Page 5 of 6386 results (0.003 seconds)

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

20 Jan 2026 — The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. Denis Ledoux discovered that Python incorrectly parsed email message headers. An attacker could possibly use this issue to inject arbitrary headers into email messages. This issue only affected python3.6, python3.7, python3.8, python3.9, python3.10, python3.11, python3.12, python3.13, and python3.14 packages. • https://github.com/python/cpython/commit/6262704b134db2a4ba12e85ecfbd968534f28b45 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 1

20 Jan 2026 — An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is activ... • https://packetstorm.news/files/id/214433 • CWE-502: Deserialization of Untrusted Data •

CVSS: 2.9EPSS: 0%CPEs: 6EXPL: 0

15 Jan 2026 — A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition. It was discovered that libxml2 incorrectly handl... • https://access.redhat.com/security/cve/CVE-2026-0992 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 3.7EPSS: 0%CPEs: 7EXPL: 0

15 Jan 2026 — A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk. It was discovered that libxml2 incorrectly handled maliciously crafted SGML catalog files. • https://access.redhat.com/security/cve/CVE-2026-0989 • CWE-674: Uncontrolled Recursion •

CVSS: 5.9EPSS: 0%CPEs: 7EXPL: 0

15 Jan 2026 — A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications. It was d... • https://access.redhat.com/security/cve/CVE-2026-0990 • CWE-674: Uncontrolled Recursion •

CVSS: 3.7EPSS: 0%CPEs: 4EXPL: 0

15 Jan 2026 — A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker can craft requests to mask path segments, potentially bypassing proxy-level path filtering. This could expose administrative or sensitive endpoints that operators believe are not externally reachable. • https://access.redhat.com/security/cve/CVE-2026-0976 • CWE-20: Improper Input Validation •

CVSS: 4.8EPSS: 0%CPEs: 5EXPL: 0

13 Jan 2026 — A flaw was found in libsoup’s WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup’s WebSocket support with this configuration may be impacted. This update for libsoup fixes the following issues. • https://access.redhat.com/security/cve/CVE-2026-0716 • CWE-805: Buffer Access with Incorrect Length Value •

CVSS: 8.1EPSS: 0%CPEs: 10EXPL: 0

13 Jan 2026 — Memory safety bugs present in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7. Memory safety bugs present in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that wi... • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1964722%2C2000981%2C2003100%2C2003278 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 0%CPEs: 10EXPL: 0

13 Jan 2026 — Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7. Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7. Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, sandbox escape, information disclosure or spoofing. • https://bugzilla.mozilla.org/show_bug.cgi?id=2005081 • CWE-290: Authentication Bypass by Spoofing •

CVSS: 5.3EPSS: 0%CPEs: 10EXPL: 0

13 Jan 2026 — Clickjacking issue, information disclosure in the PDF Viewer component. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7. Clickjacking issue, information disclosure in the PDF Viewer component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7. Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, sandbox escape, information disclosure or spoofing. • https://bugzilla.mozilla.org/show_bug.cgi?id=2006500 • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere •