CVE-2025-68121 Unexpected session resumption in crypto/tls
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68121
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68121
CVE-2026-27141 Sending certain HTTP/2 frames can cause a server to panic in golang.org/x/net
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27141
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27141
CVE-2026-26122 Microsoft ACI Confidential Containers Information Disclosure Vulnerability
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26122
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26122
CVE-2026-26125 Payment Orchestrator Service Elevation of Privilege Vulnerability
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26125
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26125
CVE-2026-26124 Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26124
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26124
CVE-2026-21536 Microsoft Devices Pricing Program Remote Code Execution Vulnerability
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21536
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21536
CVE-2026-23651 Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
Permissive regular expression in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23651
Permissive regular expression in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23651
CVE-2025-68146 filelock has TOCTOU race condition that allows symlink attacks during lock file creation
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68146
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68146
CVE-2026-22701 filelock Time-of-Check-Time-of-Use (TOCTOU) Symlink Vulnerability in SoftFileLock
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22701
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22701
CVE-2026-28364 In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28364
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28364
CVE-2026-3494 MariaDB Server Audit Plugin Comment Handling Bypass
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3494
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3494
CVE-2025-14524 bearer token leak on cross-protocol redirect
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-14524
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-14524
CVE-2025-10966 missing SFTP host verification with wolfSSH
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10966
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10966
CVE-2026-27138 Panic in name constraint checking for malformed certificates in crypto/x509
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27138
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27138
CVE-2026-27137 Incorrect enforcement of email constraints in crypto/x509
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27137
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27137
CVE-2025-69644 An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file.
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69644
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69644
CVE-2025-69651 GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service.
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69651
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69651
CVE-2025-69650 GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service.
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69650
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69650
CVE-2026-29786 node-tar: Hardlink Path Traversal via Drive-Relative Linkpath
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29786
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29786
CVE-2024-14027 xattr: switch to CLASS(fd)
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-14027
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-14027
CVE-2026-27139 FileInfo can escape from a Root in os
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27139
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27139