Redhat

5109 CVEs vendor

Monthly

CVE-2025-71080 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT On PREEMPT_RT kernels, after rt6_get_pcpu_route() returns NULL, the current task can be preempted.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-71079 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write A deadlock can occur between nfc_unregister_device() and rfkill_fop_write() due to lock ordering inversion between device_lock and rfkill_global_mutex.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-71078 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: powerpc/64s/slb: Fix SLB multihit issue during SLB preload On systems using the hash MMU, there is a software SLB preload cache that mirrors the entries loaded into the hardware SLB buffer.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-71077 MEDIUM PATCH This Month

CVE-2025-71077 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-71076 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Limit num_syncs to prevent oversized allocations The OA open parameters did not validate num_syncs, allowing userspace to pass arbitrarily large values, potentially leading to excessive allocations.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-71075 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: scsi: aic94xx: fix use-after-free in device removal path The asd_pci_remove() function fails to synchronize with pending tasklets before freeing the asd_ha structure, leading to a potential use-after-free vulnerability.

Linux Use After Free Memory Corruption Information Disclosure Linux Kernel +2
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-71074 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: functionfs: fix the open/removal races ffs_epfile_open() can race with removal, ending up with file->private_data pointing to freed object.

Linux Information Disclosure Race Condition Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
4.7
EPSS
0.0%
CVE-2025-71073 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: Input: lkkbd - disable pending work before freeing device lkkbd_interrupt() schedules lk->tq via schedule_work(), and the work handler lkkbd_reinit() dereferences the lkkbd structure and its serio/input_dev fields.

Linux Use After Free Information Disclosure Memory Corruption Linux Kernel +2
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-71072 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: shmem: fix recovery on rename failures maple_tree insertions can fail if we are seriously short on memory; simple_offset_rename() does not recover well if it runs into that. The same goes for simple_offset_rename_exchange().

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-71071 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: fix use-after-free on probe deferral The driver is dropping the references taken to the larb devices during probe after successful lookup as well as on errors.

Linux Use After Free Mediatek Memory Corruption Information Disclosure +3
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-71068 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: svcrdma: bound check rq_pages index in inline path svc_rdma_copy_inline_range indexed rqstp->rq_pages[rc_curpage] without verifying rc_curpage stays within the allocated page array.

Linux Information Disclosure Redhat Suse
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-68823 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: ublk: fix deadlock when reading partition table When one process(such as udev) opens ublk block device (e.g., to read the partition table via bdev_open()), a deadlock[1] can occur: 1. bdev_open() grabs disk->open_mutex 2. [CVSS 5.5 MEDIUM]

Linux Linux Kernel Redhat Suse
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-68817 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency Under high concurrency, A tree-connection object (tcon) is freed on a disconnect path while another path still holds a reference and later executes *_put()/write on it. [CVSS 7.8 HIGH]

Linux Use After Free Linux Kernel Redhat Suse
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-12548 CRITICAL PATCH Act Now

Eclipse Che che-machine-exec exposes an unauthenticated JSON-RPC/WebSocket API on port 3333 that allows remote command execution and secret exfiltration from other users' developer workspace containers.

Ssh Authentication Bypass Redhat
NVD
CVSS 3.1
9.0
EPSS
0.3%
CVE-2026-0892 CRITICAL PATCH Act Now

Firefox 146 and Thunderbird 146 contain memory safety bugs with evidence of memory corruption that could potentially be exploited for code execution.

Memory Corruption Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-0891 HIGH PATCH This Week

Arbitrary code execution in Firefox and Thunderbird versions prior to 147/140.7 results from memory corruption vulnerabilities that could allow remote attackers to execute malicious code with no user interaction required. Multiple memory safety flaws across Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146, and Thunderbird 146 create conditions for potential exploitation despite no patch currently being available. The high CVSS score of 8.1 reflects the critical nature of achieving full system compromise through network-based attack vectors.

Memory Corruption Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-0890 MEDIUM PATCH This Month

DOM spoofing in Mozilla Firefox and Thunderbird's copy, paste, and drag-and-drop functionality allows unauthenticated attackers to deceive users into performing unintended actions through crafted content. The vulnerability affects Firefox versions below 147 and ESR versions below 140.7, as well as Thunderbird versions below 147 and 140.7, requiring user interaction to exploit. No patch is currently available.

Mozilla Authentication Bypass Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-0889 HIGH POC PATCH This Week

Service Workers in Mozilla Firefox and Thunderbird versions below 147 are vulnerable to remote denial-of-service attacks that require no user interaction or authentication. An unauthenticated attacker can crash affected applications over the network, and public exploit code exists for this vulnerability. Currently no patch is available for remediation.

Mozilla Denial Of Service Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-0888 MEDIUM PATCH This Month

Firefox and Thunderbird versions before 147 contain an information disclosure vulnerability in their XML processing component that allows unauthenticated attackers to access sensitive data over the network with minimal attack complexity. The vulnerability requires no user interaction and affects the confidentiality of information without impacting system integrity or availability. No security patch is currently available.

Information Disclosure Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-0887 MEDIUM PATCH This Month

The PDF Viewer component in Firefox and Thunderbird is vulnerable to clickjacking attacks that enable information disclosure through UI redressing techniques. Attackers can manipulate user interactions to trick victims into unintentionally revealing sensitive information, affecting Firefox versions below 147, Firefox ESR below 140.7, Thunderbird below 147, and Thunderbird ESR below 140.7. No patch is currently available for this vulnerability.

Information Disclosure Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-0886 MEDIUM PATCH This Month

Improper boundary validation in the Graphics component of Firefox, Firefox ESR, and Thunderbird allows unauthenticated remote attackers to cause limited information disclosure over the network without user interaction. Affected versions include Firefox before 147, Firefox ESR before 115.32 and 140.7, and Thunderbird before 147 and 140.7. No patch is currently available for this medium-severity vulnerability.

Industrial Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-0885 MEDIUM PATCH This Month

Memory corruption in Firefox and Thunderbird's JavaScript garbage collection engine allows remote attackers to crash the application or potentially leak sensitive information without user interaction. The vulnerability affects Firefox versions below 147, Firefox ESR below 140.7, Thunderbird below 147, and Thunderbird ESR below 140.7, with no patch currently available.

Use After Free Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-0884 CRITICAL PATCH Act Now

Firefox JavaScript engine has a use-after-free vulnerability. Affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147 and < 140.7.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-0883 MEDIUM PATCH This Month

The Networking component in Firefox and Thunderbird discloses sensitive information to unauthenticated remote attackers over the network. Affected versions include Firefox below 147, Firefox ESR below 140.7, Thunderbird below 147, and Thunderbird ESR below 140.7. No patch is currently available to remediate this vulnerability.

Information Disclosure Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-0882 HIGH PATCH This Week

A use-after-free vulnerability in the IPC component of Firefox (versions below 147 and ESR versions below 115.32/140.7) and Thunderbird (versions below 147 and 140.7) enables remote code execution when users interact with malicious content. The flaw requires user interaction and network access, allowing attackers to achieve full system compromise with high integrity and confidentiality impact. No patch is currently available for this vulnerability.

Use After Free Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-0881 CRITICAL PATCH Act Now

Firefox Messaging System component has a sandbox escape vulnerability. Maximum CVSS 10.0 with scope change. Affects Firefox < 147 and Thunderbird < 147.

Authentication Bypass Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-0880 HIGH PATCH This Week

Integer overflow in Firefox and Thunderbird's Graphics component enables sandbox escape, allowing remote attackers to execute arbitrary code with high privileges through a malicious webpage or content requiring user interaction. Affected versions include Firefox below 147, Firefox ESR below 115.32 and 140.7, and Thunderbird below 147 and 140.7. No patch is currently available.

Industrial Integer Overflow Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-0879 CRITICAL PATCH Act Now

Firefox sandbox escape via incorrect boundary conditions in the Graphics component. Affects Firefox < 147, Firefox ESR < 115.32 and < 140.7, Thunderbird < 147 and < 140.7.

Industrial Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-0878 HIGH PATCH This Week

Incorrect boundary condition validation in Firefox and Thunderbird's WebGL graphics component allows attackers to escape the sandbox and potentially execute arbitrary code through a crafted web page or malicious content. The vulnerability affects Firefox versions below 147, Firefox ESR below 140.7, Thunderbird below 147, and Thunderbird ESR below 140.7, and requires user interaction to exploit. No patch is currently available.

Mozilla Code Injection Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
8.0
EPSS
0.0%
CVE-2026-0877 HIGH PATCH This Week

DOM security bypass in Firefox and Thunderbird allows remote attackers to circumvent protective mitigations through user interaction, affecting multiple versions across both products. An attacker can exploit this to achieve high-impact compromise of confidentiality and integrity without requiring authentication. Currently no patch is available for affected users.

Mozilla Authentication Bypass Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-22801 MEDIUM PATCH This Month

Libpng versions 1.6.26 through 1.6.53 contain an integer truncation flaw in the simplified write API functions that triggers a heap buffer over-read when processing images with negative row strides or strides exceeding 65535 bytes. Local attackers can exploit this to read sensitive heap memory, potentially disclosing application data. No patch is currently available; users should avoid processing untrusted PNG images with these vulnerable libpng versions.

Buffer Overflow Libpng Redhat Suse
NVD GitHub VulDB
CVSS 3.1
6.8
EPSS
0.0%
CVE-2026-22695 MEDIUM POC PATCH This Month

Libpng versions 1.6.51-1.6.53 contain a heap buffer over-read in the simplified API function png_image_finish_read when processing interlaced 16-bit PNG images with 8-bit output and non-minimal row stride, allowing local attackers to read out-of-bounds memory through a malicious image file. Public exploit code exists for this regression, which was introduced by a previous security fix. Upgrade to version 1.6.54 to remediate.

Buffer Overflow Libpng Redhat Suse
NVD GitHub VulDB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-15514 HIGH POC This Week

Ollama 0.11.5-rc0 through current version 0.13.5 contain a null pointer dereference vulnerability in the multi-modal model image processing functionality. [CVSS 7.5 HIGH]

Null Pointer Dereference Denial Of Service AI / ML Ollama Redhat +1
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2024-58340 HIGH POC This Week

LangChain versions up to and including 0.3.1 contain a regular expression denial-of-service (ReDoS) vulnerability in the MRKLOutputParser.parse() method (libs/langchain/langchain/agents/mrkl/output_parser.py). [CVSS 7.5 HIGH]

Denial Of Service AI / ML Langchain Redhat
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-22772 MEDIUM POC PATCH This Month

Fulcio versions prior to 1.8.5 allow unauthenticated attackers to bypass MetaIssuer URL validation through unanchored regex patterns, enabling blind SSRF attacks against internal services. Although the vulnerability is limited to read-only GET requests with no response exfiltration, attackers can probe internal networks to discover active services and infrastructure. Public exploit code exists for this medium-severity issue, and a patch is available in version 1.8.5.

SSRF Fulcio Redhat Suse
NVD GitHub
CVSS 3.1
5.8
EPSS
0.0%
CVE-2026-22776 HIGH POC PATCH This Week

cpp-httplib versions prior to 0.30.1 are vulnerable to denial of service attacks due to insufficient validation of decompressed HTTP request body sizes. An unauthenticated remote attacker can send a malicious gzip or brotli-compressed request that decompresses to an arbitrarily large payload in memory, exhausting server resources. Public exploit code exists for this vulnerability, and a patch is available in version 0.30.1 and later.

Denial Of Service Cpp Httplib Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-22771 HIGH POC PATCH This Week

Credential theft via Lua script execution in Envoy Gateway versions before 1.5.7 and 1.6.2 allows authenticated attackers to extract proxy credentials and subsequently access the control plane and all associated secrets including TLS private keys. Public exploit code exists for this vulnerability. Affected organizations running vulnerable Envoy Gateway instances should immediately upgrade as no patch is currently available for intermediate versions.

Kubernetes Tls Gateway Redhat Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-68471 MEDIUM POC PATCH This Month

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending 2 unsolicited announcements with CNAME resource records 2 seconds apart. [CVSS 6.5 MEDIUM]

Denial Of Service Avahi Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-68468 MEDIUM PATCH This Month

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to resource records with short TTLs. [CVSS 6.5 MEDIUM]

Denial Of Service Avahi Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-68276 MEDIUM PATCH This Month

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. [CVSS 5.5 MEDIUM]

Denial Of Service Avahi Redhat Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-68493 HIGH PATCH This Week

Struts versions up to 2.2.1 is affected by improper restriction of xml external entity reference (CVSS 8.1).

Apache Struts Redhat
NVD HeroDevs VulDB
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-0822 MEDIUM POC PATCH This Month

Heap-based buffer overflow in QuickJS up to version 0.11.0 within the js_typed_array_sort function allows remote attackers to corrupt memory and potentially achieve code execution with minimal user interaction. Public exploit code exists for this vulnerability. Users should apply the available patch (commit 53eefbcd695165a3bd8c584813b472cb4a69fbf5) to remediate the risk.

Buffer Overflow Heap Overflow Quickjs Redhat
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-0821 HIGH POC PATCH This Week

Heap-based buffer overflow in QuickJS up to version 0.11.0 within the js_typed_array_constructor function allows unauthenticated remote attackers to corrupt memory and potentially execute arbitrary code. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. Affected users should apply patch c5d80831e51e48a83eab16ea867be87f091783c5 immediately.

Buffer Overflow Heap Overflow Quickjs Redhat
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2026-22773 MEDIUM POC PATCH This Month

Vllm versions up to 0.12.0 is affected by allocation of resources without limits or throttling (CVSS 6.5).

Denial Of Service AI / ML Vllm Redhat
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-22703 MEDIUM POC PATCH This Month

Cosign's bundle verification mechanism fails to properly validate that embedded Rekor entries reference the correct artifact digest, signature, and public key, allowing an attacker with a compromised signing identity to forge valid bundles and bypass transparency log verification. A malicious actor could exploit this to create counterfeit signatures that pass validation checks, affecting users relying on Cosign for container and binary code signing verification. Public exploit code exists for this vulnerability; patches are available in versions 2.6.2 and 3.0.4.

Authentication Bypass Cosign Redhat Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-22702 MEDIUM PATCH This Month

Virtualenv versions up to 20.36.1 is affected by improper link resolution before file access (CVSS 4.5).

Python Race Condition Virtualenv Redhat Suse
NVD GitHub
CVSS 3.1
4.5
EPSS
0.0%
CVE-2026-22701 MEDIUM PATCH This Month

Python's filelock SoftFileLock implementation prior to version 3.20.3 contains a TOCTOU race condition that allows local attackers with symlink creation privileges to interfere with lock file operations between permission validation and file creation. An attacker can exploit this window to create a symlink at the target lock path, causing lock operations to fail or redirect to unintended files, resulting in denial of service or unexpected behavior. Upgrade to filelock version 3.20.3 or later to remediate this vulnerability.

Python Denial Of Service Race Condition Filelock Redhat +1
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-22693 MEDIUM POC PATCH This Month

HarfBuzz text shaping engine versions prior to 12.3.0 crash when the SubtableUnicodesCache::create function attempts to dereference a null pointer returned by failed memory allocation, enabling denial of service in applications processing untrusted font data. Public exploit code exists for this vulnerability. A patch is available in version 12.3.0 and later.

Null Pointer Dereference Harfbuzz Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-22691 MEDIUM PATCH This Month

pypdf versions prior to 6.6.0 are vulnerable to denial of service through CPU exhaustion when processing malformed PDF files with crafted startxref entries in non-strict reading mode. An attacker can create a specially crafted PDF containing excessive whitespace that causes the library to consume significant processing resources during cross-reference table reconstruction. A patch is available in version 6.6.0 and later.

Python Pypdf Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-22690 MEDIUM PATCH This Month

Denial of service via resource exhaustion in pypdf prior to version 6.6.0 allows remote attackers to trigger excessive processing times by submitting specially crafted PDF files with missing /Root objects and inflated /Size values. The vulnerability only affects non-strict parsing mode and causes the library to consume significant CPU resources when processing otherwise invalid documents. A patch is available in version 6.6.0 and later.

Python Pypdf Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-22610 MEDIUM PATCH CISA This Month

Angular's Template Compiler fails to properly sanitize href and xlink:href attributes on SVG script elements, enabling reflected cross-site scripting attacks against applications using affected versions (prior to 19.2.18, 20.3.16, 21.0.7, or 21.1.0-rc.0). An attacker can inject malicious scripts through specially crafted SVG elements that bypass the framework's built-in sanitization, allowing session hijacking, credential theft, or other client-side attacks when users interact with affected content. Updates are available for all affected version branches.

Angular XSS Redhat
NVD GitHub HeroDevs
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-22030 MEDIUM PATCH This Month

React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. [CVSS 6.5 MEDIUM]

React CSRF React Router Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-22029 HIGH PATCH This Week

React Router is a router for React. In @remix-run/router version prior to 1.23.2. [CVSS 8.0 HIGH]

React Open Redirect React Router Redhat Suse
NVD GitHub
CVSS 3.1
8.0
EPSS
0.0%
CVE-2026-21884 HIGH PATCH This Week

React Router is a router for React. In @remix-run/react version prior to 2.17.3. [CVSS 8.2 HIGH]

React XSS React Router Redhat Suse
NVD GitHub
CVSS 3.1
8.2
EPSS
0.0%
CVE-2025-68470 MEDIUM PATCH This Month

React-Router versions up to 6.30.1 is affected by url redirection to untrusted site (open redirect) (CVSS 6.5).

React React Router Redhat
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-61686 CRITICAL PATCH Act Now

React Router (@react-router/node 7.0.0-7.9.3) has a path traversal in file-based session storage when using unsigned cookies. Attackers can manipulate session file paths to read or write arbitrary files on the server.

React Redhat
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2025-59057 HIGH PATCH This Week

React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. [CVSS 7.6 HIGH]

React XSS React Router Redhat
NVD GitHub
CVSS 3.1
7.6
EPSS
0.0%
CVE-2025-46299 MEDIUM PATCH This Month

A memory initialization issue was addressed with improved memory handling. This issue is fixed in tvOS 26.2, Safari 26.2, watchOS 26.2, visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. [CVSS 4.3 MEDIUM]

Apple Authentication Bypass Redhat Suse
NVD VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-9222 HIGH This Week

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2.2 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an authenticated user to achieve stored cross-site scripting by exploiting GitLab Flavored Markdown. [CVSS 8.7 HIGH]

Gitlab XSS Redhat
NVD
CVSS 3.1
8.7
EPSS
0.0%
CVE-2025-13772 HIGH This Week

GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an authenticated user to access and utilize AI model settings from unauthorized namespaces by manipulating namespace identifiers in API requests. [CVSS 7.1 HIGH]

Gitlab AI / ML Redhat
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-13761 HIGH This Week

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an unauthenticated user to execute arbitrary code in the context of an authenticated user's browser by convincing the legitimate user to visit a specially crafted webpage. [CVSS 8.0 HIGH]

Gitlab Redhat
NVD
CVSS 3.1
8.0
EPSS
0.0%
CVE-2025-69195 HIGH PATCH This Week

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. [CVSS 7.6 HIGH]

Buffer Overflow Stack Overflow Memory Corruption Denial Of Service Wget2 +2
NVD
CVSS 3.1
7.6
EPSS
0.1%
CVE-2025-69194 HIGH PATCH This Week

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. [CVSS 8.8 HIGH]

Path Traversal Wget2 Redhat Suse
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-70974 CRITICAL PATCH Act Now

Fastjson before 1.2.48 has a well-known autoType deserialization vulnerability enabling JNDI injection and RCE. Exploited in the wild since 2023 through GodzillaWebShell. Maximum CVSS 10.0 with scope change.

Java Redhat
NVD GitHub
CVSS 3.1
10.0
EPSS
0.0%
CVE-2025-14505 MEDIUM This Month

The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. [CVSS 5.6 MEDIUM]

Information Disclosure Redhat
NVD GitHub HeroDevs
CVSS 3.1
5.6
EPSS
0.0%
CVE-2025-65518 HIGH This Week

Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. [CVSS 7.5 HIGH]

PHP Denial Of Service Plesk Obsidian Redhat
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-68158 MEDIUM POC PATCH This Month

Authlib is a Python library which builds OAuth and OpenID Connect servers. [CVSS 5.7 MEDIUM]

Python CSRF Redhat Suse
NVD GitHub VulDB
CVSS 3.1
5.7
EPSS
0.0%
CVE-2025-50334 HIGH POC PATCH This Week

An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component [CVSS 7.5 HIGH]

Dns Denial Of Service Dnsserver Redhat
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-68151 HIGH PATCH This Week

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.0, multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limit...

Dns Denial Of Service Coredns Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-22028 MEDIUM POC PATCH This Month

HTML injection in Preact and React through unsafe JSON deserialization allows remote attackers to inject arbitrary scripts when applications pass unsanitized user-controlled data as component children, with public exploit code already available. The vulnerability stems from a regression in Preact 10.26.5 that weakened protections against constructing Virtual DOM elements from malicious JSON payloads. Affected applications are vulnerable if they consume unvalidated external data without sanitization and lack additional mitigations like Content Security Policy.

React Preact Redhat Suse
NVD GitHub
CVSS 3.1
6.1
EPSS
0.1%
CVE-2026-21895 MEDIUM PATCH This Month

The RSA crate versions prior to 0.9.10 crash when constructing private keys with invalid prime components (such as 1), allowing an attacker to trigger a denial of service by providing malformed key material. This affects applications using the vulnerable RSA library for cryptographic operations. A patch is available in version 0.9.10 and later.

Industrial Rsa Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-14025 HIGH PATCH This Week

A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. [CVSS 8.5 HIGH]

Information Disclosure Redhat
NVD
CVSS 3.1
8.5
EPSS
0.0%
CVE-2026-0719 HIGH PATCH This Week

Libsoup's NTLM authentication handler crashes when processing exceptionally long passwords due to a signed integer overflow in memory allocation calculations, affecting GNOME and applications relying on this library for network operations. An unauthenticated remote attacker can trigger a denial-of-service condition by sending specially crafted authentication requests. No patch is currently available.

Denial Of Service Redhat Suse
NVD
CVSS 3.1
8.6
EPSS
0.1%
CVE-2025-15079 MEDIUM POC PATCH This Month

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. [CVSS 5.3 MEDIUM]

Ssh Information Disclosure Curl Suse Redhat
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-14819 MEDIUM PATCH This Month

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. [CVSS 5.3 MEDIUM]

Tls Curl Suse Redhat
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-14524 MEDIUM POC PATCH This Month

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. [CVSS 5.3 MEDIUM]

Ldap Curl Suse Redhat
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-14017 MEDIUM PATCH This Month

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. [CVSS 6.3 MEDIUM]

Tls Ldap Curl Redhat Suse
NVD
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-13034 MEDIUM PATCH This Month

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. [CVSS 5.9 MEDIUM]

Authentication Bypass Curl Suse Redhat
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-0707 MEDIUM PATCH This Month

Keycloak's Authorization header parser improperly tolerates non-RFC 6750 compliant formatting, including tabs and case variations in Bearer token authentication. This lax validation could enable attackers to bypass authentication mechanisms or manipulate token validation logic in applications relying on strict Bearer token parsing. No patch is currently available for this medium-severity vulnerability.

Information Disclosure Redhat
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-21883 MEDIUM POC PATCH This Month

Bokeh versions 3.8.1 and below allow attackers to bypass Origin validation in WebSocket connections by registering domains that suffix-match allowlisted domains (e.g., dashboard.corp.attacker.com for allowlist entry dashboard.corp), enabling unauthorized server interaction. Public exploit code exists for this vulnerability, which could allow attackers to access sensitive data or modify visualizations on behalf of victims. The issue is resolved in Bokeh 3.8.2.

Python Bokeh Redhat Suse
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-21869 HIGH POC This Week

Llama.cpp server endpoints fail to validate the n_discard parameter from JSON input, allowing negative values that trigger out-of-bounds memory writes when the context buffer fills. This memory corruption vulnerability affects LLM inference operations and can be exploited remotely without authentication to crash the service or achieve code execution; public exploit code exists and no patch is currently available.

RCE Memory Corruption Denial Of Service AI / ML Llama.Cpp +2
NVD GitHub
CVSS 3.1
8.8
EPSS
0.3%
CVE-2025-69262 HIGH POC PATCH This Week

pnpm is a package manager. Versions 6.25.0 through 10.26.2 have a Command Injection vulnerability when using environment variable substitution in .npmrc configuration files with tokenHelper settings. [CVSS 7.5 HIGH]

Node.js RCE Command Injection Pnpm Redhat
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-21441 HIGH PATCH This Week

urllib3 versions 1.22 through 2.6.2 perform unnecessary decompression of redirect response bodies in the streaming API, consuming memory and processing resources before any read methods are invoked. An unauthenticated remote attacker can trigger excessive decompression of large redirect responses to cause denial of service through memory exhaustion or high CPU consumption. This vulnerability affects all Python applications using urllib3's streaming functionality with compressed HTTP redirects.

Python Urllib3 Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-69264 HIGH POC PATCH This Week

pnpm is a package manager. Versions 10.0.0 through 10.25 allow git-hosted dependencies to execute arbitrary code during pnpm install, circumventing the v10 security feature "Dependency lifecycle scripts execution disabled by default". [CVSS 8.8 HIGH]

Node.js RCE Pnpm Redhat Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-69263 HIGH POC PATCH This Week

pnpm is a package manager. Versions 10.26.2 and below store HTTP tarball dependencies (and git-hosted tarballs) in the lockfile without integrity hashes. [CVSS 7.5 HIGH]

Node.js Pnpm Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-13151 HIGH PATCH This Week

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string. [CVSS 7.5 HIGH]

Buffer Overflow Stack Overflow Libtasn1 Redhat Suse
NVD VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-22184 HIGH PATCH This Week

Local privilege escalation in zlib 1.3.1.2 and earlier allows authenticated users to achieve arbitrary code execution through a buffer overflow in the contrib/untgz utility when processing command-line arguments with excessively long archive names. The vulnerability affects only the standalone untgz demonstration tool and does not impact the core zlib library. No patch is currently available.

Buffer Overflow Memory Corruption Zlib Redhat Suse
NVD GitHub VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-0669 HIGH POC PATCH This Week

The MediaWiki CSS extension in versions 1.39, 1.43, and 1.44 contains a path traversal vulnerability that allows unauthenticated remote attackers to read arbitrary files from the server. Public exploit code exists for this vulnerability, enabling attackers to access sensitive information outside the intended directory restrictions. A patch is available and should be applied immediately to affected installations.

Mediawiki Path Traversal Css Redhat
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-0668 MEDIUM POC PATCH This Month

Visualdata versions up to - is affected by inefficient regular expression complexity (redos) (CVSS 5.3).

Mediawiki Visualdata Redhat
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-66560 MEDIUM PATCH This Month

Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. Prior to versions 3.31.0, 3.27.2, and 3.20.5, a vulnerability exists in the HTTP layer of Quarkus REST related to response handling. When a response is being written, the framework waits for previously written response chunks to be fully transmitted before proceeding. If the client connection is dropped during this waiting period, the associated worker thread is never released and becomes permanently b...

Linux Java Quarkus Redhat
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2025-71080
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT On PREEMPT_RT kernels, after rt6_get_pcpu_route() returns NULL, the current task can be preempted.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71079
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write A deadlock can occur between nfc_unregister_device() and rfkill_fop_write() due to lock ordering inversion between device_lock and rfkill_global_mutex.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71078
EPSS 0% CVSS 7.8
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: powerpc/64s/slb: Fix SLB multihit issue during SLB preload On systems using the hash MMU, there is a software SLB preload cache that mirrors the entries loaded into the hardware SLB buffer.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71077
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

CVE-2025-71077 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71076
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Limit num_syncs to prevent oversized allocations The OA open parameters did not validate num_syncs, allowing userspace to pass arbitrarily large values, potentially leading to excessive allocations.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71075
EPSS 0% CVSS 7.8
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: scsi: aic94xx: fix use-after-free in device removal path The asd_pci_remove() function fails to synchronize with pending tasklets before freeing the asd_ha structure, leading to a potential use-after-free vulnerability.

Linux Use After Free Memory Corruption +4
NVD VulDB
CVE-2025-71074
EPSS 0% CVSS 4.7
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: functionfs: fix the open/removal races ffs_epfile_open() can race with removal, ending up with file->private_data pointing to freed object.

Linux Information Disclosure Race Condition +3
NVD VulDB
CVE-2025-71073
EPSS 0% CVSS 7.8
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: Input: lkkbd - disable pending work before freeing device lkkbd_interrupt() schedules lk->tq via schedule_work(), and the work handler lkkbd_reinit() dereferences the lkkbd structure and its serio/input_dev fields.

Linux Use After Free Information Disclosure +4
NVD VulDB
CVE-2025-71072
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: shmem: fix recovery on rename failures maple_tree insertions can fail if we are seriously short on memory; simple_offset_rename() does not recover well if it runs into that. The same goes for simple_offset_rename_exchange().

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71071
EPSS 0% CVSS 7.8
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: fix use-after-free on probe deferral The driver is dropping the references taken to the larb devices during probe after successful lookup as well as on errors.

Linux Use After Free Mediatek +5
NVD VulDB
CVE-2025-71068
EPSS 0% CVSS 7.8
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: svcrdma: bound check rq_pages index in inline path svc_rdma_copy_inline_range indexed rqstp->rq_pages[rc_curpage] without verifying rc_curpage stays within the allocated page array.

Linux Information Disclosure Redhat +1
NVD
CVE-2025-68823
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: ublk: fix deadlock when reading partition table When one process(such as udev) opens ublk block device (e.g., to read the partition table via bdev_open()), a deadlock[1] can occur: 1. bdev_open() grabs disk->open_mutex 2. [CVSS 5.5 MEDIUM]

Linux Linux Kernel Redhat +1
NVD
CVE-2025-68817
EPSS 0% CVSS 7.8
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency Under high concurrency, A tree-connection object (tcon) is freed on a disconnect path while another path still holds a reference and later executes *_put()/write on it. [CVSS 7.8 HIGH]

Linux Use After Free Linux Kernel +2
NVD
CVE-2025-12548
EPSS 0% CVSS 9.0
CRITICAL PATCH Act Now

Eclipse Che che-machine-exec exposes an unauthenticated JSON-RPC/WebSocket API on port 3333 that allows remote command execution and secret exfiltration from other users' developer workspace containers.

Ssh Authentication Bypass Redhat
NVD
CVE-2026-0892
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Firefox 146 and Thunderbird 146 contain memory safety bugs with evidence of memory corruption that could potentially be exploited for code execution.

Memory Corruption Firefox Thunderbird +2
NVD
CVE-2026-0891
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Arbitrary code execution in Firefox and Thunderbird versions prior to 147/140.7 results from memory corruption vulnerabilities that could allow remote attackers to execute malicious code with no user interaction required. Multiple memory safety flaws across Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146, and Thunderbird 146 create conditions for potential exploitation despite no patch currently being available. The high CVSS score of 8.1 reflects the critical nature of achieving full system compromise through network-based attack vectors.

Memory Corruption Thunderbird Firefox +2
NVD
CVE-2026-0890
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

DOM spoofing in Mozilla Firefox and Thunderbird's copy, paste, and drag-and-drop functionality allows unauthenticated attackers to deceive users into performing unintended actions through crafted content. The vulnerability affects Firefox versions below 147 and ESR versions below 140.7, as well as Thunderbird versions below 147 and 140.7, requiring user interaction to exploit. No patch is currently available.

Mozilla Authentication Bypass Firefox +3
NVD
CVE-2026-0889
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Service Workers in Mozilla Firefox and Thunderbird versions below 147 are vulnerable to remote denial-of-service attacks that require no user interaction or authentication. An unauthenticated attacker can crash affected applications over the network, and public exploit code exists for this vulnerability. Currently no patch is available for remediation.

Mozilla Denial Of Service Firefox +3
NVD
CVE-2026-0888
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Firefox and Thunderbird versions before 147 contain an information disclosure vulnerability in their XML processing component that allows unauthenticated attackers to access sensitive data over the network with minimal attack complexity. The vulnerability requires no user interaction and affects the confidentiality of information without impacting system integrity or availability. No security patch is currently available.

Information Disclosure Thunderbird Firefox +2
NVD
CVE-2026-0887
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

The PDF Viewer component in Firefox and Thunderbird is vulnerable to clickjacking attacks that enable information disclosure through UI redressing techniques. Attackers can manipulate user interactions to trick victims into unintentionally revealing sensitive information, affecting Firefox versions below 147, Firefox ESR below 140.7, Thunderbird below 147, and Thunderbird ESR below 140.7. No patch is currently available for this vulnerability.

Information Disclosure Thunderbird Firefox +2
NVD
CVE-2026-0886
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Improper boundary validation in the Graphics component of Firefox, Firefox ESR, and Thunderbird allows unauthenticated remote attackers to cause limited information disclosure over the network without user interaction. Affected versions include Firefox before 147, Firefox ESR before 115.32 and 140.7, and Thunderbird before 147 and 140.7. No patch is currently available for this medium-severity vulnerability.

Industrial Thunderbird Firefox +2
NVD
CVE-2026-0885
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Memory corruption in Firefox and Thunderbird's JavaScript garbage collection engine allows remote attackers to crash the application or potentially leak sensitive information without user interaction. The vulnerability affects Firefox versions below 147, Firefox ESR below 140.7, Thunderbird below 147, and Thunderbird ESR below 140.7, with no patch currently available.

Use After Free Thunderbird Firefox +2
NVD
CVE-2026-0884
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Firefox JavaScript engine has a use-after-free vulnerability. Affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147 and < 140.7.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-0883
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

The Networking component in Firefox and Thunderbird discloses sensitive information to unauthenticated remote attackers over the network. Affected versions include Firefox below 147, Firefox ESR below 140.7, Thunderbird below 147, and Thunderbird ESR below 140.7. No patch is currently available to remediate this vulnerability.

Information Disclosure Thunderbird Firefox +2
NVD
CVE-2026-0882
EPSS 0% CVSS 8.8
HIGH PATCH This Week

A use-after-free vulnerability in the IPC component of Firefox (versions below 147 and ESR versions below 115.32/140.7) and Thunderbird (versions below 147 and 140.7) enables remote code execution when users interact with malicious content. The flaw requires user interaction and network access, allowing attackers to achieve full system compromise with high integrity and confidentiality impact. No patch is currently available for this vulnerability.

Use After Free Thunderbird Firefox +2
NVD
CVE-2026-0881
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Firefox Messaging System component has a sandbox escape vulnerability. Maximum CVSS 10.0 with scope change. Affects Firefox < 147 and Thunderbird < 147.

Authentication Bypass Firefox Thunderbird +2
NVD
CVE-2026-0880
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Integer overflow in Firefox and Thunderbird's Graphics component enables sandbox escape, allowing remote attackers to execute arbitrary code with high privileges through a malicious webpage or content requiring user interaction. Affected versions include Firefox below 147, Firefox ESR below 115.32 and 140.7, and Thunderbird below 147 and 140.7. No patch is currently available.

Industrial Integer Overflow Thunderbird +3
NVD
CVE-2026-0879
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Firefox sandbox escape via incorrect boundary conditions in the Graphics component. Affects Firefox < 147, Firefox ESR < 115.32 and < 140.7, Thunderbird < 147 and < 140.7.

Industrial Thunderbird Firefox +2
NVD
CVE-2026-0878
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Incorrect boundary condition validation in Firefox and Thunderbird's WebGL graphics component allows attackers to escape the sandbox and potentially execute arbitrary code through a crafted web page or malicious content. The vulnerability affects Firefox versions below 147, Firefox ESR below 140.7, Thunderbird below 147, and Thunderbird ESR below 140.7, and requires user interaction to exploit. No patch is currently available.

Mozilla Code Injection Firefox +3
NVD
CVE-2026-0877
EPSS 0% CVSS 8.1
HIGH PATCH This Week

DOM security bypass in Firefox and Thunderbird allows remote attackers to circumvent protective mitigations through user interaction, affecting multiple versions across both products. An attacker can exploit this to achieve high-impact compromise of confidentiality and integrity without requiring authentication. Currently no patch is available for affected users.

Mozilla Authentication Bypass Thunderbird +3
NVD
CVE-2026-22801
EPSS 0% CVSS 6.8
MEDIUM PATCH This Month

Libpng versions 1.6.26 through 1.6.53 contain an integer truncation flaw in the simplified write API functions that triggers a heap buffer over-read when processing images with negative row strides or strides exceeding 65535 bytes. Local attackers can exploit this to read sensitive heap memory, potentially disclosing application data. No patch is currently available; users should avoid processing untrusted PNG images with these vulnerable libpng versions.

Buffer Overflow Libpng Redhat +1
NVD GitHub VulDB
CVE-2026-22695
EPSS 0% CVSS 6.1
MEDIUM POC PATCH This Month

Libpng versions 1.6.51-1.6.53 contain a heap buffer over-read in the simplified API function png_image_finish_read when processing interlaced 16-bit PNG images with 8-bit output and non-minimal row stride, allowing local attackers to read out-of-bounds memory through a malicious image file. Public exploit code exists for this regression, which was introduced by a previous security fix. Upgrade to version 1.6.54 to remediate.

Buffer Overflow Libpng Redhat +1
NVD GitHub VulDB
CVE-2025-15514
EPSS 0% CVSS 7.5
HIGH POC This Week

Ollama 0.11.5-rc0 through current version 0.13.5 contain a null pointer dereference vulnerability in the multi-modal model image processing functionality. [CVSS 7.5 HIGH]

Null Pointer Dereference Denial Of Service AI / ML +3
NVD GitHub
CVE-2024-58340
EPSS 0% CVSS 7.5
HIGH POC This Week

LangChain versions up to and including 0.3.1 contain a regular expression denial-of-service (ReDoS) vulnerability in the MRKLOutputParser.parse() method (libs/langchain/langchain/agents/mrkl/output_parser.py). [CVSS 7.5 HIGH]

Denial Of Service AI / ML Langchain +1
NVD GitHub
CVE-2026-22772
EPSS 0% CVSS 5.8
MEDIUM POC PATCH This Month

Fulcio versions prior to 1.8.5 allow unauthenticated attackers to bypass MetaIssuer URL validation through unanchored regex patterns, enabling blind SSRF attacks against internal services. Although the vulnerability is limited to read-only GET requests with no response exfiltration, attackers can probe internal networks to discover active services and infrastructure. Public exploit code exists for this medium-severity issue, and a patch is available in version 1.8.5.

SSRF Fulcio Redhat +1
NVD GitHub
CVE-2026-22776
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

cpp-httplib versions prior to 0.30.1 are vulnerable to denial of service attacks due to insufficient validation of decompressed HTTP request body sizes. An unauthenticated remote attacker can send a malicious gzip or brotli-compressed request that decompresses to an arbitrarily large payload in memory, exhausting server resources. Public exploit code exists for this vulnerability, and a patch is available in version 0.30.1 and later.

Denial Of Service Cpp Httplib Redhat +1
NVD GitHub
CVE-2026-22771
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Credential theft via Lua script execution in Envoy Gateway versions before 1.5.7 and 1.6.2 allows authenticated attackers to extract proxy credentials and subsequently access the control plane and all associated secrets including TLS private keys. Public exploit code exists for this vulnerability. Affected organizations running vulnerable Envoy Gateway instances should immediately upgrade as no patch is currently available for intermediate versions.

Kubernetes Tls Gateway +2
NVD GitHub
CVE-2025-68471
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending 2 unsolicited announcements with CNAME resource records 2 seconds apart. [CVSS 6.5 MEDIUM]

Denial Of Service Avahi Redhat +1
NVD GitHub
CVE-2025-68468
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to resource records with short TTLs. [CVSS 6.5 MEDIUM]

Denial Of Service Avahi Redhat +1
NVD GitHub
CVE-2025-68276
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. [CVSS 5.5 MEDIUM]

Denial Of Service Avahi Redhat +1
NVD GitHub
CVE-2025-68493
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Struts versions up to 2.2.1 is affected by improper restriction of xml external entity reference (CVSS 8.1).

Apache Struts Redhat
NVD HeroDevs VulDB
CVE-2026-0822
EPSS 0% CVSS 6.3
MEDIUM POC PATCH This Month

Heap-based buffer overflow in QuickJS up to version 0.11.0 within the js_typed_array_sort function allows remote attackers to corrupt memory and potentially achieve code execution with minimal user interaction. Public exploit code exists for this vulnerability. Users should apply the available patch (commit 53eefbcd695165a3bd8c584813b472cb4a69fbf5) to remediate the risk.

Buffer Overflow Heap Overflow Quickjs +1
NVD GitHub VulDB
CVE-2026-0821
EPSS 0% CVSS 7.3
HIGH POC PATCH This Week

Heap-based buffer overflow in QuickJS up to version 0.11.0 within the js_typed_array_constructor function allows unauthenticated remote attackers to corrupt memory and potentially execute arbitrary code. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. Affected users should apply patch c5d80831e51e48a83eab16ea867be87f091783c5 immediately.

Buffer Overflow Heap Overflow Quickjs +1
NVD GitHub VulDB
CVE-2026-22773
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Vllm versions up to 0.12.0 is affected by allocation of resources without limits or throttling (CVSS 6.5).

Denial Of Service AI / ML Vllm +1
NVD GitHub
CVE-2026-22703
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

Cosign's bundle verification mechanism fails to properly validate that embedded Rekor entries reference the correct artifact digest, signature, and public key, allowing an attacker with a compromised signing identity to forge valid bundles and bypass transparency log verification. A malicious actor could exploit this to create counterfeit signatures that pass validation checks, affecting users relying on Cosign for container and binary code signing verification. Public exploit code exists for this vulnerability; patches are available in versions 2.6.2 and 3.0.4.

Authentication Bypass Cosign Redhat +1
NVD GitHub
CVE-2026-22702
EPSS 0% CVSS 4.5
MEDIUM PATCH This Month

Virtualenv versions up to 20.36.1 is affected by improper link resolution before file access (CVSS 4.5).

Python Race Condition Virtualenv +2
NVD GitHub
CVE-2026-22701
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Python's filelock SoftFileLock implementation prior to version 3.20.3 contains a TOCTOU race condition that allows local attackers with symlink creation privileges to interfere with lock file operations between permission validation and file creation. An attacker can exploit this window to create a symlink at the target lock path, causing lock operations to fail or redirect to unintended files, resulting in denial of service or unexpected behavior. Upgrade to filelock version 3.20.3 or later to remediate this vulnerability.

Python Denial Of Service Race Condition +3
NVD GitHub
CVE-2026-22693
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

HarfBuzz text shaping engine versions prior to 12.3.0 crash when the SubtableUnicodesCache::create function attempts to dereference a null pointer returned by failed memory allocation, enabling denial of service in applications processing untrusted font data. Public exploit code exists for this vulnerability. A patch is available in version 12.3.0 and later.

Null Pointer Dereference Harfbuzz Redhat +1
NVD GitHub
CVE-2026-22691
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

pypdf versions prior to 6.6.0 are vulnerable to denial of service through CPU exhaustion when processing malformed PDF files with crafted startxref entries in non-strict reading mode. An attacker can create a specially crafted PDF containing excessive whitespace that causes the library to consume significant processing resources during cross-reference table reconstruction. A patch is available in version 6.6.0 and later.

Python Pypdf Redhat +1
NVD GitHub
CVE-2026-22690
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Denial of service via resource exhaustion in pypdf prior to version 6.6.0 allows remote attackers to trigger excessive processing times by submitting specially crafted PDF files with missing /Root objects and inflated /Size values. The vulnerability only affects non-strict parsing mode and causes the library to consume significant CPU resources when processing otherwise invalid documents. A patch is available in version 6.6.0 and later.

Python Pypdf Redhat +1
NVD GitHub
CVE-2026-22610
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

Angular's Template Compiler fails to properly sanitize href and xlink:href attributes on SVG script elements, enabling reflected cross-site scripting attacks against applications using affected versions (prior to 19.2.18, 20.3.16, 21.0.7, or 21.1.0-rc.0). An attacker can inject malicious scripts through specially crafted SVG elements that bypass the framework's built-in sanitization, allowing session hijacking, credential theft, or other client-side attacks when users interact with affected content. Updates are available for all affected version branches.

Angular XSS Redhat
NVD GitHub HeroDevs
CVE-2026-22030
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. [CVSS 6.5 MEDIUM]

React CSRF React Router +2
NVD GitHub
CVE-2026-22029
EPSS 0% CVSS 8.0
HIGH PATCH This Week

React Router is a router for React. In @remix-run/router version prior to 1.23.2. [CVSS 8.0 HIGH]

React Open Redirect React Router +2
NVD GitHub
CVE-2026-21884
EPSS 0% CVSS 8.2
HIGH PATCH This Week

React Router is a router for React. In @remix-run/react version prior to 2.17.3. [CVSS 8.2 HIGH]

React XSS React Router +2
NVD GitHub
CVE-2025-68470
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

React-Router versions up to 6.30.1 is affected by url redirection to untrusted site (open redirect) (CVSS 6.5).

React React Router Redhat
NVD GitHub VulDB
CVE-2025-61686
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

React Router (@react-router/node 7.0.0-7.9.3) has a path traversal in file-based session storage when using unsigned cookies. Attackers can manipulate session file paths to read or write arbitrary files on the server.

React Redhat
NVD GitHub
CVE-2025-59057
EPSS 0% CVSS 7.6
HIGH PATCH This Week

React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. [CVSS 7.6 HIGH]

React XSS React Router +1
NVD GitHub
CVE-2025-46299
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

A memory initialization issue was addressed with improved memory handling. This issue is fixed in tvOS 26.2, Safari 26.2, watchOS 26.2, visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. [CVSS 4.3 MEDIUM]

Apple Authentication Bypass Redhat +1
NVD VulDB
CVE-2025-9222
EPSS 0% CVSS 8.7
HIGH This Week

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2.2 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an authenticated user to achieve stored cross-site scripting by exploiting GitLab Flavored Markdown. [CVSS 8.7 HIGH]

Gitlab XSS Redhat
NVD
CVE-2025-13772
EPSS 0% CVSS 7.1
HIGH This Week

GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an authenticated user to access and utilize AI model settings from unauthorized namespaces by manipulating namespace identifiers in API requests. [CVSS 7.1 HIGH]

Gitlab AI / ML Redhat
NVD
CVE-2025-13761
EPSS 0% CVSS 8.0
HIGH This Week

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an unauthenticated user to execute arbitrary code in the context of an authenticated user's browser by convincing the legitimate user to visit a specially crafted webpage. [CVSS 8.0 HIGH]

Gitlab Redhat
NVD
CVE-2025-69195
EPSS 0% CVSS 7.6
HIGH PATCH This Week

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. [CVSS 7.6 HIGH]

Buffer Overflow Stack Overflow Memory Corruption +4
NVD
CVE-2025-69194
EPSS 0% CVSS 8.8
HIGH PATCH This Week

A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. [CVSS 8.8 HIGH]

Path Traversal Wget2 Redhat +1
NVD
CVE-2025-70974
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Fastjson before 1.2.48 has a well-known autoType deserialization vulnerability enabling JNDI injection and RCE. Exploited in the wild since 2023 through GodzillaWebShell. Maximum CVSS 10.0 with scope change.

Java Redhat
NVD GitHub
CVE-2025-14505
EPSS 0% CVSS 5.6
MEDIUM This Month

The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. [CVSS 5.6 MEDIUM]

Information Disclosure Redhat
NVD GitHub HeroDevs
CVE-2025-65518
EPSS 0% CVSS 7.5
HIGH This Week

Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. [CVSS 7.5 HIGH]

PHP Denial Of Service Plesk Obsidian +1
NVD GitHub
CVE-2025-68158
EPSS 0% CVSS 5.7
MEDIUM POC PATCH This Month

Authlib is a Python library which builds OAuth and OpenID Connect servers. [CVSS 5.7 MEDIUM]

Python CSRF Redhat +1
NVD GitHub VulDB
CVE-2025-50334
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component [CVSS 7.5 HIGH]

Dns Denial Of Service Dnsserver +1
NVD GitHub
CVE-2025-68151
EPSS 0% CVSS 7.5
HIGH PATCH This Week

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.0, multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limit...

Dns Denial Of Service Coredns +2
NVD GitHub
CVE-2026-22028
EPSS 0% CVSS 6.1
MEDIUM POC PATCH This Month

HTML injection in Preact and React through unsafe JSON deserialization allows remote attackers to inject arbitrary scripts when applications pass unsanitized user-controlled data as component children, with public exploit code already available. The vulnerability stems from a regression in Preact 10.26.5 that weakened protections against constructing Virtual DOM elements from malicious JSON payloads. Affected applications are vulnerable if they consume unvalidated external data without sanitization and lack additional mitigations like Content Security Policy.

React Preact Redhat +1
NVD GitHub
CVE-2026-21895
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

The RSA crate versions prior to 0.9.10 crash when constructing private keys with invalid prime components (such as 1), allowing an attacker to trigger a denial of service by providing malformed key material. This affects applications using the vulnerable RSA library for cryptographic operations. A patch is available in version 0.9.10 and later.

Industrial Rsa Redhat +1
NVD GitHub
CVE-2025-14025
EPSS 0% CVSS 8.5
HIGH PATCH This Week

A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. [CVSS 8.5 HIGH]

Information Disclosure Redhat
NVD
CVE-2026-0719
EPSS 0% CVSS 8.6
HIGH PATCH This Week

Libsoup's NTLM authentication handler crashes when processing exceptionally long passwords due to a signed integer overflow in memory allocation calculations, affecting GNOME and applications relying on this library for network operations. An unauthenticated remote attacker can trigger a denial-of-service condition by sending specially crafted authentication requests. No patch is currently available.

Denial Of Service Redhat Suse
NVD
CVE-2025-15079
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. [CVSS 5.3 MEDIUM]

Ssh Information Disclosure Curl +2
NVD
CVE-2025-14819
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. [CVSS 5.3 MEDIUM]

Tls Curl Suse +1
NVD
CVE-2025-14524
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. [CVSS 5.3 MEDIUM]

Ldap Curl Suse +1
NVD
CVE-2025-14017
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. [CVSS 6.3 MEDIUM]

Tls Ldap Curl +2
NVD
CVE-2025-13034
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. [CVSS 5.9 MEDIUM]

Authentication Bypass Curl Suse +1
NVD
CVE-2026-0707
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Keycloak's Authorization header parser improperly tolerates non-RFC 6750 compliant formatting, including tabs and case variations in Bearer token authentication. This lax validation could enable attackers to bypass authentication mechanisms or manipulate token validation logic in applications relying on strict Bearer token parsing. No patch is currently available for this medium-severity vulnerability.

Information Disclosure Redhat
NVD
CVE-2026-21883
EPSS 0% CVSS 5.4
MEDIUM POC PATCH This Month

Bokeh versions 3.8.1 and below allow attackers to bypass Origin validation in WebSocket connections by registering domains that suffix-match allowlisted domains (e.g., dashboard.corp.attacker.com for allowlist entry dashboard.corp), enabling unauthorized server interaction. Public exploit code exists for this vulnerability, which could allow attackers to access sensitive data or modify visualizations on behalf of victims. The issue is resolved in Bokeh 3.8.2.

Python Bokeh Redhat +1
NVD GitHub
CVE-2026-21869
EPSS 0% CVSS 8.8
HIGH POC This Week

Llama.cpp server endpoints fail to validate the n_discard parameter from JSON input, allowing negative values that trigger out-of-bounds memory writes when the context buffer fills. This memory corruption vulnerability affects LLM inference operations and can be exploited remotely without authentication to crash the service or achieve code execution; public exploit code exists and no patch is currently available.

RCE Memory Corruption Denial Of Service +4
NVD GitHub
CVE-2025-69262
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

pnpm is a package manager. Versions 6.25.0 through 10.26.2 have a Command Injection vulnerability when using environment variable substitution in .npmrc configuration files with tokenHelper settings. [CVSS 7.5 HIGH]

Node.js RCE Command Injection +2
NVD GitHub
CVE-2026-21441
EPSS 0% CVSS 7.5
HIGH PATCH This Week

urllib3 versions 1.22 through 2.6.2 perform unnecessary decompression of redirect response bodies in the streaming API, consuming memory and processing resources before any read methods are invoked. An unauthenticated remote attacker can trigger excessive decompression of large redirect responses to cause denial of service through memory exhaustion or high CPU consumption. This vulnerability affects all Python applications using urllib3's streaming functionality with compressed HTTP redirects.

Python Urllib3 Redhat +1
NVD GitHub
CVE-2025-69264
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

pnpm is a package manager. Versions 10.0.0 through 10.25 allow git-hosted dependencies to execute arbitrary code during pnpm install, circumventing the v10 security feature "Dependency lifecycle scripts execution disabled by default". [CVSS 8.8 HIGH]

Node.js RCE Pnpm +2
NVD GitHub
CVE-2025-69263
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

pnpm is a package manager. Versions 10.26.2 and below store HTTP tarball dependencies (and git-hosted tarballs) in the lockfile without integrity hashes. [CVSS 7.5 HIGH]

Node.js Pnpm Redhat +1
NVD GitHub
CVE-2025-13151
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string. [CVSS 7.5 HIGH]

Buffer Overflow Stack Overflow Libtasn1 +2
NVD VulDB
CVE-2026-22184
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Local privilege escalation in zlib 1.3.1.2 and earlier allows authenticated users to achieve arbitrary code execution through a buffer overflow in the contrib/untgz utility when processing command-line arguments with excessively long archive names. The vulnerability affects only the standalone untgz demonstration tool and does not impact the core zlib library. No patch is currently available.

Buffer Overflow Memory Corruption Zlib +2
NVD GitHub VulDB
CVE-2026-0669
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

The MediaWiki CSS extension in versions 1.39, 1.43, and 1.44 contains a path traversal vulnerability that allows unauthenticated remote attackers to read arbitrary files from the server. Public exploit code exists for this vulnerability, enabling attackers to access sensitive information outside the intended directory restrictions. A patch is available and should be applied immediately to affected installations.

Mediawiki Path Traversal Css +1
NVD
CVE-2026-0668
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

Visualdata versions up to - is affected by inefficient regular expression complexity (redos) (CVSS 5.3).

Mediawiki Visualdata Redhat
NVD
CVE-2025-66560
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. Prior to versions 3.31.0, 3.27.2, and 3.20.5, a vulnerability exists in the HTTP layer of Quarkus REST related to response handling. When a response is being written, the framework waits for previously written response chunks to be fully transmitted before proceeding. If the client connection is dropped during this waiting period, the associated worker thread is never released and becomes permanently b...

Linux Java Quarkus +1
NVD GitHub
Prev Page 13 of 57 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy