Redhat

5103 CVEs vendor

Monthly

CVE-2026-27799 MEDIUM PATCH This Month

Heap buffer over-read in ImageMagick and Magick.NET's DJVU image handler allows local attackers to read out-of-bounds memory through integer truncation in stride calculations. An attacker can trigger this vulnerability by supplying a malicious DJVU file, potentially leading to information disclosure or application crashes. Updates are available for ImageMagick versions 7.1.2-15, 6.9.13-40 and later.

Buffer Overflow Imagemagick Magick.Net Redhat Suse
NVD GitHub
CVSS 3.1
4.0
EPSS
0.0%
CVE-2026-27798 MEDIUM PATCH This Month

Magick.NET and ImageMagick versions before 7.1.2-15 and 6.9.13-40 are vulnerable to heap buffer over-read when processing low-resolution images with the wavelet-denoise filter, allowing local attackers to read sensitive memory. This out-of-bounds read could expose confidential information from adjacent heap memory with no possibility of code execution or denial of service. A patch is available for affected users.

Buffer Overflow Magick.Net Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
4.0
EPSS
0.0%
CVE-2026-27951 MEDIUM POC PATCH This Month

An integer overflow in FreeRDP's Stream_EnsureCapacity function prior to version 3.23.0 can trigger an endless blocking loop, causing denial of service on affected client and server implementations. This vulnerability primarily impacts 32-bit systems with sufficient physical memory and has public exploit code available. Administrators should upgrade to FreeRDP 3.23.0 or later to remediate this issue.

Integer Overflow Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-27950 HIGH PATCH This Week

FreeRDP versions prior to 3.23.0 contain an incomplete fix for a heap-use-after-free vulnerability that affects only the SDL2 code path, where freed memory pointers are not properly nulled, allowing an unauthenticated attacker to trigger a denial of service condition. Users running FreeRDP with SDL2 backends remain vulnerable despite the advisory claiming the issue was resolved. Upgrade to version 3.23.0 or later to obtain the complete fix.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27148 CRITICAL PATCH Act Now

Injection vulnerability in Storybook frontend workshop before 7.6.23 allows injecting malicious content through component stories. Patch available.

RCE XSS Storybook Redhat
NVD GitHub
CVSS 3.1
9.6
EPSS
0.2%
CVE-2026-26986 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Windows Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27015 MEDIUM POC PATCH This Month

Denial of service in FreeRDP prior to version 3.23.0 allows a malicious RDP server to crash the client application through a missing bounds check in smartcard packet handling. This vulnerability affects users who have explicitly enabled smartcard redirection, and public exploit code exists. The crash is triggered via assertion failure in builds with verbose assert checking enabled, which is the default configuration in FreeRDP 3.22.0.

Denial Of Service Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-26965 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 8.8 HIGH]

Buffer Overflow Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-26955 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 8.8 HIGH]

Buffer Overflow Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-26271 MEDIUM PATCH This Month

FreeRDP versions prior to 3.23.0 are vulnerable to a buffer overread in icon data processing that allows denial of service when clients receive crafted RDP Window Icon data from a server or network attacker. An unauthenticated remote attacker can exploit this vulnerability to crash the FreeRDP client by sending malicious icon structures during the RDP connection. A patch is available in version 3.23.0 and later.

Buffer Overflow Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25997 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_clipboard_format_equal before 3.23.0. Clipboard format comparison uses freed memory. Fifth FreeRDP UAF. PoC and patch available.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25959 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_cliprdr_provide_data clipboard handling before 3.23.0. Clipboard data exchange triggers memory corruption. PoC and patch available.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25955 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_AppUpdateWindowFromSurface before 3.23.0. Different code path from CVE-2026-25953. PoC and patch available.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25954 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Windows Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25953 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_AppUpdateWindowFromSurface before 3.23.0. Surface-to-window update triggers memory corruption. PoC and patch available.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25952 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_SetWindowMinMaxInfo before version 3.23.0. X11 client window management triggers memory corruption. PoC and patch available.

Windows Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25942 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Buffer Overflow Information Disclosure Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25941 MEDIUM POC PATCH This Month

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 4.3 MEDIUM]

Denial Of Service Information Disclosure Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
4.3
EPSS
0.1%
CVE-2026-27795 MEDIUM PATCH This Month

LangChain's RecursiveUrlLoader in @langchain/community versions prior to 1.1.18 fails to validate redirect targets, allowing authenticated attackers to bypass SSRF protections by redirecting from whitelisted URLs to internal or metadata endpoints. An attacker with user credentials can exploit this to access sensitive internal resources or cloud metadata services through automatic redirect following. Affected applications should upgrade to version 1.1.18, which disables automatic redirects and re-validates each redirect destination.

SSRF AI / ML Langchain Redhat
NVD GitHub
CVSS 3.1
4.1
EPSS
0.0%
CVE-2026-27794 MEDIUM PATCH This Month

Remote code execution in LangGraph's caching layer affects applications that explicitly enable cache backends inheriting from BaseCache with nodes opted into caching via CachePolicy. An attacker can exploit unsafe deserialization through pickle when msgpack serialization fails, allowing arbitrary code execution on affected systems. This vulnerability requires explicit cache configuration and does not affect default deployments.

Redis RCE SQLi Deserialization AI / ML +1
NVD GitHub
CVSS 3.1
6.6
EPSS
0.3%
CVE-2026-25554 MEDIUM This Month

OpenSIPS 3.1 through 3.6.3 with the auth_jwt module is vulnerable to SQL injection in the jwt_db_authorize() function when database mode is enabled, allowing unauthenticated attackers to bypass JWT authentication by injecting malicious SQL through the tag claim without prior signature verification. An attacker can exploit this to manipulate query results and impersonate arbitrary user identities. No patch is currently available for this vulnerability.

SQLi Redhat
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-27727 CRITICAL POC PATCH Act Now

JNDI injection in mchange-commons-java library allows remote code execution through crafted JNDI lookup strings. Similar to Log4Shell attack pattern. PoC and patch available.

Java Ldap Mchange Commons Java Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-27699 CRITICAL POC PATCH Act Now

Path traversal in basic-ftp Node.js FTP client library before 5.2.0 allows malicious FTP servers to write files outside the intended download directory. PoC and patch available.

Node.js Path Traversal Basic Ftp Redhat Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-3118 MEDIUM This Month

Denial of Service in Red Hat Developer Hub's Orchestrator Plugin allows authenticated users to crash the entire Backstage application through malformed GraphQL queries due to insufficient input validation. An attacker can leverage this to temporarily disable platform access for all legitimate users. No patch is currently available to address this vulnerability.

Redhat Denial Of Service Developer Hub
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-26104 MEDIUM PATCH This Month

Unprivileged users can extract LUKS encryption headers from the udisks daemon due to missing authorization checks on a privileged D-Bus method, allowing attackers to read sensitive cryptographic metadata and potentially compromise encrypted storage confidentiality. The vulnerability affects systems running vulnerable versions of udisks and requires local access to exploit. No patch is currently available.

Authentication Bypass Redhat Suse
NVD GitHub VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-26103 HIGH PATCH This Week

Improper authorization in the udisks D-Bus API allows local unprivileged users to manipulate LUKS encryption headers on block devices with root privileges, potentially destroying encryption keys and rendering volumes inaccessible. An attacker with local access can exploit this to cause permanent data loss through denial-of-service. No patch is currently available for this vulnerability.

Authentication Bypass Redhat Suse
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-11563 MEDIUM PATCH This Month

URLs containing percent-encoded slashes (`/` or `\`) can trick wcurl into saving the output file outside of the current directory without the user explicitly asking for it. This flaw only affects the wcurl command line tool. [CVSS 4.6 MEDIUM]

Path Traversal Wcurl Redhat Suse
NVD
CVSS 3.1
4.6
EPSS
0.0%
CVE-2026-27628 HIGH PATCH This Week

Pypdf versions up to 6.7.2 is affected by loop with unreachable exit condition (infinite loop) (CVSS 7.5).

Python Pypdf Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-27606 CRITICAL POC PATCH Act Now

Path traversal in Rollup JavaScript module bundler before 2.80.0/3.30.0/4.59.0 allows reading arbitrary files on the build server during bundling. PoC and patch available.

RCE Path Traversal Rollup Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.6%
CVE-2026-27572 HIGH PATCH This Week

Wasmtime's HTTP header handling in the wasmtime-wasi-http crate crashes when processing excessive header fields, allowing remote attackers to trigger denial of service against applications embedding Wasmtime. The vulnerability affects versions prior to 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0, and has been patched to return a controlled trap instead of panicking. Embedders should update immediately to mitigate this DoS vector.

Industrial Denial Of Service Wasmtime Redhat
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27204 MEDIUM PATCH This Month

Uncontrolled resource allocation in Wasmtime's WASI host interfaces allows authenticated guests to trigger denial of service on the host system by exhausting resources without proper limits. Affected versions prior to 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 require explicit configuration to mitigate this issue, though Wasmtime 42.0.0 and later provide secure defaults. No patch is currently available for older versions, and resource exhaustion protections must be manually enabled.

Denial Of Service Wasmtime Redhat
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-27195 HIGH PATCH This Week

Wasmtime versions 39.0.0 and later experience a denial-of-service panic when async WebAssembly component functions are called and then abandoned by the host before completion, such as when the Future is dropped after a single poll during an async yield. This affects applications using Wasmtime's component model with async support, allowing an attacker to crash the runtime through specially crafted async function invocations. A patch is available to address this stability issue.

Golang Industrial Wasmtime Redhat
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27571 MEDIUM PATCH This Month

NATS Server versions prior to 2.11.2 and 2.12.3 fail to properly limit memory allocation during WebSocket compression, allowing unauthenticated attackers to trigger denial of service through compression bomb attacks that exhaust server memory. The vulnerability is exploitable pre-authentication since compression negotiation occurs before credential validation. A patch is available in versions 2.11.2 and 2.12.3.

Information Disclosure Nats Server Redhat Suse
NVD GitHub
CVSS 3.1
5.9
EPSS
0.1%
CVE-2026-2807 CRITICAL PATCH Act Now

Memory safety bugs in Firefox 147 and Thunderbird 147 with evidence of memory corruption. Mainline-only bugs not present in ESR branches.

Memory Corruption Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2806 CRITICAL PATCH Act Now

Uninitialized memory read in Firefox Graphics Text component before 148. Text rendering may expose uninitialized memory contents.

Mozilla Information Disclosure Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-2805 CRITICAL PATCH Act Now

Invalid pointer in Firefox DOM Core & HTML before 148. Incorrect pointer computation leads to memory access errors.

Buffer Overflow Mozilla Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2804 MEDIUM PATCH This Month

A use-after-free vulnerability in Firefox and Thunderbird's JavaScript WebAssembly engine allows remote attackers to achieve information disclosure or data manipulation through a malicious webpage or email attachment that requires user interaction. Affected versions include Firefox below 148 and Thunderbird below 148, with no patch currently available. The vulnerability has a network attack vector with low complexity and carries a CVSS score of 5.4.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-2803 HIGH PATCH This Week

The Settings UI component in Firefox and Thunderbird versions prior to 148 fails to properly restrict access to sensitive configuration data, enabling unauthenticated attackers to remotely disclose confidential information without user interaction. This vulnerability bypasses existing security mitigations designed to protect user settings and preferences. No patch is currently available for affected users.

Information Disclosure Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-2802 MEDIUM PATCH This Month

Firefox and Thunderbird versions below 148 contain a race condition in the JavaScript garbage collection component that could allow an attacker to access or modify limited data through specially crafted content requiring user interaction. The vulnerability has a CVSS score of 4.2 and currently lacks an available patch.

Race Condition Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
4.2
EPSS
0.0%
CVE-2026-2801 HIGH PATCH This Week

Improper boundary condition handling in the JavaScript/WebAssembly engine of Firefox and Thunderbird before version 148 enables remote denial of service attacks without requiring user interaction or privileges. An attacker can crash affected applications or cause service unavailability by sending specially crafted content. No patch is currently available.

Mozilla Information Disclosure Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-2800 CRITICAL PATCH Act Now

Spoofing in Firefox for Android WebAuthn component before 148. Allows phishing attacks through WebAuthn UI manipulation.

Android Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2799 CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Core & HTML before 148. DOM object lifecycle error.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2798 HIGH PATCH This Week

A use-after-free vulnerability in Firefox and Thunderbird's DOM processing allows remote attackers to execute arbitrary code through a malicious webpage or email attachment, requiring only user interaction to trigger. This affects Firefox versions below 148 and Thunderbird versions below 148, with no patch currently available.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-2797 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript GC before 148. Second GC UAF, different from CVE-2026-2795.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2796 CRITICAL POC PATCH Act Now

JIT miscompilation in Firefox WebAssembly before 148. The JIT compiler generates incorrect Wasm code, enabling type confusion. PoC available.

Buffer Overflow Mozilla Firefox Thunderbird Redhat +1
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2795 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript GC component before 148. GC-specific UAF affecting only mainline Firefox and Thunderbird.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2794 HIGH PATCH This Week

Uninitialized memory in Firefox and Firefox Focus for Android versions prior to 148 enables remote attackers to read sensitive data without authentication or user interaction. The vulnerability allows information disclosure through memory that was not properly cleared before use, potentially exposing confidential user information to network-based attackers.

Android Information Disclosure Firefox Redhat Suse
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-2793 CRITICAL PATCH Act Now

Memory safety bugs in Firefox ESR 115.32, ESR 140.7, and Firefox 147. Broader set of memory corruption issues than CVE-2026-2792.

Memory Corruption Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2792 CRITICAL PATCH Act Now

Memory safety bugs in Firefox ESR 140.7 and Firefox 147 with evidence of memory corruption and potential code execution exploitability.

Memory Corruption Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2791 CRITICAL PATCH Act Now

Cache-based mitigation bypass in Firefox Networking before 148. Caching mechanism can be exploited to bypass security mitigations.

Mozilla Authentication Bypass Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2790 CRITICAL PATCH Act Now

Same-origin policy bypass in Firefox Networking JAR component before 148. Allows cross-origin data access through JAR protocol handling.

CSRF Mozilla Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2789 CRITICAL PATCH Act Now

Use-after-free in Firefox ImageLib graphics component before 148. Image processing triggers use of freed memory.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2788 CRITICAL PATCH Act Now

Boundary error in Firefox Audio/Video GMP (Gecko Media Plugins) component before 148. Media plugin processing triggers memory corruption.

Buffer Overflow Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2787 CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Window and Location component before 148. Window/Location lifecycle management error.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2786 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript Engine before 148. Fourth distinct JS engine UAF in this release.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2785 CRITICAL PATCH Act Now

Invalid pointer in Firefox JavaScript Engine before 148. Incorrect pointer computation leads to memory corruption.

Buffer Overflow Mozilla Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2784 CRITICAL PATCH Act Now

DOM Security mitigation bypass in Firefox before 148. Security mechanisms protecting DOM operations can be circumvented.

Mozilla Authentication Bypass Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2783 HIGH PATCH This Week

Unauthenticated attackers can extract sensitive information from Firefox and Thunderbird users through a JavaScript engine JIT compilation flaw, affecting all versions prior to Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. The vulnerability requires no user interaction and can be exploited remotely over the network. No patch is currently available for this high-severity flaw.

Information Disclosure Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-2782 CRITICAL PATCH Act Now

Privilege escalation in Firefox Netmonitor component before 148. Second Netmonitor privilege escalation, separate from CVE-2026-2780.

Privilege Escalation Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2781 CRITICAL PATCH Act Now

Integer overflow in Firefox NSS (Network Security Services) Libraries component before 148. Overflow in the cryptographic library could affect TLS and certificate operations.

Integer Overflow Mozilla Buffer Overflow Firefox Thunderbird +2
NVD VulDB
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2780 CRITICAL PATCH Act Now

Privilege escalation in Firefox Netmonitor component before 148. Developer tools component allows escalation from content to higher privileges.

Privilege Escalation Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2779 CRITICAL PATCH Act Now

Boundary error in Firefox Networking JAR component before 148. Processing JAR (Java Archive) content triggers memory corruption.

Buffer Overflow Mozilla Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2778 CRITICAL PATCH Act Now

Sandbox escape via DOM Core & HTML component in Firefox before 148. CVSS 10.0 — fifth sandbox escape in this release.

Mozilla Buffer Overflow Memory Corruption Privilege Escalation RCE +4
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-2777 CRITICAL PATCH Act Now

Privilege escalation in Firefox Messaging System component before 148. The inter-process messaging system allows escalation from content to privileged process.

Privilege Escalation Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2776 CRITICAL PATCH Act Now

Sandbox escape via Telemetry component in Firefox external software before 148. CVSS 10.0 — fourth sandbox escape in this release, through the telemetry subsystem.

Buffer Overflow Memory Corruption Privilege Escalation Firefox Thunderbird +2
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-2775 CRITICAL PATCH Act Now

HTML parser mitigation bypass in Firefox DOM before 148. Bypasses content sanitization protections via alternate authentication path in the HTML parser.

Mozilla Authentication Bypass Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2774 CRITICAL PATCH Act Now

Integer overflow in Firefox Audio/Video component before 148. Overflow in media processing leads to incorrect memory allocations.

Integer Overflow Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2773 CRITICAL PATCH Act Now

Boundary error in Firefox Web Audio component before 148. Crafted audio processing triggers memory corruption.

Buffer Overflow Mozilla Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2772 CRITICAL PATCH Act Now

Use-after-free in Firefox Audio/Video Playback component before 148. Media playback triggers memory corruption.

Use After Free Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2771 CRITICAL PATCH Act Now

Undefined behavior in Firefox DOM Core & HTML component before 148. Can lead to memory corruption and potential code execution.

Buffer Overflow Mozilla Information Disclosure Thunderbird Firefox +2
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2770 CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Bindings (WebIDL) component before 148. Memory corruption in the interface between JavaScript and native DOM objects.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2769 HIGH PATCH This Week

A use-after-free vulnerability in the IndexedDB storage component of Firefox and Thunderbird allows remote attackers to achieve arbitrary code execution through user interaction. Affected versions include Firefox below 148, Firefox ESR below 115.33 and 140.8, and Thunderbird below 148 and 140.8. No patch is currently available for this high-severity flaw.

Use After Free Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-2768 CRITICAL PATCH Act Now

Sandbox escape via IndexedDB in Firefox before 148 and Thunderbird. CVSS 10.0 — the Storage: IndexedDB component allows escaping the content process sandbox.

Authentication Bypass Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-2767 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript WebAssembly component before 148. WebAssembly-specific memory management bug.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2766 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript JIT compiler before 148. Second JIT-related UAF in this release, different from CVE-2026-2764.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2765 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript Engine before 148 and Thunderbird ESR 140.8. Separate UAF from CVE-2026-2763 and CVE-2026-2758.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2764 CRITICAL PATCH Act Now

JIT miscompilation causing use-after-free in Firefox JavaScript JIT compiler before 148. JIT bugs are highly exploitable due to their deterministic nature.

Use After Free Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2763 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript Engine before 148. One of multiple JS engine UAFs fixed in this release.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2762 CRITICAL PATCH Act Now

Integer overflow in Firefox JavaScript Standard Library before 148 leads to memory corruption through crafted JavaScript operations.

Integer Overflow Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2761 CRITICAL PATCH Act Now

Second sandbox escape in Firefox WebRender component. CVSS 10.0 — independent path from CVE-2026-2760 to escape the content process sandbox.

Information Disclosure Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-2760 CRITICAL PATCH Act Now

Sandbox escape via boundary violation in Firefox WebRender graphics component. CVSS 10.0 — allows escaping the content sandbox to execute code with elevated privileges.

Information Disclosure Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-2759 CRITICAL PATCH Act Now

Boundary violation in Firefox ImageLib graphics component before 148 enables memory corruption through crafted images.

Mozilla Information Disclosure Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2758 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript garbage collector before 148 allows remote code execution through crafted JavaScript.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2757 CRITICAL PATCH Act Now

Boundary violation in Firefox WebRTC Audio/Video component before 148 allows remote code execution through crafted WebRTC media streams.

Mozilla Information Disclosure Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-26983 MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to denial of service through a use-after-free flaw in the MSL interpreter when processing malformed map elements. An unauthenticated attacker can trigger a crash by crafting a specially formatted image file, disrupting service availability. No patch is currently available, leaving affected systems vulnerable.

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-26981 MEDIUM POC PATCH GHSA This Month

OpenEXR versions 3.3.0-3.3.6 and 3.4.0-3.4.4 are vulnerable to a heap buffer overflow in file parsing due to improper integer handling when processing malformed EXR files, allowing attackers to trigger a denial of service through memory-mapped streams. Public exploit code exists for this vulnerability. Patched versions 3.3.7 and 3.4.5 are available.

Buffer Overflow Openexr Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-26331 HIGH POC PATCH This Week

yt-dlp is a command-line audio/video downloader. [CVSS 8.8 HIGH]

Python Command Injection Yt Dlp Redhat Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.7%
CVE-2026-26284 MEDIUM PATCH This Month

Medium severity vulnerability in ImageMagick. The pcd coder lacks proper boundary checking when processing Huffman-coded data. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read.

Buffer Overflow Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-26283 MEDIUM PATCH This Month

Imagemagick versions up to 7.1.2-15 is affected by loop with unreachable exit condition (infinite loop) (CVSS 6.2).

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-26066 MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to denial of service when processing maliciously crafted image profiles containing invalid IPTC data, which triggers an infinite loop during IPTCTEXT writing operations. An attacker can exploit this by supplying a specially crafted image file to cause the application to hang or consume excessive resources. No patch is currently available for affected systems.

Denial Of Service Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-27799
EPSS 0% CVSS 4.0
MEDIUM PATCH This Month

Heap buffer over-read in ImageMagick and Magick.NET's DJVU image handler allows local attackers to read out-of-bounds memory through integer truncation in stride calculations. An attacker can trigger this vulnerability by supplying a malicious DJVU file, potentially leading to information disclosure or application crashes. Updates are available for ImageMagick versions 7.1.2-15, 6.9.13-40 and later.

Buffer Overflow Imagemagick Magick.Net +2
NVD GitHub
CVE-2026-27798
EPSS 0% CVSS 4.0
MEDIUM PATCH This Month

Magick.NET and ImageMagick versions before 7.1.2-15 and 6.9.13-40 are vulnerable to heap buffer over-read when processing low-resolution images with the wavelet-denoise filter, allowing local attackers to read sensitive memory. This out-of-bounds read could expose confidential information from adjacent heap memory with no possibility of code execution or denial of service. A patch is available for affected users.

Buffer Overflow Magick.Net Imagemagick +2
NVD GitHub
CVE-2026-27951
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

An integer overflow in FreeRDP's Stream_EnsureCapacity function prior to version 3.23.0 can trigger an endless blocking loop, causing denial of service on affected client and server implementations. This vulnerability primarily impacts 32-bit systems with sufficient physical memory and has public exploit code available. Administrators should upgrade to FreeRDP 3.23.0 or later to remediate this issue.

Integer Overflow Freerdp Redhat +1
NVD GitHub
CVE-2026-27950
EPSS 0% CVSS 7.5
HIGH PATCH This Week

FreeRDP versions prior to 3.23.0 contain an incomplete fix for a heap-use-after-free vulnerability that affects only the SDL2 code path, where freed memory pointers are not properly nulled, allowing an unauthenticated attacker to trigger a denial of service condition. Users running FreeRDP with SDL2 backends remain vulnerable despite the advisory claiming the issue was resolved. Upgrade to version 3.23.0 or later to obtain the complete fix.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-27148
EPSS 0% CVSS 9.6
CRITICAL PATCH Act Now

Injection vulnerability in Storybook frontend workshop before 7.6.23 allows injecting malicious content through component stories. Patch available.

RCE XSS Storybook +1
NVD GitHub
CVE-2026-26986
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Windows Freerdp Redhat +1
NVD GitHub
CVE-2026-27015
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Denial of service in FreeRDP prior to version 3.23.0 allows a malicious RDP server to crash the client application through a missing bounds check in smartcard packet handling. This vulnerability affects users who have explicitly enabled smartcard redirection, and public exploit code exists. The crash is triggered via assertion failure in builds with verbose assert checking enabled, which is the default configuration in FreeRDP 3.22.0.

Denial Of Service Freerdp Redhat +1
NVD GitHub
CVE-2026-26965
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 8.8 HIGH]

Buffer Overflow Freerdp Redhat +1
NVD GitHub
CVE-2026-26955
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 8.8 HIGH]

Buffer Overflow Freerdp Redhat +1
NVD GitHub
CVE-2026-26271
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

FreeRDP versions prior to 3.23.0 are vulnerable to a buffer overread in icon data processing that allows denial of service when clients receive crafted RDP Window Icon data from a server or network attacker. An unauthenticated remote attacker can exploit this vulnerability to crash the FreeRDP client by sending malicious icon structures during the RDP connection. A patch is available in version 3.23.0 and later.

Buffer Overflow Freerdp Redhat +1
NVD GitHub
CVE-2026-25997
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_clipboard_format_equal before 3.23.0. Clipboard format comparison uses freed memory. Fifth FreeRDP UAF. PoC and patch available.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-25959
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_cliprdr_provide_data clipboard handling before 3.23.0. Clipboard data exchange triggers memory corruption. PoC and patch available.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-25955
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_AppUpdateWindowFromSurface before 3.23.0. Different code path from CVE-2026-25953. PoC and patch available.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-25954
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Windows Freerdp Redhat +1
NVD GitHub
CVE-2026-25953
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_AppUpdateWindowFromSurface before 3.23.0. Surface-to-window update triggers memory corruption. PoC and patch available.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-25952
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_SetWindowMinMaxInfo before version 3.23.0. X11 client window management triggers memory corruption. PoC and patch available.

Windows Freerdp Redhat +1
NVD GitHub
CVE-2026-25942
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Buffer Overflow Information Disclosure Freerdp +2
NVD GitHub
CVE-2026-25941
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 4.3 MEDIUM]

Denial Of Service Information Disclosure Freerdp +2
NVD GitHub
CVE-2026-27795
EPSS 0% CVSS 4.1
MEDIUM PATCH This Month

LangChain's RecursiveUrlLoader in @langchain/community versions prior to 1.1.18 fails to validate redirect targets, allowing authenticated attackers to bypass SSRF protections by redirecting from whitelisted URLs to internal or metadata endpoints. An attacker with user credentials can exploit this to access sensitive internal resources or cloud metadata services through automatic redirect following. Affected applications should upgrade to version 1.1.18, which disables automatic redirects and re-validates each redirect destination.

SSRF AI / ML Langchain +1
NVD GitHub
CVE-2026-27794
EPSS 0% CVSS 6.6
MEDIUM PATCH This Month

Remote code execution in LangGraph's caching layer affects applications that explicitly enable cache backends inheriting from BaseCache with nodes opted into caching via CachePolicy. An attacker can exploit unsafe deserialization through pickle when msgpack serialization fails, allowing arbitrary code execution on affected systems. This vulnerability requires explicit cache configuration and does not affect default deployments.

Redis RCE SQLi +3
NVD GitHub
CVE-2026-25554
EPSS 0% CVSS 6.5
MEDIUM This Month

OpenSIPS 3.1 through 3.6.3 with the auth_jwt module is vulnerable to SQL injection in the jwt_db_authorize() function when database mode is enabled, allowing unauthenticated attackers to bypass JWT authentication by injecting malicious SQL through the tag claim without prior signature verification. An attacker can exploit this to manipulate query results and impersonate arbitrary user identities. No patch is currently available for this vulnerability.

SQLi Redhat
NVD GitHub
CVE-2026-27727
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

JNDI injection in mchange-commons-java library allows remote code execution through crafted JNDI lookup strings. Similar to Log4Shell attack pattern. PoC and patch available.

Java Ldap Mchange Commons Java +2
NVD GitHub
CVE-2026-27699
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Path traversal in basic-ftp Node.js FTP client library before 5.2.0 allows malicious FTP servers to write files outside the intended download directory. PoC and patch available.

Node.js Path Traversal Basic Ftp +2
NVD GitHub
CVE-2026-3118
EPSS 0% CVSS 6.5
MEDIUM This Month

Denial of Service in Red Hat Developer Hub's Orchestrator Plugin allows authenticated users to crash the entire Backstage application through malformed GraphQL queries due to insufficient input validation. An attacker can leverage this to temporarily disable platform access for all legitimate users. No patch is currently available to address this vulnerability.

Redhat Denial Of Service Developer Hub
NVD
CVE-2026-26104
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Unprivileged users can extract LUKS encryption headers from the udisks daemon due to missing authorization checks on a privileged D-Bus method, allowing attackers to read sensitive cryptographic metadata and potentially compromise encrypted storage confidentiality. The vulnerability affects systems running vulnerable versions of udisks and requires local access to exploit. No patch is currently available.

Authentication Bypass Redhat Suse
NVD GitHub VulDB
CVE-2026-26103
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Improper authorization in the udisks D-Bus API allows local unprivileged users to manipulate LUKS encryption headers on block devices with root privileges, potentially destroying encryption keys and rendering volumes inaccessible. An attacker with local access can exploit this to cause permanent data loss through denial-of-service. No patch is currently available for this vulnerability.

Authentication Bypass Redhat Suse
NVD GitHub VulDB
CVE-2025-11563
EPSS 0% CVSS 4.6
MEDIUM PATCH This Month

URLs containing percent-encoded slashes (`/` or `\`) can trick wcurl into saving the output file outside of the current directory without the user explicitly asking for it. This flaw only affects the wcurl command line tool. [CVSS 4.6 MEDIUM]

Path Traversal Wcurl Redhat +1
NVD
CVE-2026-27628
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Pypdf versions up to 6.7.2 is affected by loop with unreachable exit condition (infinite loop) (CVSS 7.5).

Python Pypdf Redhat +1
NVD GitHub
CVE-2026-27606
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

Path traversal in Rollup JavaScript module bundler before 2.80.0/3.30.0/4.59.0 allows reading arbitrary files on the build server during bundling. PoC and patch available.

RCE Path Traversal Rollup +2
NVD GitHub
CVE-2026-27572
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Wasmtime's HTTP header handling in the wasmtime-wasi-http crate crashes when processing excessive header fields, allowing remote attackers to trigger denial of service against applications embedding Wasmtime. The vulnerability affects versions prior to 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0, and has been patched to return a controlled trap instead of panicking. Embedders should update immediately to mitigate this DoS vector.

Industrial Denial Of Service Wasmtime +1
NVD GitHub
CVE-2026-27204
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Uncontrolled resource allocation in Wasmtime's WASI host interfaces allows authenticated guests to trigger denial of service on the host system by exhausting resources without proper limits. Affected versions prior to 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 require explicit configuration to mitigate this issue, though Wasmtime 42.0.0 and later provide secure defaults. No patch is currently available for older versions, and resource exhaustion protections must be manually enabled.

Denial Of Service Wasmtime Redhat
NVD GitHub
CVE-2026-27195
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Wasmtime versions 39.0.0 and later experience a denial-of-service panic when async WebAssembly component functions are called and then abandoned by the host before completion, such as when the Future is dropped after a single poll during an async yield. This affects applications using Wasmtime's component model with async support, allowing an attacker to crash the runtime through specially crafted async function invocations. A patch is available to address this stability issue.

Golang Industrial Wasmtime +1
NVD GitHub
CVE-2026-27571
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

NATS Server versions prior to 2.11.2 and 2.12.3 fail to properly limit memory allocation during WebSocket compression, allowing unauthenticated attackers to trigger denial of service through compression bomb attacks that exhaust server memory. The vulnerability is exploitable pre-authentication since compression negotiation occurs before credential validation. A patch is available in versions 2.11.2 and 2.12.3.

Information Disclosure Nats Server Redhat +1
NVD GitHub
CVE-2026-2807
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Memory safety bugs in Firefox 147 and Thunderbird 147 with evidence of memory corruption. Mainline-only bugs not present in ESR branches.

Memory Corruption Firefox Thunderbird +2
NVD
CVE-2026-2806
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

Uninitialized memory read in Firefox Graphics Text component before 148. Text rendering may expose uninitialized memory contents.

Mozilla Information Disclosure Firefox +3
NVD
CVE-2026-2805
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Invalid pointer in Firefox DOM Core & HTML before 148. Incorrect pointer computation leads to memory access errors.

Buffer Overflow Mozilla Thunderbird +3
NVD
CVE-2026-2804
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

A use-after-free vulnerability in Firefox and Thunderbird's JavaScript WebAssembly engine allows remote attackers to achieve information disclosure or data manipulation through a malicious webpage or email attachment that requires user interaction. Affected versions include Firefox below 148 and Thunderbird below 148, with no patch currently available. The vulnerability has a network attack vector with low complexity and carries a CVSS score of 5.4.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2803
EPSS 0% CVSS 7.5
HIGH PATCH This Week

The Settings UI component in Firefox and Thunderbird versions prior to 148 fails to properly restrict access to sensitive configuration data, enabling unauthenticated attackers to remotely disclose confidential information without user interaction. This vulnerability bypasses existing security mitigations designed to protect user settings and preferences. No patch is currently available for affected users.

Information Disclosure Firefox Thunderbird +2
NVD
CVE-2026-2802
EPSS 0% CVSS 4.2
MEDIUM PATCH This Month

Firefox and Thunderbird versions below 148 contain a race condition in the JavaScript garbage collection component that could allow an attacker to access or modify limited data through specially crafted content requiring user interaction. The vulnerability has a CVSS score of 4.2 and currently lacks an available patch.

Race Condition Firefox Thunderbird +2
NVD
CVE-2026-2801
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Improper boundary condition handling in the JavaScript/WebAssembly engine of Firefox and Thunderbird before version 148 enables remote denial of service attacks without requiring user interaction or privileges. An attacker can crash affected applications or cause service unavailability by sending specially crafted content. No patch is currently available.

Mozilla Information Disclosure Thunderbird +3
NVD
CVE-2026-2800
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Spoofing in Firefox for Android WebAuthn component before 148. Allows phishing attacks through WebAuthn UI manipulation.

Android Firefox Thunderbird +2
NVD
CVE-2026-2799
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Core & HTML before 148. DOM object lifecycle error.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2798
EPSS 0% CVSS 8.8
HIGH PATCH This Week

A use-after-free vulnerability in Firefox and Thunderbird's DOM processing allows remote attackers to execute arbitrary code through a malicious webpage or email attachment, requiring only user interaction to trigger. This affects Firefox versions below 148 and Thunderbird versions below 148, with no patch currently available.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2797
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript GC before 148. Second GC UAF, different from CVE-2026-2795.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2796
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

JIT miscompilation in Firefox WebAssembly before 148. The JIT compiler generates incorrect Wasm code, enabling type confusion. PoC available.

Buffer Overflow Mozilla Firefox +3
NVD GitHub
CVE-2026-2795
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript GC component before 148. GC-specific UAF affecting only mainline Firefox and Thunderbird.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2794
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Uninitialized memory in Firefox and Firefox Focus for Android versions prior to 148 enables remote attackers to read sensitive data without authentication or user interaction. The vulnerability allows information disclosure through memory that was not properly cleared before use, potentially exposing confidential user information to network-based attackers.

Android Information Disclosure Firefox +2
NVD
CVE-2026-2793
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Memory safety bugs in Firefox ESR 115.32, ESR 140.7, and Firefox 147. Broader set of memory corruption issues than CVE-2026-2792.

Memory Corruption Firefox Thunderbird +2
NVD
CVE-2026-2792
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Memory safety bugs in Firefox ESR 140.7 and Firefox 147 with evidence of memory corruption and potential code execution exploitability.

Memory Corruption Thunderbird Firefox +2
NVD
CVE-2026-2791
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Cache-based mitigation bypass in Firefox Networking before 148. Caching mechanism can be exploited to bypass security mitigations.

Mozilla Authentication Bypass Thunderbird +3
NVD
CVE-2026-2790
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Same-origin policy bypass in Firefox Networking JAR component before 148. Allows cross-origin data access through JAR protocol handling.

CSRF Mozilla Firefox +3
NVD
CVE-2026-2789
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox ImageLib graphics component before 148. Image processing triggers use of freed memory.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2788
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Boundary error in Firefox Audio/Video GMP (Gecko Media Plugins) component before 148. Media plugin processing triggers memory corruption.

Buffer Overflow Firefox Thunderbird +2
NVD
CVE-2026-2787
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Window and Location component before 148. Window/Location lifecycle management error.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2786
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript Engine before 148. Fourth distinct JS engine UAF in this release.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2785
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Invalid pointer in Firefox JavaScript Engine before 148. Incorrect pointer computation leads to memory corruption.

Buffer Overflow Mozilla Thunderbird +3
NVD
CVE-2026-2784
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

DOM Security mitigation bypass in Firefox before 148. Security mechanisms protecting DOM operations can be circumvented.

Mozilla Authentication Bypass Thunderbird +3
NVD
CVE-2026-2783
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Unauthenticated attackers can extract sensitive information from Firefox and Thunderbird users through a JavaScript engine JIT compilation flaw, affecting all versions prior to Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. The vulnerability requires no user interaction and can be exploited remotely over the network. No patch is currently available for this high-severity flaw.

Information Disclosure Thunderbird Firefox +2
NVD
CVE-2026-2782
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Privilege escalation in Firefox Netmonitor component before 148. Second Netmonitor privilege escalation, separate from CVE-2026-2780.

Privilege Escalation Thunderbird Firefox +2
NVD
CVE-2026-2781
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Integer overflow in Firefox NSS (Network Security Services) Libraries component before 148. Overflow in the cryptographic library could affect TLS and certificate operations.

Integer Overflow Mozilla Buffer Overflow +4
NVD VulDB
CVE-2026-2780
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Privilege escalation in Firefox Netmonitor component before 148. Developer tools component allows escalation from content to higher privileges.

Privilege Escalation Firefox Thunderbird +2
NVD
CVE-2026-2779
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Boundary error in Firefox Networking JAR component before 148. Processing JAR (Java Archive) content triggers memory corruption.

Buffer Overflow Mozilla Firefox +3
NVD
CVE-2026-2778
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Sandbox escape via DOM Core & HTML component in Firefox before 148. CVSS 10.0 — fifth sandbox escape in this release.

Mozilla Buffer Overflow Memory Corruption +6
NVD
CVE-2026-2777
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Privilege escalation in Firefox Messaging System component before 148. The inter-process messaging system allows escalation from content to privileged process.

Privilege Escalation Firefox Thunderbird +2
NVD
CVE-2026-2776
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Sandbox escape via Telemetry component in Firefox external software before 148. CVSS 10.0 — fourth sandbox escape in this release, through the telemetry subsystem.

Buffer Overflow Memory Corruption Privilege Escalation +4
NVD
CVE-2026-2775
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

HTML parser mitigation bypass in Firefox DOM before 148. Bypasses content sanitization protections via alternate authentication path in the HTML parser.

Mozilla Authentication Bypass Firefox +3
NVD
CVE-2026-2774
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Integer overflow in Firefox Audio/Video component before 148. Overflow in media processing leads to incorrect memory allocations.

Integer Overflow Thunderbird Firefox +2
NVD
CVE-2026-2773
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Boundary error in Firefox Web Audio component before 148. Crafted audio processing triggers memory corruption.

Buffer Overflow Mozilla Thunderbird +3
NVD
CVE-2026-2772
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox Audio/Video Playback component before 148. Media playback triggers memory corruption.

Use After Free Thunderbird Firefox +2
NVD
CVE-2026-2771
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Undefined behavior in Firefox DOM Core & HTML component before 148. Can lead to memory corruption and potential code execution.

Buffer Overflow Mozilla Information Disclosure +4
NVD
CVE-2026-2770
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Bindings (WebIDL) component before 148. Memory corruption in the interface between JavaScript and native DOM objects.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2769
EPSS 0% CVSS 8.8
HIGH PATCH This Week

A use-after-free vulnerability in the IndexedDB storage component of Firefox and Thunderbird allows remote attackers to achieve arbitrary code execution through user interaction. Affected versions include Firefox below 148, Firefox ESR below 115.33 and 140.8, and Thunderbird below 148 and 140.8. No patch is currently available for this high-severity flaw.

Use After Free Thunderbird Firefox +2
NVD
CVE-2026-2768
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Sandbox escape via IndexedDB in Firefox before 148 and Thunderbird. CVSS 10.0 — the Storage: IndexedDB component allows escaping the content process sandbox.

Authentication Bypass Thunderbird Firefox +2
NVD
CVE-2026-2767
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript WebAssembly component before 148. WebAssembly-specific memory management bug.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2766
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript JIT compiler before 148. Second JIT-related UAF in this release, different from CVE-2026-2764.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2765
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript Engine before 148 and Thunderbird ESR 140.8. Separate UAF from CVE-2026-2763 and CVE-2026-2758.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2764
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

JIT miscompilation causing use-after-free in Firefox JavaScript JIT compiler before 148. JIT bugs are highly exploitable due to their deterministic nature.

Use After Free Thunderbird Firefox +2
NVD
CVE-2026-2763
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript Engine before 148. One of multiple JS engine UAFs fixed in this release.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2762
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Integer overflow in Firefox JavaScript Standard Library before 148 leads to memory corruption through crafted JavaScript operations.

Integer Overflow Thunderbird Firefox +2
NVD
CVE-2026-2761
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Second sandbox escape in Firefox WebRender component. CVSS 10.0 — independent path from CVE-2026-2760 to escape the content process sandbox.

Information Disclosure Thunderbird Firefox +2
NVD
CVE-2026-2760
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Sandbox escape via boundary violation in Firefox WebRender graphics component. CVSS 10.0 — allows escaping the content sandbox to execute code with elevated privileges.

Information Disclosure Firefox Thunderbird +2
NVD
CVE-2026-2759
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Boundary violation in Firefox ImageLib graphics component before 148 enables memory corruption through crafted images.

Mozilla Information Disclosure Thunderbird +3
NVD
CVE-2026-2758
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript garbage collector before 148 allows remote code execution through crafted JavaScript.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2757
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Boundary violation in Firefox WebRTC Audio/Video component before 148 allows remote code execution through crafted WebRTC media streams.

Mozilla Information Disclosure Firefox +3
NVD
CVE-2026-26983
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to denial of service through a use-after-free flaw in the MSL interpreter when processing malformed map elements. An unauthenticated attacker can trigger a crash by crafting a specially formatted image file, disrupting service availability. No patch is currently available, leaving affected systems vulnerable.

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-26981
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEXR versions 3.3.0-3.3.6 and 3.4.0-3.4.4 are vulnerable to a heap buffer overflow in file parsing due to improper integer handling when processing malformed EXR files, allowing attackers to trigger a denial of service through memory-mapped streams. Public exploit code exists for this vulnerability. Patched versions 3.3.7 and 3.4.5 are available.

Buffer Overflow Openexr Redhat +1
NVD GitHub
CVE-2026-26331
EPSS 1% CVSS 8.8
HIGH POC PATCH This Week

yt-dlp is a command-line audio/video downloader. [CVSS 8.8 HIGH]

Python Command Injection Yt Dlp +2
NVD GitHub
CVE-2026-26284
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Medium severity vulnerability in ImageMagick. The pcd coder lacks proper boundary checking when processing Huffman-coded data. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read.

Buffer Overflow Imagemagick Redhat +1
NVD GitHub
CVE-2026-26283
EPSS 0% CVSS 6.2
MEDIUM PATCH This Month

Imagemagick versions up to 7.1.2-15 is affected by loop with unreachable exit condition (infinite loop) (CVSS 6.2).

Denial Of Service Imagemagick Redhat +1
NVD GitHub
CVE-2026-26066
EPSS 0% CVSS 6.2
MEDIUM PATCH This Month

ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 are vulnerable to denial of service when processing maliciously crafted image profiles containing invalid IPTC data, which triggers an infinite loop during IPTCTEXT writing operations. An attacker can exploit this by supplying a specially crafted image file to cause the application to hang or consume excessive resources. No patch is currently available for affected systems.

Denial Of Service Imagemagick Redhat +1
NVD GitHub
Prev Page 4 of 57 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy