CVSS: 6.6EPSS: 0%CPEs: 1EXPL: 1CVE-2026-32694 – Insecure Direct Object Reference attack via predictable secret ID in Juju
https://notcve.org/view.php?id=CVE-2026-32694
18 Mar 2026 — In Juju from version 3.0.0 through 3.6.18, when a secret owner grants permissions to a secret to a grantee, the secret owner relies exclusively on a predictable XID of the secret to verify ownership. This allows a malicious grantee which can request secrets to predict past secrets granted by the same secret owner to different grantees, allowing them to use the resources granted by those past secrets. Successful exploitation relies on a very specific configuration, specific data semantic, and the administrat... • https://github.com/juju/juju/security/advisories/GHSA-5cj2-rqqf-hx9p • CWE-343: Predictable Value Range from Previous Values CWE-639: Authorization Bypass Through User-Controlled Key •
CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1CVE-2026-32693 – Unauthorized access to Kubernetes secrets in Juju
https://notcve.org/view.php?id=CVE-2026-32693
18 Mar 2026 — In Juju from version 3.0.0 through 3.6.18, the authorization of the "secret-set" tool is not performed correctly, which allows a grantee to update the secret content, and can lead to reading or updating other secrets. When the "secret-set" tool logs an error in an exploitation attempt, the secret is still updated contrary to expectations, and the new value is visible to both the owner and the grantee. En Juju desde la versión 3.0.0 hasta la 3.6.18, la autorización de la herramienta 'secret-set' no se realiz... • https://github.com/juju/juju/security/advisories/GHSA-439w-v2p7-pggc • CWE-284: Improper Access Control CWE-778: Insufficient Logging CWE-863: Incorrect Authorization •
CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0CVE-2026-32692 – Unauthorized update of out-of-scope Vault secrets
https://notcve.org/view.php?id=CVE-2026-32692
18 Mar 2026 — An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attacker can poison any existing secret revision within the scope of that Vault secret back-end. Una vulnerabilidad de omisión de autorización en la implementación del back-end de secretos de Vault de Juju versiones 3.1.6 a 3.6.18 permite a un agente de unidad autenticad... • https://github.com/juju/juju/security/advisories/GHSA-89x7-5m5m-mcmm • CWE-285: Improper Authorization •
CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0CVE-2026-32691 – Timing ownership claim attack on new external back-end secrets
https://notcve.org/view.php?id=CVE-2026-32691
18 Mar 2026 — A race condition in the secrets management subsystem of Juju versions 3.0.0 through 3.6.18 allows an authenticated unit agent to claim ownership of a newly initialized secret. Between generating a Juju Secret ID and creating the secret's first revision, an attacker authenticated as another unit agent can claim ownership of a known secret. This leads to the attacking unit being able to read the content of the initial secret revision. Una condición de carrera en el subsistema de gestión de secretos de las ver... • https://github.com/juju/juju/security/advisories/GHSA-gfgr-6hrj-85ww • CWE-708: Incorrect Ownership Assignment •
CVSS: 9.4EPSS: 0%CPEs: 4EXPL: 0CVE-2026-28384 – Authenticated RCE via unsanitized compression_algorithm
https://notcve.org/view.php?id=CVE-2026-28384
12 Mar 2026 — An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10. Una sanitización ina... • https://discourse.ubuntu.com/t/lxd-authenticated-remote-code-execution-fixes-available/78365 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0CVE-2026-3351 – Authorization Bypass in LXD GET /1.0/certificates Endpoint
https://notcve.org/view.php?id=CVE-2026-3351
03 Mar 2026 — Improper authorization in the API endpoint GET /1.0/certificates in Canonical LXD 6.6 on Linux allows an authenticated, restricted user to enumerate all certificate fingerprints trusted by the lxd server. • https://github.com/canonical/lxd/commit/d936c90d47cf0be1e9757df897f769e9887ebde1 • CWE-862: Missing Authorization •
CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0CVE-2024-31884 – Red Hat Security Advisory 2026-2800-03
https://notcve.org/view.php?id=CVE-2024-31884
17 Feb 2026 — pybind: Improper use of Pybind A new version of Red Hat build of Ceph Storage has been released. •
CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0CVE-2026-2032 – Interrupted page loads in new tabs could allow website spoofing under trusted domains in Firefox iOS
https://notcve.org/view.php?id=CVE-2026-2032
16 Feb 2026 — Malicious scripts that interrupt new tab page loading could cause desynchronization between the address bar and page content, allowing the attacker to spoof arbitrary HTML under a trusted domain. This vulnerability affects Firefox for iOS < 147.2.1. Scripts maliciosos que interrumpen la carga de la página de nueva pestaña podrían causar desincronización entre la barra de direcciones y el contenido de la página, permitiendo al atacante suplantar HTML arbitrario bajo un dominio de confianza. Esta vulnerabilid... • https://bugzilla.mozilla.org/show_bug.cgi?id=2012152 • CWE-451: User Interface (UI) Misrepresentation of Critical Information •
CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0CVE-2026-2447 – Heap buffer overflow in libvpx
https://notcve.org/view.php?id=CVE-2026-2447
16 Feb 2026 — Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2. • https://bugzilla.mozilla.org/show_bug.cgi?id=2014390 • CWE-122: Heap-based Buffer Overflow •
CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0CVE-2025-14282 – Dropbear: privilege escalation via unix domain socket forwardings
https://notcve.org/view.php?id=CVE-2025-14282
12 Feb 2026 — A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbear ssh server does the socket forwardings requested by the remote client as root, only switching to the logged-in user upon spawning a shell or performing some operations like reading the user's files. With the recent ability of also using unix domain sockets as the forwarding destination any user able to log in via ssh can connect to any unix socket with the root's credentials, bypassing both file system restr... • https://github.com/mkj/dropbear/pull/391 • CWE-266: Incorrect Privilege Assignment •
