| | CVE-2025-71268 | Red Hat | medium | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23262 | Red Hat | medium | 7.0 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23256 | Red Hat | medium | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23267 | Red Hat | medium | — | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2025-71269 | Red Hat | medium | 7.0 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23259 | Red Hat | low | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23261 | Red Hat | medium | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23266 | Red Hat | medium | — | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23263 | Red Hat | medium | — | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23242 | Red Hat | medium | 7.0 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23244 | Red Hat | low | 5.5 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23246 | Red Hat | medium | 5.9 | 0.0%
| | A flaw was found in the Linux kernel's mac80211 Wi-Fi subsystem. This vulnerability occurs in the ie… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2025-71267 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23247 | Red Hat | low | 5.5 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2025-71266 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23248 | Red Hat | medium | 7.0 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2025-71265 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23243 | Red Hat | high | 7.0 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23245 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-4366 | Red Hat | medium | 5.8 | — | | A flaw was identified in Keycloak, an identity and access management solution, where it improperly f… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-27979 | Red Hat | medium | 5.3 | 0.0%
| | A denial of service flaw has been discovered in Next.js. A request containing the `next-resume: 1` h… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-27980 | Red Hat | medium | 5.3 | 0.0%
| | An unbounded disk usage flaw has been discovered in Next.js. The default Next.js image optimization … | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-29057 | Red Hat | medium | 6.5 | 0.1%
| | A request smuggling flaw has been discovered in Next.js. when Next.js rewrites proxy traffic to an … | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-28500 | Red Hat | high | 8.6 | 0.0%
| | A flaw was found in Open Neural Network Exchange (ONNX), an open standard for machine learning inter… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-30922 | Red Hat | high | 7.5 | 0.0%
| | An unbounded recursion flaw has been discovered in the pypi pyasn1 library. This uncontrolled recurs… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-31898 | Red Hat | high | 8.1 | 0.0%
| | A flaw was found in jsPDF, a JavaScript library used for generating PDF documents. This vulnerabilit… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-31938 | Red Hat | high | 8.1 | 0.0%
| | A flaw was found in jsPDF, a JavaScript library for generating PDFs. A remote attacker can exploit t… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-22729 | VMware | high | 8.6 | 0.1%
| | A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authentic… | Mar 18, 2026 | Apr 1, 2026 |
| | CVE-2026-22730 | VMware | high | 8.8 | 0.0%
| | A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attack… | Mar 18, 2026 | Apr 1, 2026 |
| | CVE-2026-31962 | Red Hat | high | 7.3 | — | | A flaw was found in htslib, a library for reading and writing bioinformatics file formats. A local u… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-31963 | Red Hat | high | 7.3 | — | | A flaw was found in HTSlib, a library for reading and writing bioinformatics file formats. When proc… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-31964 | Red Hat | medium | 5.0 | — | | A flaw was found in HTSlib, a library for reading and writing bioinformatics file formats. When proc… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-31965 | Red Hat | medium | 5.6 | — | | A flaw was found in HTSlib, a library for reading and writing bioinformatics file formats. This vuln… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-4426 | Red Hat | medium | 6.5 | — | | A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompressi… | Mar 19, 2026 | Mar 19, 2026 |
| | CVE-2026-4424 | Red Hat | high | 7.5 | — | | A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive… | Mar 19, 2026 | Mar 19, 2026 |
| | CVE-2006-10002 | Red Hat | medium | 6.5 | 0.0%
| | A flaw was found in XML::Parser for Perl. This vulnerability allows an attacker to cause a heap corr… | Mar 19, 2026 | Mar 19, 2026 |
| | CVE-2006-10003 | Red Hat | high | 8.8 | 0.0%
| | A flaw was found in XML::Parser, a Perl module for parsing XML. This vulnerability, an off-by-one he… | Mar 19, 2026 | Mar 19, 2026 |
| | CVE-2026-25667 | Microsoft | high | 7.5 | 2.7%
| | ASP.NET Core Kestrel in Microsoft .NET 8.0 before 8.0.22 and .NET 9.0 before 9.0.11 allows a remote … | Mar 19, 2026 | Apr 22, 2026 |
| | CVE-2026-23658 | Microsoft | high | 8.6 | 0.1%
| | Insufficiently protected credentials in Azure DevOps allows an unauthorized attacker to elevate priv… | Mar 19, 2026 | Apr 1, 2026 |
| | CVE-2026-23659 | Microsoft | high | 8.6 | 0.1%
| | Exposure of sensitive information to an unauthorized actor in Azure Data Factory allows an unauthori… | Mar 19, 2026 | Apr 1, 2026 |
| | CVE-2026-24299 | Microsoft | medium | 5.3 | 0.0%
| | Improper neutralization of special elements used in a command ('command injection') in M365 Copilot … | Mar 19, 2026 | Mar 24, 2026 |
| | CVE-2026-26120 | Microsoft | medium | 6.5 | 0.1%
| | Server-side request forgery (ssrf) in Microsoft Bing allows an unauthorized attacker to perform tamp… | Mar 19, 2026 | Apr 1, 2026 |
| | CVE-2026-26136 | Microsoft | medium | 6.5 | 0.1%
| | Improper neutralization of special elements used in a command ('command injection') in Microsoft Cop… | Mar 19, 2026 | Apr 1, 2026 |
| | CVE-2026-26137 | Microsoft | critical | 9.9 | 0.0%
| | Server-side request forgery (ssrf) in Microsoft Exchange allows an authorized attacker to elevate pr… | Mar 19, 2026 | Mar 27, 2026 |
| | CVE-2026-26138 | Microsoft | high | 8.6 | 0.1%
| | Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate p… | Mar 19, 2026 | Mar 24, 2026 |
| | CVE-2026-26139 | Microsoft | high | 8.6 | 0.1%
| | Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate p… | Mar 19, 2026 | Mar 24, 2026 |
| | CVE-2026-32169 | Microsoft | critical | 10.0 | 0.1%
| | Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized attacker to elevate p… | Mar 19, 2026 | Apr 14, 2026 |
| | CVE-2026-32191 | Microsoft | critical | 9.8 | 0.1%
| | Improper neutralization of special elements used in an os command ('os command injection') in Micros… | Mar 19, 2026 | Apr 14, 2026 |
| | CVE-2026-30871 | Red Hat | critical | 9.8 | — | | A flaw was found in the OpenWrt mdns daemon. A remote attacker can exploit a Stack-based Buffer Over… | Mar 19, 2026 | Mar 19, 2026 |
| | CVE-2026-30872 | Red Hat | critical | 9.8 | — | | A flaw was found in OpenWrt's mdns daemon. A remote attacker can exploit a stack-based buffer overfl… | Mar 19, 2026 | Mar 19, 2026 |