when processing malicious image files. An attacker can exploit this vulnerability to achieve remote code execution on affected systems by tricking users into opening specially crafted ICO files. A patch is available to address this high-severity flaw (CVSS 7.8).

RCE Buffer Overflow Heap Overflow +3
NVD VulDB
CVE-2026-25896
EPSS 0% CVSS 9.3
CRITICAL POC PATCH Act Now

ReDoS in fast-xml-parser before fix via crafted XML. PoC and patch available.

XSS Fast Xml Parser Redhat
NVD GitHub VulDB
CVE-2026-2818
EPSS 0% CVSS 8.2
HIGH This Week

Spring Data Geode's snapshot import feature on Windows systems is vulnerable to path traversal attacks that enable attackers to write arbitrary files outside the intended extraction directory. Remote attackers can exploit this vulnerability without authentication to potentially overwrite critical system or application files. No patch is currently available.

Windows Spring Path Traversal +1
NVD HeroDevs
CVE-2026-2739
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

This affects versions of the package bn.j versions up to 5.2.3. is affected by loop with unreachable exit condition (infinite loop) (CVSS 5.3).

Denial Of Service Redhat Suse
NVD GitHub
CVE-2026-26996
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Minimatch versions 10.2.0 and below suffer from catastrophic backtracking in regular expression processing when glob patterns contain multiple consecutive wildcards, enabling denial of service attacks with exponential time complexity. Applications that process user-supplied glob patterns are vulnerable to CPU exhaustion, with worst-case scenarios causing indefinite hangs; public exploit code exists for this vulnerability. The issue is resolved in version 10.2.1.

Denial Of Service Minimatch Redhat +1
NVD GitHub
CVE-2026-26994
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

uTLS versions 1.6.7 and below fail to validate TLS 1.3 downgrade protection mechanisms, allowing network attackers to force ClientHello modifications that cause servers to respond with lower TLS versions while bypassing detection checks. An active attacker can exploit this to downgrade encrypted connections to TLS 1.2 or earlier, potentially exposing traffic to known cryptographic weaknesses. Affected users of uTLS, Red Hat, and other TLS implementations should update to patched versions immediately.

Redhat Tls Utls +1
NVD GitHub
CVE-2026-26960
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

Path traversal in node-tar versions 7.5.7 and earlier allows local attackers to read and write arbitrary files outside the extraction directory by crafting malicious tar archives containing hardlinks that bypass extraction path validation. Public exploit code exists for this vulnerability, which affects default extraction configurations in Node.js and related Tar implementations. The vulnerability has been patched in node-tar 7.5.8.

D-Link Node.js Tar +2
NVD GitHub
CVE-2026-26967
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

PJSIP versions 2.16 and below contain a heap buffer overflow in the H.264 video unpacketizer that fails to properly validate NAL unit size fields in malformed SRTP packets, allowing remote attackers to trigger memory corruption on systems receiving H.264 video streams. The vulnerability has a CVSS score of 5.3 and enables information disclosure through heap memory access. A patch is available for affected deployments.

Github Buffer Overflow Heap Overflow +2
NVD GitHub
CVE-2026-26963
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

Cilium versions 1.18.0-1.18.5 with Native Routing, WireGuard, and Node Encryption enabled incorrectly allow cross-node Pod traffic that should be blocked, enabling unauthorized network access between isolated workloads. An attacker with network access to pods on different nodes can bypass network segmentation policies to access restricted services. The vulnerability affects deployments using these specific Cilium configurations and is resolved in version 1.18.6.

Wireguard Cilium Redhat +1
NVD GitHub
CVE-2026-26318
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Command injection in systeminformation versions before 5.31.0 allows local attackers with user privileges to execute arbitrary system commands through unsanitized output parsing in the versions() function. Public exploit code exists for this vulnerability, which provides complete system compromise capabilities including information disclosure, modification, and denial of service. Upgrade to version 5.31.0 or later to remediate.

Node.js Command Injection Systeminformation +2
NVD GitHub
CVE-2026-26280
EPSS 0% CVSS 8.4
HIGH POC PATCH This Week

Arbitrary command execution in systeminformation versions before 5.30.8 allows local attackers to execute OS commands through an unsanitized network interface parameter in the wifiNetworks() function's retry logic. Applications passing user-controlled input to this function are vulnerable to privilege escalation attacks running with Node.js process permissions. Public exploit code exists for this vulnerability; a patch is available.

Node.js Command Injection Systeminformation +2
NVD GitHub
CVE-2026-26278
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Fast XML Parser versions 4.1.3 through 5.3.5 are vulnerable to XML entity expansion attacks that allow remote attackers to cause denial of service by forcing unbounded entity expansion with minimal payload sizes. Public exploit code exists for this vulnerability, enabling attackers to freeze or severely degrade application performance. Upgrade to version 5.3.6 or disable entity processing using the `processEntities: false` option to mitigate the risk.

XXE Denial Of Service Fast Xml Parser +2
NVD GitHub VulDB
CVE-2026-26200
EPSS 0% CVSS 7.8
HIGH POC PATCH This Week

Heap buffer overflow in HDF5 versions prior to 1.14.4-2 allows attackers to trigger denial-of-service or potentially achieve code execution by crafting malicious h5 files. The vulnerability affects any system parsing untrusted HDF5 data files and has public exploit code available. A patch is not yet available, leaving affected deployments at risk.

RCE Buffer Overflow Heap Overflow +3
NVD GitHub
CVE-2026-2817
EPSS 0% CVSS 4.4
MEDIUM This Month

Spring Data Geode's snapshot import functionality uses predictable temporary directories with overly permissive permissions, allowing local users on shared systems to read cache data belonging to other users. An attacker with basic local privileges can access and extract snapshot contents without authorization, compromising the confidentiality of sensitive cached information. No patch is currently available for this medium-severity vulnerability.

Spring Redhat
NVD HeroDevs
CVE-2026-2243
EPSS 0% CVSS 5.1
MEDIUM PATCH This Month

QEMU's VMDK image parser is vulnerable to an out-of-bounds read when processing maliciously crafted disk images, allowing local attackers to leak sensitive information or trigger denial of service. This vulnerability affects systems running QEMU with untrusted VMDK input and currently lacks an available patch.

Denial Of Service Redhat Suse
NVD
CVE-2026-24834
EPSS 0% CVSS 9.3
CRITICAL POC PATCH Act Now

Incorrect permissions in Kata Containers allow container escape via file permission manipulation. PoC and patch available.

Privilege Escalation RCE Kata Containers +2
NVD GitHub
CVE-2025-69725
EPSS 0% CVSS 4.7
MEDIUM PATCH This Month

An Open Redirect vulnerability in the go-chi/chi >=5.2.2 RedirectSlashes function allows remote attackers to redirect victim users to malicious websites using the legitimate website domain. [CVSS 4.7 MEDIUM]

Open Redirect Redhat Suse
NVD GitHub
CVE-2026-25940
EPSS 0% CVSS 8.1
HIGH PATCH This Week

jsPDF versions prior to 4.2.0 allow attackers to inject arbitrary PDF objects including malicious JavaScript through unsanitized input to the Acroform module, which executes when users interact with form elements. An attacker who can control input passed to vulnerable API members can achieve code execution on the victim's system. The vulnerability is fixed in jsPDF 4.2.0 and can be mitigated by sanitizing all user input before passing it to affected Acroform properties and methods.

XSS Jspdf Redhat
NVD GitHub
CVE-2026-25755
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

Arbitrary PDF object injection in jsPDF before 4.2.0 allows unauthenticated attackers to execute malicious actions or manipulate document structure through unvalidated input to the addJS method, affecting any user opening a crafted PDF. Public exploit code exists for this vulnerability. The issue is resolved in jsPDF 4.2.0, with a temporary mitigation of escaping parentheses in user-supplied JavaScript before passing it to addJS.

RCE Code Injection Jspdf +1
NVD GitHub
CVE-2026-25535
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Denial of service in jsPDF prior to version 4.2.0 allows remote attackers to trigger out-of-memory conditions by supplying specially crafted GIF files with oversized dimension headers to the addImage or html methods. Public exploit code exists for this vulnerability, affecting applications that process untrusted image data. Upgrade to jsPDF 4.2.0 or sanitize image inputs before processing.

Denial Of Service Jspdf Redhat
NVD GitHub
CVE-2026-2681
EPSS 0% CVSS 5.3
MEDIUM This Month

The blst cryptographic library is vulnerable to an out-of-bounds stack write in the blst_sha256_bcopy routine when processing zero-length salt parameters in key generation functions, allowing remote attackers to trigger memory corruption and process crashes. Applications that expose blst_keygen_v5() or similar functions to untrusted input are susceptible to denial-of-service attacks. No patch is currently available for this vulnerability.

Memory Corruption Redhat
NVD
CVE-2026-2650
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Google Chrome versions before 145.0.7632.109 contain a heap buffer overflow in the Media component that can be triggered by a remote attacker through a specially crafted HTML page, potentially leading to heap corruption and arbitrary code execution. The vulnerability requires user interaction to exploit and affects all Chrome users who encounter a malicious webpage. No patch is currently available for this high-severity issue.

Google Buffer Overflow Chrome +2
NVD
CVE-2026-2649
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Heap corruption in Google Chrome's V8 engine prior to version 145.0.7632.109 can be triggered through integer overflow vulnerabilities when processing malicious HTML pages. An unauthenticated attacker can exploit this by tricking users into visiting a crafted webpage, potentially achieving arbitrary code execution with high impact to confidentiality, integrity, and availability. No patch is currently available for this vulnerability.

Google Integer Overflow Chrome +2
NVD
CVE-2026-2648
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Google Chrome's PDFium library contains a heap buffer overflow vulnerability that enables remote attackers to execute arbitrary code or corrupt memory by opening specially crafted PDF files, affecting all users without requiring authentication or special user interaction. The vulnerability impacts Chrome versions prior to 145.0.7632.109 with a high CVSS score of 8.8, though no patch is currently available. An attacker can exploit this to achieve complete compromise of the affected system including confidentiality, integrity, and availability of data.

Buffer Overflow Chrome Google +2
NVD
CVE-2026-1200
EPSS 0% CVSS 6.3
MEDIUM This Month

Memory corruption in the rgaufman/live555 fork's `increaseBufferTo` function can be triggered by remote attackers with low privileges, causing segmentation faults and potential system instability. The vulnerability requires network access but no user interaction, affecting systems running vulnerable versions of the affected library. No patch is currently available for this issue.

Memory Corruption Redhat Suse
NVD GitHub
CVE-2026-0665
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

QEMU's KVM Xen guest support contains an off-by-one error in the physdev hypercall interface that allows authenticated guest users to trigger out-of-bounds heap memory access within the hypervisor process. This vulnerability can lead to denial of service through memory corruption, potentially affecting virtualized environments running QEMU with Xen guest support enabled. No patch is currently available.

Memory Corruption Denial Of Service Redhat +1
NVD
CVE-2025-1272
EPSS 0% CVSS 7.7
HIGH PATCH This Week

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. [CVSS 7.7 HIGH]

Linux Redhat Suse +1
NVD
CVE-2025-14876
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. [CVSS 5.5 MEDIUM]

Denial Of Service Redhat Suse
NVD
CVE-2025-10256
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A NULL pointer dereference vulnerability exists in FFmpeg’s Firequalizer filter (libavfilter/af_firequalizer.c) due to a missing check on the return value of av_malloc_array() in the config_input() function. [CVSS 5.3 MEDIUM]

Null Pointer Dereference Denial Of Service Ffmpeg +2
NVD GitHub
CVE-2025-0577
EPSS 0% CVSS 4.8
MEDIUM PATCH This Month

An insufficient entropy vulnerability was found in glibc. The getrandom and arc4random family of functions may return predictable randomness if these functions are called again after the fork, which happens concurrently with a call to any of these functions. [CVSS 4.8 MEDIUM]

Information Disclosure Redhat Suse
NVD
CVE-2026-25500
EPSS 0% CVSS 5.4
MEDIUM POC PATCH This Month

Rack's Directory module fails to sanitize filenames when generating HTML directory listings, allowing attackers to craft files with javascript: scheme names that execute arbitrary code when clicked. Authenticated users or those with access to directories containing maliciously named files can trigger stored XSS attacks affecting other users viewing the directory index. Public exploit code exists for versions prior to 2.2.22, 3.1.20, and 3.2.5.

Ruby Rack Redhat +1
NVD GitHub
CVE-2026-22860
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Directory traversal in Rack versions prior to 2.2.22, 3.1.20, and 3.2.5 allows unauthenticated remote attackers to list directories outside the configured root by exploiting a string prefix matching flaw in path validation. An attacker can craft requests with path traversal sequences to enumerate sensitive directories if the target path shares a common prefix with the configured root directory. Public exploit code exists for this vulnerability.

Ruby Rack Redhat +1
NVD GitHub
CVE-2026-24708
EPSS 0% CVSS 8.2
HIGH This Week

OpenStack Nova compute nodes using the Flat image backend can have their host data destroyed when an authenticated user crafts a malicious QCOW header on a disk image and triggers a resize operation, causing qemu-img to execute without format restrictions. Affected versions include Nova before 30.2.2, 31.x before 31.2.1, and 32.x before 32.1.1, with no patch currently available. This vulnerability requires low privileges and user interaction but impacts the integrity and availability of the host system across trust boundaries.

Information Disclosure Redhat
NVD
CVE-2025-14009
EPSS 1% CVSS 10.0
CRITICAL POC PATCH Act Now

Critical code execution vulnerability in NLTK (Natural Language Toolkit) downloader component. The _unzip_iter function can be exploited to achieve arbitrary code execution through crafted downloads. CVSS 10.0, EPSS 0.57%. PoC available.

Python RCE AI / ML +3
NVD
CVE-2026-23230
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Linux kernel SMB client denial of service vulnerability caused by concurrent bitfield updates in the cached_fid structure that can corrupt flag states through read-modify-write races. A local attacker with standard privileges can trigger this race condition to cause availability disruptions by forcing inconsistent flag states in cached file handle management. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Redhat +1
NVD VulDB
CVE-2026-23229
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's virtio-crypto driver lacks proper synchronization when handling virtqueue notifications from multiple processes, causing data corruption and system hangs when processing cryptographic operations concurrently. Local attackers with user privileges can trigger denial of service by running parallel crypto workloads, as demonstrated through multi-process OpenSSL benchmarks that expose race conditions in the virtcrypto_done_task() handler. No patch is currently available for this medium-severity vulnerability affecting systems running virtio-crypto with builtin backends.

Linux OpenSSL Information Disclosure +3
NVD VulDB
CVE-2026-23228
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel ksmbd server leaks the active_num_conn counter when kthread_run() fails during TCP connection initialization, allowing local authenticated users to exhaust connection tracking resources and cause a denial of service. The vulnerability stems from improper cleanup that fails to decrement the counter when freeing the transport structure. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23227
EPSS 0% CVSS 7.8
HIGH PATCH This Week

The Exynos Virtual Display driver in the Linux kernel lacks proper synchronization when allocating and freeing memory structures, enabling use-after-free conditions through race conditions between concurrent operations. A local attacker with unprivileged access can exploit this vulnerability to cause memory corruption or achieve information disclosure by manipulating display connector operations. No patch is currently available for this high-severity vulnerability affecting Linux systems with Samsung Exynos graphics hardware.

Linux Use After Free Information Disclosure +4
NVD VulDB
CVE-2026-23226
EPSS 0% CVSS 8.8
HIGH PATCH This Week

The Linux kernel ksmbd subsystem contains a use-after-free vulnerability in multi-channel session handling due to missing synchronization on the ksmbd_chann_list xarray, allowing a local attacker with user privileges to cause memory corruption and potentially execute arbitrary code. The vulnerability affects the channel lookup and deletion operations between multiple concurrent sessions. A patch is available to add proper locking mechanisms to protect xarray access.

Linux Use After Free Memory Corruption +3
NVD
CVE-2026-23225
EPSS 0% CVSS 7.8
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: sched/mmcid: Don't assume CID is CPU owned on mode switch Shinichiro reported a KASAN UAF, which is actually an out of bounds access in the MMCID management code.

Linux Information Disclosure Redhat +1
NVD
CVE-2026-23224
EPSS 0% CVSS 7.8
HIGH PATCH This Week

The Linux kernel erofs file system contains a use-after-free vulnerability in direct I/O file-backed mount operations that allows local attackers with user privileges to cause memory corruption and potentially achieve code execution or denial of service. The vulnerability occurs when accessing files through the directio option, where freed memory is subsequently accessed during I/O operations. A patch is not currently available, making this a critical concern for systems running affected Linux kernel versions.

Linux Information Disclosure Memory Corruption +3
NVD VulDB
CVE-2026-23223
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Use-after-free vulnerability in Linux kernel XFS subsystem allows local attackers with unprivileged access to cause memory corruption and potential privilege escalation through improper pointer dereferencing in the btree block owner checking function. The flaw stems from attempting to access freed memory due to incorrect temporal ordering of operations when determining cursor aliases. This vulnerability affects all Linux systems using XFS and currently lacks a patch.

Linux Information Disclosure Memory Corruption +4
NVD VulDB
Prev Page 5 of 57 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy