6.2
CVE-2026-40227 - systemd: systemd: Denial of Service via malicious IPC API call with null element
In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.
6.4
CVE-2026-40226 -
In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.
6.4
CVE-2026-40225 -
In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.
6.7
CVE-2026-40224 -
In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace.
8.6
CVE-2026-29002 - CouchCMS Privilege Escalation via f_k_levels_list Parameter
CouchCMS contains a privilege escalation vulnerability that allows authenticated Admin-level users to create SuperAdmin accounts by tampering with the f_k_levels_list parameter in user creation requests. Attackers can modify the parameter value from 4 to 10 in the HTTP request body to bypass authorβ¦
4.7
CVE-2026-40223 -
In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and User=<unset> unit exists and is running.
8.8
CVE-2026-40217 -
LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI.
7.5
CVE-2026-6069 - CVE-2026-6069
NASMβs disasm() function contains a stack based buffer overflow when formatting disassembly output, allowing an attacker triggered out-of-bounds write when `slen` exceeds the buffer capacity.
6.5
CVE-2026-6068 - CVE-2026-6068
NASM contains a heap use after free vulnerability in response file (-@) processing where a dangling pointer to freed memory is stored in the global depend_file and later dereferenced, as the response-file buffer is freed before the pointer is used, allowing for data corruption or unexpected behavioβ¦
7.5
CVE-2026-6067 - CVE-2026-6067
A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm file, potentially leading to heap memory corruption, denial of service (crash), andβ¦