| | CVE-2026-31963 | Red Hat | high | 7.3 | — | | A flaw was found in HTSlib, a library for reading and writing bioinformatics file formats. When proc… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-31962 | Red Hat | high | 7.3 | — | | A flaw was found in htslib, a library for reading and writing bioinformatics file formats. A local u… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-22730 | VMware | high | 8.8 | 0.0%
| | A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attack… | Mar 18, 2026 | Apr 1, 2026 |
| | CVE-2026-22729 | VMware | high | 8.6 | 0.1%
| | A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authentic… | Mar 18, 2026 | Apr 1, 2026 |
| | CVE-2026-31938 | Red Hat | high | 8.1 | 0.0%
| | A flaw was found in jsPDF, a JavaScript library for generating PDFs. A remote attacker can exploit t… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-31898 | Red Hat | high | 8.1 | 0.0%
| | A flaw was found in jsPDF, a JavaScript library used for generating PDF documents. This vulnerabilit… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-30922 | Red Hat | high | 7.5 | 0.0%
| | An unbounded recursion flaw has been discovered in the pypi pyasn1 library. This uncontrolled recurs… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-28500 | Red Hat | high | 8.6 | 0.0%
| | A flaw was found in Open Neural Network Exchange (ONNX), an open standard for machine learning inter… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-29057 | Red Hat | medium | 6.5 | 0.1%
| | A request smuggling flaw has been discovered in Next.js. when Next.js rewrites proxy traffic to an … | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-27980 | Red Hat | medium | 5.3 | 0.0%
| | An unbounded disk usage flaw has been discovered in Next.js. The default Next.js image optimization … | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-27979 | Red Hat | medium | 5.3 | 0.0%
| | A denial of service flaw has been discovered in Next.js. A request containing the `next-resume: 1` h… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-4366 | Red Hat | medium | 5.8 | — | | A flaw was identified in Keycloak, an identity and access management solution, where it improperly f… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23245 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23243 | Red Hat | high | 7.0 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2025-71265 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23248 | Red Hat | medium | 7.0 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2025-71266 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23247 | Red Hat | low | 5.5 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2025-71267 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23246 | Red Hat | medium | 5.9 | 0.0%
| | A flaw was found in the Linux kernel's mac80211 Wi-Fi subsystem. This vulnerability occurs in the ie… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23244 | Red Hat | low | 5.5 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23242 | Red Hat | medium | 7.0 | 0.0%
| | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23263 | Red Hat | medium | — | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23266 | Red Hat | medium | — | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23261 | Red Hat | medium | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23259 | Red Hat | low | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2025-71269 | Red Hat | medium | 7.0 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23267 | Red Hat | medium | — | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23256 | Red Hat | medium | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23262 | Red Hat | medium | 7.0 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2025-71268 | Red Hat | medium | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23254 | Red Hat | low | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23249 | Red Hat | medium | 7.0 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23257 | Red Hat | medium | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23260 | Red Hat | low | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23255 | Red Hat | high | 7.0 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23252 | Red Hat | low | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23265 | Red Hat | medium | — | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23251 | Red Hat | medium | 7.0 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23264 | Red Hat | medium | — | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23258 | Red Hat | medium | 5.5 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-23270 | Red Hat | medium | 7.0 | — | | No description is available for this CVE. | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-26740 | Red Hat | high | 7.5 | — | | A flaw was found in giflib. A remote attacker can exploit a buffer overflow vulnerability in the EGi… | Mar 18, 2026 | Mar 18, 2026 |
| | CVE-2026-4324 | Red Hat | medium | 5.4 | — | | A flaw was found in the Katello plugin for Red Hat Satellite. This vulnerability, caused by improper… | Mar 17, 2026 | Mar 17, 2026 |
| | CVE-2026-30911 | Apache | high | 8.1 | 0.0%
| | Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API… | Mar 17, 2026 | Mar 17, 2026 |
| | CVE-2026-28779 | Apache | high | 7.5 | 0.0%
| | Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regar… | Mar 17, 2026 | Mar 17, 2026 |
| | CVE-2026-28563 | Apache | medium | 4.3 | 0.0%
| | Apache Airflow versions 3.1.0 through 3.1.7 /ui/dependencies endpoint returns the full DAG dependenc… | Mar 17, 2026 | Mar 17, 2026 |
| | CVE-2026-26929 | Apache | medium | 6.5 | 0.0%
| | Apache Airflow versions 3.0.0 through 3.1.7 FastAPI DagVersion listing API does not apply per-DAG au… | Mar 17, 2026 | Mar 17, 2026 |
| | CVE-2026-23241 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 17, 2026 | Mar 17, 2026 |
| | CVE-2025-71239 | Red Hat | medium | — | 0.0%
| | No description is available for this CVE. | Mar 17, 2026 | Mar 17, 2026 |