Msrc Azl3 Python-Tensorboard 2.16.2-6 On Azure Linux 3.0 vulnerabilities
138 known vulnerabilities affecting msrc/azl3_python-tensorboard_2.16.2-6_on_azure_linux_3.0.
Total CVEs
138
CISA KEV
0
Public exploits
3
Exploited in wild
1
Severity breakdown
CRITICAL14HIGH69MEDIUM50LOW5
Vulnerabilities
Page 1 of 7
CVE-2026-34601HIGHCVSS 7.52026-04-02
CVE-2026-34601 [HIGH] CWE-91 xmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion
xmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion
Mariner: Mariner
GitHub_M: GitHub_M
Customer Action Required: Yes
msrc
CVE-2026-4746CRITICALCVSS 10.02026-03-10
CVE-2026-4746 [CRITICAL] CWE-787 Heap Buffer Over-Write Vulenrabilty in timeplus-io/proton
Heap Buffer Over-Write Vulenrabilty in timeplus-io/proton
Mariner: Mariner
GovTech CSG: GovTech CSG
Customer Action Required: Yes
msrc
CVE-2026-33228HIGHCVSS 8.92026-03-10
CVE-2026-33228 [HIGH] CWE-1321 flatted: Prototype Pollution via parse()
flatted: Prototype Pollution via parse()
Mariner: Mariner
GitHub_M: GitHub_M
Customer Action Required: Yes
msrc
CVE-2026-27142HIGHCVSS 7.52026-03-10
CVE-2026-27142 [MEDIUM] URLs in meta content attribute actions are not escaped in html/template
URLs in meta content attribute actions are not escaped in html/template
Mariner: Mariner
Go: Go
Customer Action Required: Yes
msrc
CVE-2026-33671HIGHCVSS 7.52026-03-10
CVE-2026-33671 [HIGH] CWE-1333 Picomatch has a ReDoS vulnerability via extglob quantifiers
Picomatch has a ReDoS vulnerability via extglob quantifiers
Mariner: Mariner
GitHub_M: GitHub_M
Customer Action Required: Yes
msrc
CVE-2026-32141HIGHCVSS 7.52026-03-10
CVE-2026-32141 [HIGH] CWE-674 flatted: Unbounded recursion DoS in parse() revive phase
flatted: Unbounded recursion DoS in parse() revive phase
Mariner: Mariner
GitHub_M: GitHub_M
Customer Action Required: Yes
msrc
CVE-2026-33672MEDIUMCVSS 5.32026-03-10
CVE-2026-33672 [MEDIUM] CWE-1321 Picomatch: Method Injection in POSIX Character Classes causes incorrect Glob Matching
Picomatch: Method Injection in POSIX Character Classes causes incorrect Glob Matching
Mariner: Mariner
GitHub_M: GitHub_M
Customer Action Required: Yes
msrc
CVE-2026-27199MEDIUMCVSS 6.32026-02-10
CVE-2026-27199 [MEDIUM] CWE-67 Werkzeug safe_join() allows Windows special device names
Werkzeug safe_join() allows Windows special device names
Mariner: Mariner
GitHub_M: GitHub_M
Customer Action Required: Yes
msrc
CVE-2025-69873LOWCVSS 2.92026-02-10
CVE-2025-69873 [LOW] CWE-1333 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Poin
ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScr
msrc
CVE-2025-15284HIGHCVSS 7.52025-12-09
CVE-2025-15284 [MEDIUM] CWE-20 arrayLimit bypass in bracket notation allows DoS via memory exhaustion
arrayLimit bypass in bracket notation allows DoS via memory exhaustion
Mariner: Mariner
harborist: harborist
Customer Action Required: Yes
msrc
CVE-2025-61727MEDIUMCVSS 6.52025-12-09
CVE-2025-61727 [MEDIUM] Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509
Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509
Mariner: Mariner
Go: Go
Customer Action Required: Yes
msrc
CVE-2025-66031HIGHCVSS 8.72025-11-11
CVE-2025-66031 [HIGH] CWE-674 node-forge ASN.1 Unbounded Recursion
node-forge ASN.1 Unbounded Recursion
Mariner: Mariner
GitHub_M: GitHub_M
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-12816HIGHCVSS 8.62025-11-11
CVE-2025-12816 [HIGH] CWE-436 CVE-2025-12816: CVE-2025-12816
Mariner: Mariner
certcc: certcc
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn
CVE-2025-12816
Mariner: Mariner
certcc: certcc
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-66221MEDIUMCVSS 6.32025-11-11
CVE-2025-66221 [MEDIUM] CWE-67 Werkzeug safe_join() allows Windows special device names
Werkzeug safe_join() allows Windows special device names
Mariner: Mariner
GitHub_M: GitHub_M
Customer Action Required: Yes
msrc
CVE-2025-47912HIGHCVSS 7.72025-10-14
CVE-2025-47912 [MEDIUM] Insufficient validation of bracketed IPv6 hostnames in net/url
Insufficient validation of bracketed IPv6 hostnames in net/url
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with
msrc
CVE-2025-58189HIGHCVSS 7.52025-10-14
CVE-2025-58189 [MEDIUM] ALPN negotiation error contains attacker controlled information in crypto/tls
ALPN negotiation error contains attacker controlled information in crypto/tls
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of
msrc
CVE-2025-58185HIGHCVSS 7.52025-10-14
CVE-2025-58185 [MEDIUM] Parsing DER payload can cause memory exhaustion in encoding/asn1
Parsing DER payload can cause memory exhaustion in encoding/asn1
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries
msrc
CVE-2025-61723HIGHCVSS 7.52025-10-14
CVE-2025-61723 [HIGH] Quadratic complexity when parsing some invalid inputs in encoding/pem
Quadratic complexity when parsing some invalid inputs in encoding/pem
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source li
msrc
CVE-2025-61725MEDIUMCVSS 6.52025-10-14
CVE-2025-61725 [HIGH] Excessive CPU consumption in ParseAddress in net/mail
Excessive CPU consumption in ParseAddress in net/mail
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is
msrc
CVE-2025-58187MEDIUMCVSS 5.32025-10-14
CVE-2025-58187 [HIGH] Quadratic complexity when checking name constraints in crypto/x509
Quadratic complexity when checking name constraints in crypto/x509
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source librarie
msrc
1 / 7Next →