Rhaiis Vllm-Neuron-Rhel9 vulnerabilities
5 known vulnerabilities affecting rhaiis/vllm-neuron-rhel9.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM4
Vulnerabilities
Page 1 of 1
CVE-2026-7141MEDIUMCVSS 6.32026-04-27
CVE-2026-7141 [MEDIUM] CWE-908 vllm: vllm: Uninitialized resource in KV Block Handler via has_mamba_layers function
vllm: vllm: Uninitialized resource in KV Block Handler via has_mamba_layers function
A flaw was found in vllm. A remote attacker can exploit a vulnerability in the `has_mamba_layers` function within the KV Block Handler component. By performing a specific manipulation, an uninitialized resource can be triggered, potentially leading to information disclosure or denial of service. T
redhat
CVE-2026-41066HIGHCVSS 7.52026-04-24
CVE-2026-41066 [HIGH] CWE-611 lxml: python: lxml: Information disclosure via untrusted XML input leading to local file read
lxml: python: lxml: Information disclosure via untrusted XML input leading to local file read
A flaw was found in lxml, a library for processing XML and HTML in Python. A remote attacker can exploit this vulnerability by sending untrusted XML input to an application using lxml's default parser configuration. This allows the attacker to read local files on the system, leadi
redhat
CVE-2026-3219MEDIUMCVSS 4.62026-04-20
CVE-2026-3219 [MEDIUM] CWE-1287 pip: pip: Incorrect file installation due to improper archive handling
pip: pip: Incorrect file installation due to improper archive handling
A flaw was found in pip. This vulnerability occurs because pip incorrectly processes concatenated tar and ZIP files as ZIP files, regardless of their true format. This improper handling can lead to confusing installation behavior, potentially causing the installation of unintended or 'incorrect' files. This could allow an a
redhat
CVE-2026-28684MEDIUMCVSS 6.62026-04-20
CVE-2026-28684 [MEDIUM] CWE-59 python-dotenv: python-dotenv: Arbitrary file overwrite via symbolic link following
python-dotenv: python-dotenv: Arbitrary file overwrite via symbolic link following
A flaw was found in python-dotenv. A local attacker can exploit this by crafting a symbolic link, which the `set_key()` and `unset_key()` functions in python-dotenv follow when rewriting `.env` files. This can lead to the overwriting of arbitrary files on the system.
Mitigation: Mitigation for this i
redhat
CVE-2026-40347MEDIUMCVSS 5.32026-04-17
CVE-2026-40347 [MEDIUM] CWE-1050 python-multipart: Python-Multipart: Denial of Service via crafted multipart/form-data requests
python-multipart: Python-Multipart: Denial of Service via crafted multipart/form-data requests
Python-Multipart is a streaming multipart parser for Python. Versions prior to 0.0.26 have a denial of service vulnerability when parsing crafted `multipart/form-data` requests with large preamble or epilogue sections. Upgrade to version 0.0.26 or later, which skips ahead to
redhat