| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-4271 | Libsoup: libsoup: denial of service via use-after-free in http/2 server | Red Hat | Red Hat Enterprise Linux 10 | Medium | 5.3 | 2026-03-17 11:14:21 | Deep Dive |
| CVE-2026-3632 | Libsoup: libsoup: http smuggling and server-side request forgery via malformed hostnames | Red Hat | Red Hat Enterprise Linux 10 | Low | 3.9 | 2026-03-17 09:44:20 | Deep Dive |
| CVE-2026-3634 | Libsoup: libsoup: http header injection and response splitting via crlf injection in content-type header | Red Hat | Red Hat Enterprise Linux 10 | Low | 3.9 | 2026-03-17 09:44:20 | Deep Dive |
| CVE-2026-3633 | Libsoup: libsoup: header and http request injection via crlf injection | Red Hat | Red Hat Enterprise Linux 10 | Low | 3.9 | 2026-03-17 09:44:20 | Deep Dive |
| CVE-2026-31386 | LiteSpeed Web Server Enterprise和LiteSpeed OpenLiteSpeed 操作系统命令注入漏洞 | LiteSpeed Technologies | OpenLiteSpeed | - | - | 2026-03-16 05:21:14 | Deep Dive |
| CVE-2026-3441 | Binutils: gnu binutils: information disclosure via specially crafted xcoff object file | Red Hat | Red Hat Enterprise Linux 10 | Medium | 6.1 | 2026-03-15 00:19:08 | Deep Dive |
| CVE-2026-3442 | Binutils: gnu binutils: information disclosure or denial of service via out-of-bounds read in bfd linker | Red Hat | Red Hat Enterprise Linux 10 | Medium | 6.1 | 2026-03-15 00:19:03 | Deep Dive |
| CVE-2026-4111 | Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive | Red Hat | Red Hat Enterprise Linux 10 | High | 7.5 | 2026-03-13 11:45:21 | Deep Dive |
| CVE-2026-4105 | Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method | Red Hat | Red Hat Enterprise Linux 10 | Medium | 6.7 | 2026-03-13 08:52:08 | Deep Dive |
| CVE-2026-25076 | Anchore Enterprise GraphQL Reports API SQL injection | Anchore | Anchore Enterprise | High | 7.3 | 2026-03-12 21:07:47 | Deep Dive |
| CVE-2026-3099 | Libsoup: libsoup: authentication bypass via digest authentication replay attack | Red Hat | Red Hat Enterprise Linux 10 | Medium | 5.8 | 2026-03-12 13:53:49 | Deep Dive |
| CVE-2026-3234 | Mod_proxy_cluster: mod_proxy_cluster: response body corruption via crlf injection | Red Hat | Red Hat Enterprise Linux 10 | Medium | 4.3 | 2026-03-12 10:54:25 | Deep Dive |
| CVE-2026-2808 | Consul vulnerable to arbitrary file reads through the vault kubernetes authentication provider | HashiCorp | Consul | Medium | 6.8 | 2026-03-11 23:08:32 | Deep Dive |
| CVE-2026-1471 | Caching of authentication context | Neo4j | Enterprise edition | - | - | 2026-03-11 16:30:24 | Deep Dive |
| CVE-2026-20163 | Remote Command Execution (RCE) through the '/splunkd/__upload/indexing/preview' REST endpoint in Splunk Enterprise | Splunk | Splunk Enterprise | High | 7.2 | 2026-03-11 16:18:27 | Deep Dive |
| CVE-2026-20162 | Stored Cross-Site Scripting (XSS) through Path Traversal in Splunk Enterprise | Splunk | Splunk Enterprise | Medium | 6.3 | 2026-03-11 16:18:23 | Deep Dive |
| CVE-2026-20166 | Sensitive Information Disclosure in Discover Splunk Observability Cloud app for Splunk Enterprise | Splunk | Splunk Enterprise | Medium | 5.4 | 2026-03-11 16:18:17 | Deep Dive |
| CVE-2026-20164 | Sensitive Information Disclosure through Improper Access Control in Splunk Enterprise | Splunk | Splunk Enterprise | Medium | 6.5 | 2026-03-11 16:18:02 | Deep Dive |
| CVE-2026-20165 | Sensitive Information Disclosure in MongoClient logging channel in Splunk Enterprise | Splunk | Splunk Enterprise | Medium | 6.3 | 2026-03-11 16:17:54 | Deep Dive |
| CVE-2026-3429 | Org.keycloak.services.resources.account: improper access control leading to mfa deletion and account takeover in keycloak account rest api | Red Hat | Red Hat build of Keycloak 26.4 | Medium | 4.2 | 2026-03-11 16:17:24 | Deep Dive |