Suse

5711 CVEs vendor

Monthly

CVE-2026-27808 MEDIUM POC PATCH This Month

Mailpit versions prior to 1.29.2 contain a Server-Side Request Forgery vulnerability in the Link Check API that allows unauthenticated remote attackers to perform HTTP requests to arbitrary hosts, including internal and private IP addresses. The API fails to validate or filter target URLs and returns status codes for each link, enabling non-blind SSRF attacks. Public exploit code exists for this vulnerability, affecting deployments with default configuration.

SSRF Mailpit Suse
NVD GitHub
CVSS 3.1
5.8
EPSS
0.1%
CVE-2026-27799 MEDIUM PATCH This Month

Heap buffer over-read in ImageMagick and Magick.NET's DJVU image handler allows local attackers to read out-of-bounds memory through integer truncation in stride calculations. An attacker can trigger this vulnerability by supplying a malicious DJVU file, potentially leading to information disclosure or application crashes. Updates are available for ImageMagick versions 7.1.2-15, 6.9.13-40 and later.

Buffer Overflow Imagemagick Magick.Net Redhat Suse
NVD GitHub
CVSS 3.1
4.0
EPSS
0.0%
CVE-2026-27798 MEDIUM PATCH This Month

Magick.NET and ImageMagick versions before 7.1.2-15 and 6.9.13-40 are vulnerable to heap buffer over-read when processing low-resolution images with the wavelet-denoise filter, allowing local attackers to read sensitive memory. This out-of-bounds read could expose confidential information from adjacent heap memory with no possibility of code execution or denial of service. A patch is available for affected users.

Buffer Overflow Magick.Net Imagemagick Redhat Suse
NVD GitHub
CVSS 3.1
4.0
EPSS
0.0%
CVE-2026-26186 HIGH PATCH This Week

SQL injection in Fleet device management software before version 4.80.1 allows authenticated users to manipulate the order_key parameter and inject arbitrary SQL commands through improper identifier handling in ORDER BY clauses. An attacker with valid credentials can exploit this vulnerability to perform blind SQL injection attacks, potentially extracting sensitive database information or causing denial of service through resource exhaustion. No patch is currently available for this high-severity vulnerability affecting MySQL implementations.

MySQL SQLi Denial Of Service Fleet Suse
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-27951 MEDIUM POC PATCH This Month

An integer overflow in FreeRDP's Stream_EnsureCapacity function prior to version 3.23.0 can trigger an endless blocking loop, causing denial of service on affected client and server implementations. This vulnerability primarily impacts 32-bit systems with sufficient physical memory and has public exploit code available. Administrators should upgrade to FreeRDP 3.23.0 or later to remediate this issue.

Integer Overflow Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-27950 HIGH PATCH This Week

FreeRDP versions prior to 3.23.0 contain an incomplete fix for a heap-use-after-free vulnerability that affects only the SDL2 code path, where freed memory pointers are not properly nulled, allowing an unauthenticated attacker to trigger a denial of service condition. Users running FreeRDP with SDL2 backends remain vulnerable despite the advisory claiming the issue was resolved. Upgrade to version 3.23.0 or later to obtain the complete fix.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27819 HIGH POC This Week

Vikunja before version 2.0.0 contains a path traversal vulnerability in its backup restoration function that fails to validate file paths in ZIP archives, allowing attackers with high privileges to write arbitrary files to the host system. Public exploit code exists for this vulnerability, and malformed archives can trigger a denial of service that permanently wipes the database before crashing the application. The flaw affects Vikunja and the underlying Go platform, with no patch currently available.

Golang Denial Of Service Vikunja Suse
NVD GitHub
CVSS 3.1
7.2
EPSS
0.1%
CVE-2026-27616 HIGH POC This Week

Stored cross-site scripting (XSS) in Vikunja prior to version 2.0.0 allows authenticated attackers to steal authentication tokens by uploading malicious SVG files containing JavaScript that executes when accessed directly. The vulnerability exists because the application fails to sanitize SVG content before storage and renders it inline under the application origin, enabling token theft from localStorage. Public exploit code exists for this vulnerability and no patch is currently available for affected versions.

File Upload XSS Vikunja Suse
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-27575 CRITICAL POC Act Now

Weak password policy in Vikunja task management before 2.0.0 allows users to set trivially guessable passwords. PoC available.

Information Disclosure Vikunja Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-27116 MEDIUM POC This Month

Vikunja is an open-source self-hosted task management platform. [CVSS 6.1 MEDIUM]

XSS Vikunja Suse
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-26986 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Windows Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27015 MEDIUM POC PATCH This Month

Denial of service in FreeRDP prior to version 3.23.0 allows a malicious RDP server to crash the client application through a missing bounds check in smartcard packet handling. This vulnerability affects users who have explicitly enabled smartcard redirection, and public exploit code exists. The crash is triggered via assertion failure in builds with verbose assert checking enabled, which is the default configuration in FreeRDP 3.22.0.

Denial Of Service Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-26965 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 8.8 HIGH]

Buffer Overflow Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-26955 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 8.8 HIGH]

Buffer Overflow Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-26271 MEDIUM PATCH This Month

FreeRDP versions prior to 3.23.0 are vulnerable to a buffer overread in icon data processing that allows denial of service when clients receive crafted RDP Window Icon data from a server or network attacker. An unauthenticated remote attacker can exploit this vulnerability to crash the FreeRDP client by sending malicious icon structures during the RDP connection. A patch is available in version 3.23.0 and later.

Buffer Overflow Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25997 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_clipboard_format_equal before 3.23.0. Clipboard format comparison uses freed memory. Fifth FreeRDP UAF. PoC and patch available.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25959 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_cliprdr_provide_data clipboard handling before 3.23.0. Clipboard data exchange triggers memory corruption. PoC and patch available.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25955 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_AppUpdateWindowFromSurface before 3.23.0. Different code path from CVE-2026-25953. PoC and patch available.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25954 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Windows Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25953 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_AppUpdateWindowFromSurface before 3.23.0. Surface-to-window update triggers memory corruption. PoC and patch available.

Use After Free Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25952 CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_SetWindowMinMaxInfo before version 3.23.0. X11 client window management triggers memory corruption. PoC and patch available.

Windows Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25942 HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Buffer Overflow Information Disclosure Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25941 MEDIUM POC PATCH This Month

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 4.3 MEDIUM]

Denial Of Service Information Disclosure Freerdp Redhat Suse
NVD GitHub
CVSS 3.1
4.3
EPSS
0.1%
CVE-2026-27727 CRITICAL POC PATCH Act Now

JNDI injection in mchange-commons-java library allows remote code execution through crafted JNDI lookup strings. Similar to Log4Shell attack pattern. PoC and patch available.

Java Ldap Mchange Commons Java Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-27730 HIGH POC PATCH This Week

esm.sh versions up to 137 contain an SSRF vulnerability in the `/http(s)` fetch route that allows remote attackers to bypass hostname validation through DNS alias domains and access internal localhost services. Public exploit code exists for this vulnerability, and no patches are currently available. This affects users of esm.sh CDN services and any applications relying on the affected versions.

Dns SSRF Esm.Sh Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-50180 HIGH POC PATCH This Week

esm.sh is a no-build content delivery network (CDN) for web development. In version 136, esm.sh is vulnerable to a full-response SSRF, allowing an attacker to retrieve information from internal websites through the vulnerability. [CVSS 7.5 HIGH]

SSRF Esm.Sh Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-27699 CRITICAL POC PATCH Act Now

Path traversal in basic-ftp Node.js FTP client library before 5.2.0 allows malicious FTP servers to write files outside the intended download directory. PoC and patch available.

Node.js Path Traversal Basic Ftp Redhat Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-26104 MEDIUM PATCH This Month

Unprivileged users can extract LUKS encryption headers from the udisks daemon due to missing authorization checks on a privileged D-Bus method, allowing attackers to read sensitive cryptographic metadata and potentially compromise encrypted storage confidentiality. The vulnerability affects systems running vulnerable versions of udisks and requires local access to exploit. No patch is currently available.

Authentication Bypass Redhat Suse
NVD GitHub VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-26103 HIGH PATCH This Week

Improper authorization in the udisks D-Bus API allows local unprivileged users to manipulate LUKS encryption headers on block devices with root privileges, potentially destroying encryption keys and rendering volumes inaccessible. An attacker with local access can exploit this to cause permanent data loss through denial-of-service. No patch is currently available for this vulnerability.

Authentication Bypass Redhat Suse
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-67601 HIGH PATCH This Week

A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the -cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts. [CVSS 8.3 HIGH]

Authentication Bypass Rancher Suse
NVD GitHub
CVSS 3.1
8.3
EPSS
0.0%
CVE-2025-62878 CRITICAL PATCH Act Now

Path traversal in Kubernetes PersistentVolume creation via pathPattern parameter allows creating volumes in arbitrary host filesystem locations. CVSS 9.9 with scope change.

Information Disclosure Suse
NVD GitHub
CVSS 3.1
9.9
EPSS
0.0%
CVE-2025-11563 MEDIUM PATCH This Month

URLs containing percent-encoded slashes (`/` or `\`) can trick wcurl into saving the output file outside of the current directory without the user explicitly asking for it. This flaw only affects the wcurl command line tool. [CVSS 4.6 MEDIUM]

Path Traversal Wcurl Redhat Suse
NVD
CVSS 3.1
4.6
EPSS
0.0%
CVE-2026-27624 HIGH POC PATCH This Week

Coturn TURN/STUN server contains an access control bypass that allows remote attackers to reach blocked internal addresses by exploiting IPv4-mapped IPv6 address handling in permission and channel binding requests. The vulnerability bypasses "denied-peer-ip" restrictions designed to block loopback ranges, enabling an attacker to interact with internal services that should be unreachable. Public exploit code exists for this flaw, and a patch is available in version 4.9.0 and later.

Authentication Bypass Coturn Suse
NVD GitHub
CVSS 3.1
7.2
EPSS
0.0%
CVE-2026-27628 HIGH PATCH This Week

Pypdf versions up to 6.7.2 is affected by loop with unreachable exit condition (infinite loop) (CVSS 7.5).

Python Pypdf Redhat Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-27626 CRITICAL POC PATCH Act Now

OS command injection in OliveTin web shell interface through version 3000.10.0. OliveTin provides web-based access to predefined shell commands — the injection allows executing arbitrary commands beyond the whitelist. PoC available.

RCE Command Injection Olivetin Suse
NVD GitHub
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-27611 MEDIUM POC PATCH This Month

FileBrowser Quantum versions prior to 1.1.3-stable and 1.2.6-beta expose a password bypass vulnerability in shared files, allowing unauthenticated recipients to download protected content by accessing the direct download link embedded in share details. An attacker possessing only the share link can retrieve files without providing the intended password, completely circumventing access controls. Public exploit code exists for this vulnerability, and patches are available in the patched versions.

Information Disclosure Filebrowser Quantum Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27606 CRITICAL POC PATCH Act Now

Path traversal in Rollup JavaScript module bundler before 2.80.0/3.30.0/4.59.0 allows reading arbitrary files on the build server during bundling. PoC and patch available.

RCE Path Traversal Rollup Redhat Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.6%
CVE-2026-27598 MEDIUM POC PATCH This Month

Arbitrary file write in Dagu workflow engine up to version 1.16.7 allows authenticated users with DAG write permissions to place malicious YAML files anywhere on the filesystem due to insufficient name validation in the CreateNewDAG API endpoint. Since Dagu executes DAG files as shell commands, an attacker can achieve remote code execution by overwriting existing DAGs or configuration files. Public exploit code exists for this vulnerability, and a patch is available.

RCE Dagu Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25899 HIGH POC PATCH This Week

Unbounded memory allocation in Fiber v3 (prior to 3.1.0) allows unauthenticated remote attackers to trigger denial of service by sending a malicious fiber_flash cookie that forces deserialization of up to 85GB of memory. All v3 endpoints are vulnerable regardless of flash message usage, and public exploit code exists. No patch is currently available.

Deserialization Fiber Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25891 HIGH POC PATCH This Week

Fiber web framework versions 3.0.0 and earlier on Windows contain a path traversal vulnerability that allows remote attackers to bypass static file middleware protections and read arbitrary files from the server. Public exploit code exists for this vulnerability, which affects applications using the vulnerable Fiber versions. The issue has been patched in Fiber v3.1.0.

Windows Path Traversal Fiber Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25882 HIGH POC PATCH This Week

Fiber web framework versions 2 and 3 are vulnerable to denial of service attacks when processing requests to routes containing more than 30 parameters, enabling remote attackers to crash affected applications without authentication. The vulnerability stems from insufficient validation during route registration and unbounded array writes in request matching logic. Public exploit code exists for this high-severity flaw, though patches are available in Fiber v2.52.12 and v3.1.0.

Denial Of Service Fiber Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27590 CRITICAL POC PATCH Act Now

FastCGI path splitting vulnerability in Caddy before 2.11.1 allows request smuggling or path confusion when proxying to FastCGI backends (PHP-FPM). EPSS 0.19% with PoC available.

PHP Tls RCE Caddy Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.2%
CVE-2026-27589 MEDIUM POC PATCH This Month

Caddy versions prior to 2.11.1 allow unauthenticated cross-origin requests to the admin API when origin enforcement is disabled, enabling attackers to remotely reconfigure the server through malicious web content loaded in a victim's browser. Public exploit code exists for this vulnerability, which can be leveraged to modify HTTP server behavior and admin listener settings without user knowledge. The vulnerability affects Caddy and TLS implementations, with no patch currently available for affected versions.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27588 CRITICAL POC PATCH Act Now

Host header case sensitivity bypass in Caddy before 2.11.1. Virtual host routing can be bypassed by using alternate casing in the Host header. PoC available.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-27587 CRITICAL POC PATCH Act Now

Case sensitivity bypass in Caddy web server path matching before 2.11.1. HTTP path matchers can be bypassed using alternate casing on case-insensitive filesystems. PoC available.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-27586 CRITICAL POC PATCH Act Now

TLS error swallowing in Caddy web server before 2.11.1 allows bypassing client certificate authentication. Errors in ClientCAs handling are silenced, potentially accepting invalid client certificates. PoC available.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-27585 MEDIUM POC PATCH This Month

Caddy versions prior to 2.11.1 fail to sanitize backslashes in file path matching, allowing attackers to bypass path-based security controls through specially crafted requests. The vulnerability affects systems with specific Caddy configurations and has public exploit code available. Exploitation requires network access with no authentication, resulting in limited information disclosure or modification of restricted resources.

Tls Caddy Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-27571 MEDIUM PATCH This Month

NATS Server versions prior to 2.11.2 and 2.12.3 fail to properly limit memory allocation during WebSocket compression, allowing unauthenticated attackers to trigger denial of service through compression bomb attacks that exhaust server memory. The vulnerability is exploitable pre-authentication since compression negotiation occurs before credential validation. A patch is available in versions 2.11.2 and 2.12.3.

Information Disclosure Nats Server Redhat Suse
NVD GitHub
CVSS 3.1
5.9
EPSS
0.1%
CVE-2026-2807 CRITICAL PATCH Act Now

Memory safety bugs in Firefox 147 and Thunderbird 147 with evidence of memory corruption. Mainline-only bugs not present in ESR branches.

Memory Corruption Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2806 CRITICAL PATCH Act Now

Uninitialized memory read in Firefox Graphics Text component before 148. Text rendering may expose uninitialized memory contents.

Mozilla Information Disclosure Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-2805 CRITICAL PATCH Act Now

Invalid pointer in Firefox DOM Core & HTML before 148. Incorrect pointer computation leads to memory access errors.

Buffer Overflow Mozilla Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2804 MEDIUM PATCH This Month

A use-after-free vulnerability in Firefox and Thunderbird's JavaScript WebAssembly engine allows remote attackers to achieve information disclosure or data manipulation through a malicious webpage or email attachment that requires user interaction. Affected versions include Firefox below 148 and Thunderbird below 148, with no patch currently available. The vulnerability has a network attack vector with low complexity and carries a CVSS score of 5.4.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-2803 HIGH PATCH This Week

The Settings UI component in Firefox and Thunderbird versions prior to 148 fails to properly restrict access to sensitive configuration data, enabling unauthenticated attackers to remotely disclose confidential information without user interaction. This vulnerability bypasses existing security mitigations designed to protect user settings and preferences. No patch is currently available for affected users.

Information Disclosure Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-2802 MEDIUM PATCH This Month

Firefox and Thunderbird versions below 148 contain a race condition in the JavaScript garbage collection component that could allow an attacker to access or modify limited data through specially crafted content requiring user interaction. The vulnerability has a CVSS score of 4.2 and currently lacks an available patch.

Race Condition Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
4.2
EPSS
0.0%
CVE-2026-2801 HIGH PATCH This Week

Improper boundary condition handling in the JavaScript/WebAssembly engine of Firefox and Thunderbird before version 148 enables remote denial of service attacks without requiring user interaction or privileges. An attacker can crash affected applications or cause service unavailability by sending specially crafted content. No patch is currently available.

Mozilla Information Disclosure Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-2800 CRITICAL PATCH Act Now

Spoofing in Firefox for Android WebAuthn component before 148. Allows phishing attacks through WebAuthn UI manipulation.

Android Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2799 CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Core & HTML before 148. DOM object lifecycle error.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2798 HIGH PATCH This Week

A use-after-free vulnerability in Firefox and Thunderbird's DOM processing allows remote attackers to execute arbitrary code through a malicious webpage or email attachment, requiring only user interaction to trigger. This affects Firefox versions below 148 and Thunderbird versions below 148, with no patch currently available.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-2797 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript GC before 148. Second GC UAF, different from CVE-2026-2795.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2796 CRITICAL POC PATCH Act Now

JIT miscompilation in Firefox WebAssembly before 148. The JIT compiler generates incorrect Wasm code, enabling type confusion. PoC available.

Buffer Overflow Mozilla Firefox Thunderbird Redhat +1
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2795 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript GC component before 148. GC-specific UAF affecting only mainline Firefox and Thunderbird.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2794 HIGH PATCH This Week

Uninitialized memory in Firefox and Firefox Focus for Android versions prior to 148 enables remote attackers to read sensitive data without authentication or user interaction. The vulnerability allows information disclosure through memory that was not properly cleared before use, potentially exposing confidential user information to network-based attackers.

Android Information Disclosure Firefox Redhat Suse
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-2793 CRITICAL PATCH Act Now

Memory safety bugs in Firefox ESR 115.32, ESR 140.7, and Firefox 147. Broader set of memory corruption issues than CVE-2026-2792.

Memory Corruption Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2792 CRITICAL PATCH Act Now

Memory safety bugs in Firefox ESR 140.7 and Firefox 147 with evidence of memory corruption and potential code execution exploitability.

Memory Corruption Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2791 CRITICAL PATCH Act Now

Cache-based mitigation bypass in Firefox Networking before 148. Caching mechanism can be exploited to bypass security mitigations.

Mozilla Authentication Bypass Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2790 CRITICAL PATCH Act Now

Same-origin policy bypass in Firefox Networking JAR component before 148. Allows cross-origin data access through JAR protocol handling.

CSRF Mozilla Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2789 CRITICAL PATCH Act Now

Use-after-free in Firefox ImageLib graphics component before 148. Image processing triggers use of freed memory.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2788 CRITICAL PATCH Act Now

Boundary error in Firefox Audio/Video GMP (Gecko Media Plugins) component before 148. Media plugin processing triggers memory corruption.

Buffer Overflow Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2787 CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Window and Location component before 148. Window/Location lifecycle management error.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2786 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript Engine before 148. Fourth distinct JS engine UAF in this release.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2785 CRITICAL PATCH Act Now

Invalid pointer in Firefox JavaScript Engine before 148. Incorrect pointer computation leads to memory corruption.

Buffer Overflow Mozilla Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2784 CRITICAL PATCH Act Now

DOM Security mitigation bypass in Firefox before 148. Security mechanisms protecting DOM operations can be circumvented.

Mozilla Authentication Bypass Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2783 HIGH PATCH This Week

Unauthenticated attackers can extract sensitive information from Firefox and Thunderbird users through a JavaScript engine JIT compilation flaw, affecting all versions prior to Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. The vulnerability requires no user interaction and can be exploited remotely over the network. No patch is currently available for this high-severity flaw.

Information Disclosure Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-2782 CRITICAL PATCH Act Now

Privilege escalation in Firefox Netmonitor component before 148. Second Netmonitor privilege escalation, separate from CVE-2026-2780.

Privilege Escalation Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2781 CRITICAL PATCH Act Now

Integer overflow in Firefox NSS (Network Security Services) Libraries component before 148. Overflow in the cryptographic library could affect TLS and certificate operations.

Integer Overflow Mozilla Buffer Overflow Firefox Thunderbird +2
NVD VulDB
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2780 CRITICAL PATCH Act Now

Privilege escalation in Firefox Netmonitor component before 148. Developer tools component allows escalation from content to higher privileges.

Privilege Escalation Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2779 CRITICAL PATCH Act Now

Boundary error in Firefox Networking JAR component before 148. Processing JAR (Java Archive) content triggers memory corruption.

Buffer Overflow Mozilla Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2778 CRITICAL PATCH Act Now

Sandbox escape via DOM Core & HTML component in Firefox before 148. CVSS 10.0 — fifth sandbox escape in this release.

Mozilla Buffer Overflow Memory Corruption Privilege Escalation RCE +4
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-2777 CRITICAL PATCH Act Now

Privilege escalation in Firefox Messaging System component before 148. The inter-process messaging system allows escalation from content to privileged process.

Privilege Escalation Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2776 CRITICAL PATCH Act Now

Sandbox escape via Telemetry component in Firefox external software before 148. CVSS 10.0 — fourth sandbox escape in this release, through the telemetry subsystem.

Buffer Overflow Memory Corruption Privilege Escalation Firefox Thunderbird +2
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-2775 CRITICAL PATCH Act Now

HTML parser mitigation bypass in Firefox DOM before 148. Bypasses content sanitization protections via alternate authentication path in the HTML parser.

Mozilla Authentication Bypass Firefox Thunderbird Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2774 CRITICAL PATCH Act Now

Integer overflow in Firefox Audio/Video component before 148. Overflow in media processing leads to incorrect memory allocations.

Integer Overflow Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2773 CRITICAL PATCH Act Now

Boundary error in Firefox Web Audio component before 148. Crafted audio processing triggers memory corruption.

Buffer Overflow Mozilla Thunderbird Firefox Redhat +1
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2772 CRITICAL PATCH Act Now

Use-after-free in Firefox Audio/Video Playback component before 148. Media playback triggers memory corruption.

Use After Free Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2771 CRITICAL PATCH Act Now

Undefined behavior in Firefox DOM Core & HTML component before 148. Can lead to memory corruption and potential code execution.

Buffer Overflow Mozilla Information Disclosure Thunderbird Firefox +2
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2770 CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Bindings (WebIDL) component before 148. Memory corruption in the interface between JavaScript and native DOM objects.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2769 HIGH PATCH This Week

A use-after-free vulnerability in the IndexedDB storage component of Firefox and Thunderbird allows remote attackers to achieve arbitrary code execution through user interaction. Affected versions include Firefox below 148, Firefox ESR below 115.33 and 140.8, and Thunderbird below 148 and 140.8. No patch is currently available for this high-severity flaw.

Use After Free Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-2768 CRITICAL PATCH Act Now

Sandbox escape via IndexedDB in Firefox before 148 and Thunderbird. CVSS 10.0 — the Storage: IndexedDB component allows escaping the content process sandbox.

Authentication Bypass Thunderbird Firefox Redhat Suse
NVD
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-2767 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript WebAssembly component before 148. WebAssembly-specific memory management bug.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-2766 CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript JIT compiler before 148. Second JIT-related UAF in this release, different from CVE-2026-2764.

Use After Free Firefox Thunderbird Redhat Suse
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-27808
EPSS 0% CVSS 5.8
MEDIUM POC PATCH This Month

Mailpit versions prior to 1.29.2 contain a Server-Side Request Forgery vulnerability in the Link Check API that allows unauthenticated remote attackers to perform HTTP requests to arbitrary hosts, including internal and private IP addresses. The API fails to validate or filter target URLs and returns status codes for each link, enabling non-blind SSRF attacks. Public exploit code exists for this vulnerability, affecting deployments with default configuration.

SSRF Mailpit Suse
NVD GitHub
CVE-2026-27799
EPSS 0% CVSS 4.0
MEDIUM PATCH This Month

Heap buffer over-read in ImageMagick and Magick.NET's DJVU image handler allows local attackers to read out-of-bounds memory through integer truncation in stride calculations. An attacker can trigger this vulnerability by supplying a malicious DJVU file, potentially leading to information disclosure or application crashes. Updates are available for ImageMagick versions 7.1.2-15, 6.9.13-40 and later.

Buffer Overflow Imagemagick Magick.Net +2
NVD GitHub
CVE-2026-27798
EPSS 0% CVSS 4.0
MEDIUM PATCH This Month

Magick.NET and ImageMagick versions before 7.1.2-15 and 6.9.13-40 are vulnerable to heap buffer over-read when processing low-resolution images with the wavelet-denoise filter, allowing local attackers to read sensitive memory. This out-of-bounds read could expose confidential information from adjacent heap memory with no possibility of code execution or denial of service. A patch is available for affected users.

Buffer Overflow Magick.Net Imagemagick +2
NVD GitHub
CVE-2026-26186
EPSS 0% CVSS 8.8
HIGH PATCH This Week

SQL injection in Fleet device management software before version 4.80.1 allows authenticated users to manipulate the order_key parameter and inject arbitrary SQL commands through improper identifier handling in ORDER BY clauses. An attacker with valid credentials can exploit this vulnerability to perform blind SQL injection attacks, potentially extracting sensitive database information or causing denial of service through resource exhaustion. No patch is currently available for this high-severity vulnerability affecting MySQL implementations.

MySQL SQLi Denial Of Service +2
NVD GitHub VulDB
CVE-2026-27951
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

An integer overflow in FreeRDP's Stream_EnsureCapacity function prior to version 3.23.0 can trigger an endless blocking loop, causing denial of service on affected client and server implementations. This vulnerability primarily impacts 32-bit systems with sufficient physical memory and has public exploit code available. Administrators should upgrade to FreeRDP 3.23.0 or later to remediate this issue.

Integer Overflow Freerdp Redhat +1
NVD GitHub
CVE-2026-27950
EPSS 0% CVSS 7.5
HIGH PATCH This Week

FreeRDP versions prior to 3.23.0 contain an incomplete fix for a heap-use-after-free vulnerability that affects only the SDL2 code path, where freed memory pointers are not properly nulled, allowing an unauthenticated attacker to trigger a denial of service condition. Users running FreeRDP with SDL2 backends remain vulnerable despite the advisory claiming the issue was resolved. Upgrade to version 3.23.0 or later to obtain the complete fix.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-27819
EPSS 0% CVSS 7.2
HIGH POC This Week

Vikunja before version 2.0.0 contains a path traversal vulnerability in its backup restoration function that fails to validate file paths in ZIP archives, allowing attackers with high privileges to write arbitrary files to the host system. Public exploit code exists for this vulnerability, and malformed archives can trigger a denial of service that permanently wipes the database before crashing the application. The flaw affects Vikunja and the underlying Go platform, with no patch currently available.

Golang Denial Of Service Vikunja +1
NVD GitHub
CVE-2026-27616
EPSS 0% CVSS 7.3
HIGH POC This Week

Stored cross-site scripting (XSS) in Vikunja prior to version 2.0.0 allows authenticated attackers to steal authentication tokens by uploading malicious SVG files containing JavaScript that executes when accessed directly. The vulnerability exists because the application fails to sanitize SVG content before storage and renders it inline under the application origin, enabling token theft from localStorage. Public exploit code exists for this vulnerability and no patch is currently available for affected versions.

File Upload XSS Vikunja +1
NVD GitHub
CVE-2026-27575
EPSS 0% CVSS 9.1
CRITICAL POC Act Now

Weak password policy in Vikunja task management before 2.0.0 allows users to set trivially guessable passwords. PoC available.

Information Disclosure Vikunja Suse
NVD GitHub
CVE-2026-27116
EPSS 0% CVSS 6.1
MEDIUM POC This Month

Vikunja is an open-source self-hosted task management platform. [CVSS 6.1 MEDIUM]

XSS Vikunja Suse
NVD GitHub
CVE-2026-26986
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Windows Freerdp Redhat +1
NVD GitHub
CVE-2026-27015
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Denial of service in FreeRDP prior to version 3.23.0 allows a malicious RDP server to crash the client application through a missing bounds check in smartcard packet handling. This vulnerability affects users who have explicitly enabled smartcard redirection, and public exploit code exists. The crash is triggered via assertion failure in builds with verbose assert checking enabled, which is the default configuration in FreeRDP 3.22.0.

Denial Of Service Freerdp Redhat +1
NVD GitHub
CVE-2026-26965
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 8.8 HIGH]

Buffer Overflow Freerdp Redhat +1
NVD GitHub
CVE-2026-26955
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 8.8 HIGH]

Buffer Overflow Freerdp Redhat +1
NVD GitHub
CVE-2026-26271
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

FreeRDP versions prior to 3.23.0 are vulnerable to a buffer overread in icon data processing that allows denial of service when clients receive crafted RDP Window Icon data from a server or network attacker. An unauthenticated remote attacker can exploit this vulnerability to crash the FreeRDP client by sending malicious icon structures during the RDP connection. A patch is available in version 3.23.0 and later.

Buffer Overflow Freerdp Redhat +1
NVD GitHub
CVE-2026-25997
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_clipboard_format_equal before 3.23.0. Clipboard format comparison uses freed memory. Fifth FreeRDP UAF. PoC and patch available.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-25959
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_cliprdr_provide_data clipboard handling before 3.23.0. Clipboard data exchange triggers memory corruption. PoC and patch available.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-25955
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_AppUpdateWindowFromSurface before 3.23.0. Different code path from CVE-2026-25953. PoC and patch available.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-25954
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Windows Freerdp Redhat +1
NVD GitHub
CVE-2026-25953
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_AppUpdateWindowFromSurface before 3.23.0. Surface-to-window update triggers memory corruption. PoC and patch available.

Use After Free Freerdp Redhat +1
NVD GitHub
CVE-2026-25952
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Use-after-free in FreeRDP xf_SetWindowMinMaxInfo before version 3.23.0. X11 client window management triggers memory corruption. PoC and patch available.

Windows Freerdp Redhat +1
NVD GitHub
CVE-2026-25942
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 7.5 HIGH]

Buffer Overflow Information Disclosure Freerdp +2
NVD GitHub
CVE-2026-25941
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

FreeRDP is a free implementation of the Remote Desktop Protocol. [CVSS 4.3 MEDIUM]

Denial Of Service Information Disclosure Freerdp +2
NVD GitHub
CVE-2026-27727
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

JNDI injection in mchange-commons-java library allows remote code execution through crafted JNDI lookup strings. Similar to Log4Shell attack pattern. PoC and patch available.

Java Ldap Mchange Commons Java +2
NVD GitHub
CVE-2026-27730
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

esm.sh versions up to 137 contain an SSRF vulnerability in the `/http(s)` fetch route that allows remote attackers to bypass hostname validation through DNS alias domains and access internal localhost services. Public exploit code exists for this vulnerability, and no patches are currently available. This affects users of esm.sh CDN services and any applications relying on the affected versions.

Dns SSRF Esm.Sh +1
NVD GitHub
CVE-2025-50180
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

esm.sh is a no-build content delivery network (CDN) for web development. In version 136, esm.sh is vulnerable to a full-response SSRF, allowing an attacker to retrieve information from internal websites through the vulnerability. [CVSS 7.5 HIGH]

SSRF Esm.Sh Suse
NVD GitHub
CVE-2026-27699
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Path traversal in basic-ftp Node.js FTP client library before 5.2.0 allows malicious FTP servers to write files outside the intended download directory. PoC and patch available.

Node.js Path Traversal Basic Ftp +2
NVD GitHub
CVE-2026-26104
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Unprivileged users can extract LUKS encryption headers from the udisks daemon due to missing authorization checks on a privileged D-Bus method, allowing attackers to read sensitive cryptographic metadata and potentially compromise encrypted storage confidentiality. The vulnerability affects systems running vulnerable versions of udisks and requires local access to exploit. No patch is currently available.

Authentication Bypass Redhat Suse
NVD GitHub VulDB
CVE-2026-26103
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Improper authorization in the udisks D-Bus API allows local unprivileged users to manipulate LUKS encryption headers on block devices with root privileges, potentially destroying encryption keys and rendering volumes inaccessible. An attacker with local access can exploit this to cause permanent data loss through denial-of-service. No patch is currently available for this vulnerability.

Authentication Bypass Redhat Suse
NVD GitHub VulDB
CVE-2025-67601
EPSS 0% CVSS 8.3
HIGH PATCH This Week

A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the -cacert flag results in the CLI attempting to fetch CA certificates stored in Rancher’s setting cacerts. [CVSS 8.3 HIGH]

Authentication Bypass Rancher Suse
NVD GitHub
CVE-2025-62878
EPSS 0% CVSS 9.9
CRITICAL PATCH Act Now

Path traversal in Kubernetes PersistentVolume creation via pathPattern parameter allows creating volumes in arbitrary host filesystem locations. CVSS 9.9 with scope change.

Information Disclosure Suse
NVD GitHub
CVE-2025-11563
EPSS 0% CVSS 4.6
MEDIUM PATCH This Month

URLs containing percent-encoded slashes (`/` or `\`) can trick wcurl into saving the output file outside of the current directory without the user explicitly asking for it. This flaw only affects the wcurl command line tool. [CVSS 4.6 MEDIUM]

Path Traversal Wcurl Redhat +1
NVD
CVE-2026-27624
EPSS 0% CVSS 7.2
HIGH POC PATCH This Week

Coturn TURN/STUN server contains an access control bypass that allows remote attackers to reach blocked internal addresses by exploiting IPv4-mapped IPv6 address handling in permission and channel binding requests. The vulnerability bypasses "denied-peer-ip" restrictions designed to block loopback ranges, enabling an attacker to interact with internal services that should be unreachable. Public exploit code exists for this flaw, and a patch is available in version 4.9.0 and later.

Authentication Bypass Coturn Suse
NVD GitHub
CVE-2026-27628
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Pypdf versions up to 6.7.2 is affected by loop with unreachable exit condition (infinite loop) (CVSS 7.5).

Python Pypdf Redhat +1
NVD GitHub
CVE-2026-27626
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

OS command injection in OliveTin web shell interface through version 3000.10.0. OliveTin provides web-based access to predefined shell commands — the injection allows executing arbitrary commands beyond the whitelist. PoC available.

RCE Command Injection Olivetin +1
NVD GitHub
CVE-2026-27611
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

FileBrowser Quantum versions prior to 1.1.3-stable and 1.2.6-beta expose a password bypass vulnerability in shared files, allowing unauthenticated recipients to download protected content by accessing the direct download link embedded in share details. An attacker possessing only the share link can retrieve files without providing the intended password, completely circumventing access controls. Public exploit code exists for this vulnerability, and patches are available in the patched versions.

Information Disclosure Filebrowser Quantum Suse
NVD GitHub
CVE-2026-27606
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

Path traversal in Rollup JavaScript module bundler before 2.80.0/3.30.0/4.59.0 allows reading arbitrary files on the build server during bundling. PoC and patch available.

RCE Path Traversal Rollup +2
NVD GitHub
CVE-2026-27598
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Arbitrary file write in Dagu workflow engine up to version 1.16.7 allows authenticated users with DAG write permissions to place malicious YAML files anywhere on the filesystem due to insufficient name validation in the CreateNewDAG API endpoint. Since Dagu executes DAG files as shell commands, an attacker can achieve remote code execution by overwriting existing DAGs or configuration files. Public exploit code exists for this vulnerability, and a patch is available.

RCE Dagu Suse
NVD GitHub
CVE-2026-25899
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Unbounded memory allocation in Fiber v3 (prior to 3.1.0) allows unauthenticated remote attackers to trigger denial of service by sending a malicious fiber_flash cookie that forces deserialization of up to 85GB of memory. All v3 endpoints are vulnerable regardless of flash message usage, and public exploit code exists. No patch is currently available.

Deserialization Fiber Suse
NVD GitHub
CVE-2026-25891
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Fiber web framework versions 3.0.0 and earlier on Windows contain a path traversal vulnerability that allows remote attackers to bypass static file middleware protections and read arbitrary files from the server. Public exploit code exists for this vulnerability, which affects applications using the vulnerable Fiber versions. The issue has been patched in Fiber v3.1.0.

Windows Path Traversal Fiber +1
NVD GitHub
CVE-2026-25882
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Fiber web framework versions 2 and 3 are vulnerable to denial of service attacks when processing requests to routes containing more than 30 parameters, enabling remote attackers to crash affected applications without authentication. The vulnerability stems from insufficient validation during route registration and unbounded array writes in request matching logic. Public exploit code exists for this high-severity flaw, though patches are available in Fiber v2.52.12 and v3.1.0.

Denial Of Service Fiber Suse
NVD GitHub
CVE-2026-27590
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

FastCGI path splitting vulnerability in Caddy before 2.11.1 allows request smuggling or path confusion when proxying to FastCGI backends (PHP-FPM). EPSS 0.19% with PoC available.

PHP Tls RCE +2
NVD GitHub
CVE-2026-27589
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Caddy versions prior to 2.11.1 allow unauthenticated cross-origin requests to the admin API when origin enforcement is disabled, enabling attackers to remotely reconfigure the server through malicious web content loaded in a victim's browser. Public exploit code exists for this vulnerability, which can be leveraged to modify HTTP server behavior and admin listener settings without user knowledge. The vulnerability affects Caddy and TLS implementations, with no patch currently available for affected versions.

Tls Caddy Suse
NVD GitHub
CVE-2026-27588
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Host header case sensitivity bypass in Caddy before 2.11.1. Virtual host routing can be bypassed by using alternate casing in the Host header. PoC available.

Tls Caddy Suse
NVD GitHub
CVE-2026-27587
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

Case sensitivity bypass in Caddy web server path matching before 2.11.1. HTTP path matchers can be bypassed using alternate casing on case-insensitive filesystems. PoC available.

Tls Caddy Suse
NVD GitHub
CVE-2026-27586
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

TLS error swallowing in Caddy web server before 2.11.1 allows bypassing client certificate authentication. Errors in ClientCAs handling are silenced, potentially accepting invalid client certificates. PoC available.

Tls Caddy Suse
NVD GitHub
CVE-2026-27585
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Caddy versions prior to 2.11.1 fail to sanitize backslashes in file path matching, allowing attackers to bypass path-based security controls through specially crafted requests. The vulnerability affects systems with specific Caddy configurations and has public exploit code available. Exploitation requires network access with no authentication, resulting in limited information disclosure or modification of restricted resources.

Tls Caddy Suse
NVD GitHub
CVE-2026-27571
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

NATS Server versions prior to 2.11.2 and 2.12.3 fail to properly limit memory allocation during WebSocket compression, allowing unauthenticated attackers to trigger denial of service through compression bomb attacks that exhaust server memory. The vulnerability is exploitable pre-authentication since compression negotiation occurs before credential validation. A patch is available in versions 2.11.2 and 2.12.3.

Information Disclosure Nats Server Redhat +1
NVD GitHub
CVE-2026-2807
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Memory safety bugs in Firefox 147 and Thunderbird 147 with evidence of memory corruption. Mainline-only bugs not present in ESR branches.

Memory Corruption Firefox Thunderbird +2
NVD
CVE-2026-2806
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

Uninitialized memory read in Firefox Graphics Text component before 148. Text rendering may expose uninitialized memory contents.

Mozilla Information Disclosure Firefox +3
NVD
CVE-2026-2805
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Invalid pointer in Firefox DOM Core & HTML before 148. Incorrect pointer computation leads to memory access errors.

Buffer Overflow Mozilla Thunderbird +3
NVD
CVE-2026-2804
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

A use-after-free vulnerability in Firefox and Thunderbird's JavaScript WebAssembly engine allows remote attackers to achieve information disclosure or data manipulation through a malicious webpage or email attachment that requires user interaction. Affected versions include Firefox below 148 and Thunderbird below 148, with no patch currently available. The vulnerability has a network attack vector with low complexity and carries a CVSS score of 5.4.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2803
EPSS 0% CVSS 7.5
HIGH PATCH This Week

The Settings UI component in Firefox and Thunderbird versions prior to 148 fails to properly restrict access to sensitive configuration data, enabling unauthenticated attackers to remotely disclose confidential information without user interaction. This vulnerability bypasses existing security mitigations designed to protect user settings and preferences. No patch is currently available for affected users.

Information Disclosure Firefox Thunderbird +2
NVD
CVE-2026-2802
EPSS 0% CVSS 4.2
MEDIUM PATCH This Month

Firefox and Thunderbird versions below 148 contain a race condition in the JavaScript garbage collection component that could allow an attacker to access or modify limited data through specially crafted content requiring user interaction. The vulnerability has a CVSS score of 4.2 and currently lacks an available patch.

Race Condition Firefox Thunderbird +2
NVD
CVE-2026-2801
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Improper boundary condition handling in the JavaScript/WebAssembly engine of Firefox and Thunderbird before version 148 enables remote denial of service attacks without requiring user interaction or privileges. An attacker can crash affected applications or cause service unavailability by sending specially crafted content. No patch is currently available.

Mozilla Information Disclosure Thunderbird +3
NVD
CVE-2026-2800
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Spoofing in Firefox for Android WebAuthn component before 148. Allows phishing attacks through WebAuthn UI manipulation.

Android Firefox Thunderbird +2
NVD
CVE-2026-2799
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Core & HTML before 148. DOM object lifecycle error.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2798
EPSS 0% CVSS 8.8
HIGH PATCH This Week

A use-after-free vulnerability in Firefox and Thunderbird's DOM processing allows remote attackers to execute arbitrary code through a malicious webpage or email attachment, requiring only user interaction to trigger. This affects Firefox versions below 148 and Thunderbird versions below 148, with no patch currently available.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2797
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript GC before 148. Second GC UAF, different from CVE-2026-2795.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2796
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

JIT miscompilation in Firefox WebAssembly before 148. The JIT compiler generates incorrect Wasm code, enabling type confusion. PoC available.

Buffer Overflow Mozilla Firefox +3
NVD GitHub
CVE-2026-2795
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript GC component before 148. GC-specific UAF affecting only mainline Firefox and Thunderbird.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2794
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Uninitialized memory in Firefox and Firefox Focus for Android versions prior to 148 enables remote attackers to read sensitive data without authentication or user interaction. The vulnerability allows information disclosure through memory that was not properly cleared before use, potentially exposing confidential user information to network-based attackers.

Android Information Disclosure Firefox +2
NVD
CVE-2026-2793
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Memory safety bugs in Firefox ESR 115.32, ESR 140.7, and Firefox 147. Broader set of memory corruption issues than CVE-2026-2792.

Memory Corruption Firefox Thunderbird +2
NVD
CVE-2026-2792
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Memory safety bugs in Firefox ESR 140.7 and Firefox 147 with evidence of memory corruption and potential code execution exploitability.

Memory Corruption Thunderbird Firefox +2
NVD
CVE-2026-2791
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Cache-based mitigation bypass in Firefox Networking before 148. Caching mechanism can be exploited to bypass security mitigations.

Mozilla Authentication Bypass Thunderbird +3
NVD
CVE-2026-2790
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Same-origin policy bypass in Firefox Networking JAR component before 148. Allows cross-origin data access through JAR protocol handling.

CSRF Mozilla Firefox +3
NVD
CVE-2026-2789
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox ImageLib graphics component before 148. Image processing triggers use of freed memory.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2788
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Boundary error in Firefox Audio/Video GMP (Gecko Media Plugins) component before 148. Media plugin processing triggers memory corruption.

Buffer Overflow Firefox Thunderbird +2
NVD
CVE-2026-2787
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Window and Location component before 148. Window/Location lifecycle management error.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2786
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript Engine before 148. Fourth distinct JS engine UAF in this release.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2785
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Invalid pointer in Firefox JavaScript Engine before 148. Incorrect pointer computation leads to memory corruption.

Buffer Overflow Mozilla Thunderbird +3
NVD
CVE-2026-2784
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

DOM Security mitigation bypass in Firefox before 148. Security mechanisms protecting DOM operations can be circumvented.

Mozilla Authentication Bypass Thunderbird +3
NVD
CVE-2026-2783
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Unauthenticated attackers can extract sensitive information from Firefox and Thunderbird users through a JavaScript engine JIT compilation flaw, affecting all versions prior to Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. The vulnerability requires no user interaction and can be exploited remotely over the network. No patch is currently available for this high-severity flaw.

Information Disclosure Thunderbird Firefox +2
NVD
CVE-2026-2782
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Privilege escalation in Firefox Netmonitor component before 148. Second Netmonitor privilege escalation, separate from CVE-2026-2780.

Privilege Escalation Thunderbird Firefox +2
NVD
CVE-2026-2781
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Integer overflow in Firefox NSS (Network Security Services) Libraries component before 148. Overflow in the cryptographic library could affect TLS and certificate operations.

Integer Overflow Mozilla Buffer Overflow +4
NVD VulDB
CVE-2026-2780
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Privilege escalation in Firefox Netmonitor component before 148. Developer tools component allows escalation from content to higher privileges.

Privilege Escalation Firefox Thunderbird +2
NVD
CVE-2026-2779
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Boundary error in Firefox Networking JAR component before 148. Processing JAR (Java Archive) content triggers memory corruption.

Buffer Overflow Mozilla Firefox +3
NVD
CVE-2026-2778
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Sandbox escape via DOM Core & HTML component in Firefox before 148. CVSS 10.0 — fifth sandbox escape in this release.

Mozilla Buffer Overflow Memory Corruption +6
NVD
CVE-2026-2777
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Privilege escalation in Firefox Messaging System component before 148. The inter-process messaging system allows escalation from content to privileged process.

Privilege Escalation Firefox Thunderbird +2
NVD
CVE-2026-2776
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Sandbox escape via Telemetry component in Firefox external software before 148. CVSS 10.0 — fourth sandbox escape in this release, through the telemetry subsystem.

Buffer Overflow Memory Corruption Privilege Escalation +4
NVD
CVE-2026-2775
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

HTML parser mitigation bypass in Firefox DOM before 148. Bypasses content sanitization protections via alternate authentication path in the HTML parser.

Mozilla Authentication Bypass Firefox +3
NVD
CVE-2026-2774
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Integer overflow in Firefox Audio/Video component before 148. Overflow in media processing leads to incorrect memory allocations.

Integer Overflow Thunderbird Firefox +2
NVD
CVE-2026-2773
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Boundary error in Firefox Web Audio component before 148. Crafted audio processing triggers memory corruption.

Buffer Overflow Mozilla Thunderbird +3
NVD
CVE-2026-2772
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox Audio/Video Playback component before 148. Media playback triggers memory corruption.

Use After Free Thunderbird Firefox +2
NVD
CVE-2026-2771
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Undefined behavior in Firefox DOM Core & HTML component before 148. Can lead to memory corruption and potential code execution.

Buffer Overflow Mozilla Information Disclosure +4
NVD
CVE-2026-2770
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox DOM Bindings (WebIDL) component before 148. Memory corruption in the interface between JavaScript and native DOM objects.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2769
EPSS 0% CVSS 8.8
HIGH PATCH This Week

A use-after-free vulnerability in the IndexedDB storage component of Firefox and Thunderbird allows remote attackers to achieve arbitrary code execution through user interaction. Affected versions include Firefox below 148, Firefox ESR below 115.33 and 140.8, and Thunderbird below 148 and 140.8. No patch is currently available for this high-severity flaw.

Use After Free Thunderbird Firefox +2
NVD
CVE-2026-2768
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

Sandbox escape via IndexedDB in Firefox before 148 and Thunderbird. CVSS 10.0 — the Storage: IndexedDB component allows escaping the content process sandbox.

Authentication Bypass Thunderbird Firefox +2
NVD
CVE-2026-2767
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript WebAssembly component before 148. WebAssembly-specific memory management bug.

Use After Free Firefox Thunderbird +2
NVD
CVE-2026-2766
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Use-after-free in Firefox JavaScript JIT compiler before 148. Second JIT-related UAF in this release, different from CVE-2026-2764.

Use After Free Firefox Thunderbird +2
NVD
Prev Page 5 of 64 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy