Msrc Azl3 Tensorflow 2.16.1-11 On Azure Linux 3.0 vulnerabilities
13 known vulnerabilities affecting msrc/azl3_tensorflow_2.16.1-11_on_azure_linux_3.0.
Total CVEs
13
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM6LOW2
Vulnerabilities
Page 1 of 1
CVE-2026-27142HIGHCVSS 7.52026-03-10
CVE-2026-27142 [MEDIUM] URLs in meta content attribute actions are not escaped in html/template
URLs in meta content attribute actions are not escaped in html/template
Mariner: Mariner
Go: Go
Customer Action Required: Yes
msrc
CVE-2026-4519HIGHCVSS 7.02026-03-10
CVE-2026-4519 [HIGH] webbrowser.open() allows leading dashes in URLs
webbrowser.open() allows leading dashes in URLs
Mariner: Mariner
PSF: PSF
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2026-3338HIGHCVSS 7.52026-03-10
CVE-2026-3338 [HIGH] CWE-347 PKCS7_verify Signature Validation Bypass in AWS-LC
PKCS7_verify Signature Validation Bypass in AWS-LC
Mariner: Mariner
AMZN: AMZN
Customer Action Required: Yes
msrc
CVE-2026-3336HIGHCVSS 7.52026-03-10
CVE-2026-3336 [HIGH] CWE-295 PKCS7_verify Certificate Chain Validation Bypass in AWS-LC
PKCS7_verify Certificate Chain Validation Bypass in AWS-LC
Mariner: Mariner
AMZN: AMZN
Customer Action Required: Yes
msrc
CVE-2026-23868HIGHCVSS 7.02026-03-10
CVE-2026-23868 [MEDIUM] CVE-2026-23868: Mariner: Mariner
Meta: Meta
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn
Mariner: Mariner
Meta: Meta
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2026-3784MEDIUMCVSS 6.52026-03-10
CVE-2026-3784 [MEDIUM] wrong proxy connection reuse with credentials
wrong proxy connection reuse with credentials
Mariner: Mariner
curl: curl
Customer Action Required: Yes
msrc
CVE-2026-1965MEDIUMCVSS 6.52026-03-10
CVE-2026-1965 [MEDIUM] bad reuse of HTTP Negotiate connection
bad reuse of HTTP Negotiate connection
Mariner: Mariner
curl: curl
Customer Action Required: Yes
msrc
CVE-2026-3644MEDIUMCVSS 6.02026-03-10
CVE-2026-3644 [MEDIUM] Incomplete control character validation in http.cookies
Incomplete control character validation in http.cookies
Mariner: Mariner
PSF: PSF
Customer Action Required: Yes
msrc
CVE-2026-2297MEDIUMCVSS 5.72026-03-10
CVE-2026-2297 [MEDIUM] SourcelessFileLoader does not use io.open_code()
SourcelessFileLoader does not use io.open_code()
Mariner: Mariner
PSF: PSF
Customer Action Required: Yes
msrc
CVE-2026-3713MEDIUMCVSS 5.32026-03-10
CVE-2026-3713 [MEDIUM] CWE-122 pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow
pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow
Mariner: Mariner
VulDB: VulDB
Customer Action Required: Yes
msrc
CVE-2026-3783MEDIUMCVSS 5.32026-03-10
CVE-2026-3783 [MEDIUM] token leak with redirect and netrc
token leak with redirect and netrc
Mariner: Mariner
curl: curl
Customer Action Required: Yes
msrc
CVE-2026-3479LOW2026-03-10
CVE-2026-3479 [NONE] pkgutil.get_data() does not enforce documented restrictions
pkgutil.get_data() does not enforce documented restrictions
Mariner: Mariner
PSF: PSF
Customer Action Required: Yes
msrc
CVE-2025-13462LOWCVSS 2.02026-03-10
CVE-2025-13462 [LOW] tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling
tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling
Mariner: Mariner
PSF: PSF
Customer Action Required: Yes
msrc