| | CVE-2026-20042 | Cisco | medium | 6.5 | 0.0%
| | A vulnerability in the configuration backup feature of Cisco Nexus Dashboard could allow an attacker… | Apr 1, 2026 | Apr 3, 2026 |
| | CVE-2026-20041 | Cisco | medium | 6.1 | 0.0%
| | A vulnerability in Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights could allow an unauthent… | Apr 1, 2026 | Apr 3, 2026 |
| | CVE-2026-35092 | Red Hat | high | 7.5 | — | | A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity va… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-35091 | Red Hat | high | 8.2 | — | | A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vul… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23406 | Red Hat | medium | — | 0.0%
| | A flaw was found in AppArmor within the Linux kernel. The `match_char()` macro, when processing diff… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23411 | Red Hat | medium | — | 0.0%
| | A flaw was found in the Linux kernel's AppArmor security module. A race condition occurs when AppArm… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23410 | Red Hat | medium | — | 0.0%
| | A flaw was found in the Linux kernel's AppArmor security module. This vulnerability, a race conditio… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23407 | Red Hat | medium | — | 0.0%
| | A flaw was found in AppArmor, a security module within the Linux kernel. A local user could exploit … | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23405 | Red Hat | medium | — | 0.0%
| | A flaw was found in the AppArmor security module within the Linux kernel. A local user could exploit… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23403 | Red Hat | medium | — | 0.0%
| | A flaw was found in AppArmor within the Linux kernel. This vulnerability, located in the verify_head… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23408 | Red Hat | medium | — | 0.0%
| | A flaw was found in AppArmor within the Linux kernel. This vulnerability involves a double free of t… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23404 | Red Hat | medium | — | 0.0%
| | A flaw was found in the Linux kernel's AppArmor security module. A local user could trigger a denial… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23402 | Red Hat | low | 5.5 | 0.0%
| | A flaw was found in the Linux kernel's Kernel-based Virtual Machine (KVM) module. This vulnerability… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-23409 | Red Hat | medium | — | 0.0%
| | A flaw was found in AppArmor, a security module in the Linux kernel. This vulnerability occurs due t… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-35093 | Red Hat | high | 8.8 | — | | A flaw was found in libinput. A local attacker who can place a specially crafted Lua bytecode file i… | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-35094 | Red Hat | medium | 3.3 | — | | A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system … | Apr 1, 2026 | Apr 1, 2026 |
| | CVE-2026-34401 | Microsoft | medium | 6.5 | 0.2%
| | XML Notepad is a Windows program that provides a simple intuitive User Interface for browsing and ed… | Mar 31, 2026 | Apr 13, 2026 |
| | CVE-2026-34073 | Red Hat | low | 3.7 | 0.0%
| | A flaw was found in the `cryptography` library. This vulnerability occurs because DNS (Domain Name S… | Mar 31, 2026 | Mar 31, 2026 |
| | CVE-2026-34070 | Red Hat | high | 7.5 | 0.2%
| | A flaw was found in LangChain. Multiple functions in `langchain_core.prompts.loading` read files fro… | Mar 31, 2026 | Mar 31, 2026 |
| | CVE-2026-34054 | Microsoft | high | 7.8 | 0.1%
| | vcpkg is a free and open-source C/C++ package manager. Prior to version 3.6.1#3, vcpkg's Windows bui… | Mar 31, 2026 | Apr 2, 2026 |
| | CVE-2026-5201 | Red Hat | high | 7.5 | 0.1%
| | A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in … | Mar 31, 2026 | Mar 31, 2026 |
| | CVE-2026-32794 | Apache | medium | 4.8 | 0.0%
| | Improper Certificate Validation vulnerability in Apache Airflow Provider for Databricks. Provider co… | Mar 30, 2026 | Apr 2, 2026 |
| | CVE-2026-34714 | Red Hat | high | 8.6 | — | | A flaw was found in Vim. This vulnerability allows an attacker to execute malicious code on a user's… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2026-4046 | Red Hat | high | 7.5 | — | | A flaw was found in glibc, the GNU C Library. A remote attacker could exploit this vulnerability by … | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2025-66215 | Red Hat | low | 3.8 | — | | A flaw was found in OpenSC, an open-source smart card tool and middleware. An attacker with physical… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2025-66038 | Red Hat | low | 3.9 | — | | A flaw was found in OpenSC, an open-source smart card tools and middleware. The `sc_compacttlv_find_… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2025-66037 | Red Hat | low | 3.9 | — | | A flaw was found in OpenSC, an open-source smart card tools and middleware. An attacker could exploi… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2025-49010 | Red Hat | low | 3.8 | — | | A flaw was found in OpenSC, an open source smart card tools and middleware. An attacker with physica… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2026-5164 | Red Hat | medium | 6.7 | — | | A flaw was found in virtio-win. The `RhelDoUnMap()` function does not properly validate the number o… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2026-5165 | Red Hat | medium | 6.7 | — | | A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device u… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2026-5121 | Red Hat | medium | — | 0.1%
| | A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the z… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2026-5119 | Red Hat | medium | 5.9 | 0.0%
| | A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensit… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2026-5107 | Red Hat | medium | 4.2 | 0.0%
| | A flaw was found in frr package. This vulnerability, located in the EVPN Type-2 Route Handler functi… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2025-15036 | Red Hat | high | 9.6 | 0.1%
| | A flaw was found in mlflow. A path traversal vulnerability exists in the `extract_archive_to_dir` fu… | Mar 30, 2026 | Mar 30, 2026 |
| | CVE-2026-23400 | Red Hat | medium | — | — | | A flaw was found in the Linux kernel's rust_binder component. A local user could potentially trigger… | Mar 29, 2026 | Mar 29, 2026 |
| | CVE-2026-23399 | Red Hat | low | 5.5 | 0.0%
| | In the Linux kernel, the following vulnerability has been resolved:
nf_tables: nft_dynset: fix possi… | Mar 28, 2026 | Mar 28, 2026 |
| | CVE-2026-33996 | Red Hat | medium | 5.9 | 0.0%
| | LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK … | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-32187 | Microsoft | medium | 4.2 | 0.1%
| | Microsoft Edge (Chromium-based) Defense in Depth Vulnerability | Mar 27, 2026 | Mar 31, 2026 |
| | CVE-2026-33943 | Red Hat | high | 8.8 | 0.1%
| | Happy DOM is a JavaScript implementation of a web browser without its graphical user interface. In v… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33941 | Red Hat | high | 8.2 | 0.0%
| | Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 thr… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33940 | Red Hat | high | 8.1 | 0.0%
| | Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 thr… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33939 | Red Hat | high | 7.5 | 0.0%
| | Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 thr… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33938 | Red Hat | high | 8.1 | 0.1%
| | Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 thr… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33937 | Red Hat | high | 9.8 | 0.3%
| | Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 thr… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33916 | Red Hat | medium | 4.7 | 0.0%
| | Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 thr… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33896 | Red Hat | high | 7.4 | 0.0%
| | Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33895 | Red Hat | high | 7.5 | 0.0%
| | Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33894 | Red Hat | high | 7.5 | 0.0%
| | Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33891 | Red Hat | high | 7.5 | 0.0%
| | Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip… | Mar 27, 2026 | Mar 27, 2026 |
| | CVE-2026-33870 | Red Hat | high | 7.5 | 0.0%
| | Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.F… | Mar 27, 2026 | Mar 27, 2026 |