TopVuln

High-risk vulnerability digests

CVE-2026-4519

  • HIGH

Important: Red Hat Security Advisory: python3.9 security update

Details

CVSS v3
7.0
CVSS v4
7.0
NVD published
2026-03-20 15:16:24
EPSS
<0.1% probability · 9.3th percentile — 2026-04-06
Affected versions
Not available in our cache.
Summary
The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open().
Remediation
Not available in our cache.
Exploit info
Not available in our cache.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.