Msrc Azl3 Tensorflow 2.16.1-11 On Azure Linux 3.0 vulnerabilities

13 known vulnerabilities affecting msrc/azl3_tensorflow_2.16.1-11_on_azure_linux_3.0.

Total CVEs
13
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM6LOW2

Vulnerabilities

Page 1 of 1
CVE-2026-27142HIGHCVSS 7.52026-03-10
CVE-2026-27142 [MEDIUM] URLs in meta content attribute actions are not escaped in html/template URLs in meta content attribute actions are not escaped in html/template Mariner: Mariner Go: Go Customer Action Required: Yes
msrc
CVE-2026-4519HIGHCVSS 7.02026-03-10
CVE-2026-4519 [HIGH] webbrowser.open() allows leading dashes in URLs webbrowser.open() allows leading dashes in URLs Mariner: Mariner PSF: PSF Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2026-3338HIGHCVSS 7.52026-03-10
CVE-2026-3338 [HIGH] CWE-347 PKCS7_verify Signature Validation Bypass in AWS-LC PKCS7_verify Signature Validation Bypass in AWS-LC Mariner: Mariner AMZN: AMZN Customer Action Required: Yes
msrc
CVE-2026-3336HIGHCVSS 7.52026-03-10
CVE-2026-3336 [HIGH] CWE-295 PKCS7_verify Certificate Chain Validation Bypass in AWS-LC PKCS7_verify Certificate Chain Validation Bypass in AWS-LC Mariner: Mariner AMZN: AMZN Customer Action Required: Yes
msrc
CVE-2026-23868HIGHCVSS 7.02026-03-10
CVE-2026-23868 [MEDIUM] CVE-2026-23868: Mariner: Mariner Meta: Meta Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn Mariner: Mariner Meta: Meta Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2026-3784MEDIUMCVSS 6.52026-03-10
CVE-2026-3784 [MEDIUM] wrong proxy connection reuse with credentials wrong proxy connection reuse with credentials Mariner: Mariner curl: curl Customer Action Required: Yes
msrc
CVE-2026-1965MEDIUMCVSS 6.52026-03-10
CVE-2026-1965 [MEDIUM] bad reuse of HTTP Negotiate connection bad reuse of HTTP Negotiate connection Mariner: Mariner curl: curl Customer Action Required: Yes
msrc
CVE-2026-3644MEDIUMCVSS 6.02026-03-10
CVE-2026-3644 [MEDIUM] Incomplete control character validation in http.cookies Incomplete control character validation in http.cookies Mariner: Mariner PSF: PSF Customer Action Required: Yes
msrc
CVE-2026-2297MEDIUMCVSS 5.72026-03-10
CVE-2026-2297 [MEDIUM] SourcelessFileLoader does not use io.open_code() SourcelessFileLoader does not use io.open_code() Mariner: Mariner PSF: PSF Customer Action Required: Yes
msrc
CVE-2026-3713MEDIUMCVSS 5.32026-03-10
CVE-2026-3713 [MEDIUM] CWE-122 pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow Mariner: Mariner VulDB: VulDB Customer Action Required: Yes
msrc
CVE-2026-3783MEDIUMCVSS 5.32026-03-10
CVE-2026-3783 [MEDIUM] token leak with redirect and netrc token leak with redirect and netrc Mariner: Mariner curl: curl Customer Action Required: Yes
msrc
CVE-2026-3479LOW2026-03-10
CVE-2026-3479 [NONE] pkgutil.get_data() does not enforce documented restrictions pkgutil.get_data() does not enforce documented restrictions Mariner: Mariner PSF: PSF Customer Action Required: Yes
msrc
CVE-2025-13462LOWCVSS 2.02026-03-10
CVE-2025-13462 [LOW] tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling Mariner: Mariner PSF: PSF Customer Action Required: Yes
msrc