775 results (0.010 seconds)

CVSS: 9.4EPSS: 0%CPEs: 3EXPL: 0

27 Jan 2026 — Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2. • https://bugzilla.mozilla.org/show_bug.cgi?id=2008698 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

27 Jan 2026 — Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2. • https://bugzilla.mozilla.org/show_bug.cgi?id=2007302 • CWE-693: Protection Mechanism Failure •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

27 Jan 2026 — By default, jailed processes cannot mount filesystems, including nullfs(4). However, the allow.mount.nullfs option enables mounting nullfs filesystems, subject to privilege checks. If a privileged user within a jail is able to nullfs-mount directories, a limitation of the kernel's path lookup logic allows that user to escape the jail's chroot, yielding access to the full filesystem of the host or parent jail. In a jail configured to allow nullfs(4) mounts from within the jail, the jailed root user can escap... • https://security.freebsd.org/advisories/FreeBSD-SA-26:02.jail.asc • CWE-269: Improper Privilege Management •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2025 — A cross-site request forgery (CSRF) vulnerability in Jenkins 2.540 and earlier, LTS 2.528.2 and earlier allows attackers to trick users into logging in to the attacker's account. • https://www.jenkins.io/security/advisory/2025-12-10/#SECURITY-1166 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2025 — Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not mask build authorization tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them. • https://www.jenkins.io/security/advisory/2025-12-10/#SECURITY-783 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2025 — Jenkins 2.540 and earlier, LTS 2.528.2 and earlier stores build authorization tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. • https://www.jenkins.io/security/advisory/2025-12-10/#SECURITY-783 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2025 — A missing permission check in Jenkins 2.540 and earlier, LTS 2.528.2 and earlier allows attackers with View/Read permission to view encrypted password values in views. • https://www.jenkins.io/security/advisory/2025-12-10/#SECURITY-1809 • CWE-862: Missing Authorization •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2025 — Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not properly close HTTP-based CLI connections when the connection stream becomes corrupted, allowing unauthenticated attackers to cause a denial of service. • https://www.jenkins.io/security/advisory/2025-12-10/#SECURITY-3630 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 4.0EPSS: 0%CPEs: 17EXPL: 0

20 Nov 2025 — A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation... • https://access.redhat.com/security/cve/CVE-2025-9820 • CWE-121: Stack-based Buffer Overflow •

CVSS: 5.9EPSS: 0%CPEs: 3EXPL: 0

13 Nov 2025 — Integer wraparound in multiple PostgreSQL libpq client library functions allows an application input provider or network peer to cause libpq to undersize an allocation and write out-of-bounds by hundreds of megabytes. This results in a segmentation fault for the application using libpq. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected. Jelte Fennema-Nio discovered that the PostgreSQL CREATE STATISTICS command did not correctly check for schema CREATE privileges. An authenti... • https://www.postgresql.org/support/security/CVE-2025-12818 • CWE-190: Integer Overflow or Wraparound •