OpenEXR -- several integer overflow vulnerabilities openexr 3.4.10

Cary Phillips reports:

OpenEXR 3.4.10 is a patch release that addresses the following security vulnerabilities:

  • CVE-2026-39886 HTJ2K Signed Integer Overflow in ht_undo_impl()
  • CVE-2026-40244 Integer overflow in DWA setupChannelData planarUncRle pointer arithmetic (missed variant of CVE-2026-34589)
  • CVE-2026-40250 Integer overflow in DWA decoder outBufferEnd pointer arithmetic (missed variant of CVE-2026-34589)
CVE-2026-39886 CVE-2026-40244 CVE-2026-40250 https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.4.10 2026-04-17 2026-04-19
xrdp -- Multiple vulnerabilities xrdp 0.10.6,1

xrdp project reports:

This release includes 8 security fixes:

  • CVE-2026-32105
  • CVE-2026-32107
  • CVE-2026-32623
  • CVE-2026-32624
  • CVE-2026-33145
  • CVE-2026-32516
  • CVE-2026-32689
  • CVE-2026-35512
CVE-2026-32105 CVE-2026-32107 CVE-2026-32623 CVE-2026-32624 CVE-2026-33145 CVE-2026-32516 CVE-2026-32689 CVE-2026-35512 2026-03-03 2026-04-18
py-strawberry-graphql -- Multiple vulnerabilities py310-strawberry-graphql py311-strawberry-graphql py312-strawberry-graphql py313-strawberry-graphql py313t-strawberry-graphql py314-strawberry-graphql 0.312.3 py310-dj52-strawberry-graphql py311-dj52-strawberry-graphql py312-dj52-strawberry-graphql py313-dj52-strawberry-graphql py313t-dj52-strawberry-graphql py314-dj52-strawberry-graphql 0.312.3

The Strawberry GraphQL project reports:

Strawberry up until version 0.312.3 is vulnerable to an authentication bypass on WebSocket subscription endpoints. The legacy graphql-ws subprotocol handler does not verify that a 'connection_init' handshake has been completed before processing start (subscription) messages. This allows a remote attacker to skip the 'on_ws_connect' authentication hook entirely by connecting with the graphql-ws subprotocol and sending a start message directly, without ever sending 'connection_init'. The graphql-transport-ws subprotocol handler is not affected, as it correctly gates subscription operations on a connection_acknowledged flag. However, both subprotocols are enabled by default in all framework integrations that support websockets, and the subprotocol is selected by the client via the Sec-WebSocket-Protocol header. Any application relying on 'on_ws_connect' for authentication or authorization is affected.

Strawberry GraphQL's WebSocket subscription handlers for both the 'graphql-transport-ws' and legacy 'graphql-ws' protocols allocate an asyncio.Task and associated Operation object for every incoming subscribe message without enforcing any limit on the number of active subscriptions per connection. An unauthenticated attacker can open a single WebSocket connection, send connection_init, and then flood subscribe messages with unique IDs. Each message unconditionally spawns a new 'asyncio.Task' and async generator, causing linear memory growth and event loop saturation. This leads to server degradation or an OOM crash.

CVE-2026-35523 https://www.cve.org/CVERecord?id=CVE-2026-35523 CVE-2026-35526 https://www.cve.org/CVERecord?id=CVE-2026-35526 2026-04-04 2026-04-17
Mozilla -- Memory safety bugs firefox 149.0.2,2 firefox-esr 140.9.1 thunderbird 149.0.2 thunderbird-esr 140.9.1

Mozilla reports:

Memory safety bugs present in Firefox ESR, Firefox ESR , Thunderbird ESR, and Thunderbird. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2026-5731 https://cveawg.mitre.org/api/cve/CVE-2026-5731 2026-04-07 2026-04-17
go-ethereum -- vulnerabilities go-ethereum 1.17.0

https://github.com/ethereum/go-ethereum/security/advisories reports:

  • DoS via malicious p2p message (CVE-2026-26313)
  • DoS via malicious p2p message (CVE-2026-26314)
  • Improper ECIES Public Key Validation in RLPx Handshake (CVE-2026-26315)
CVE-2026-26313 https://github.com/ethereum/go-ethereum/security/advisories/GHSA-689v-6xwf-5jf3 CVE-2026-26314 https://github.com/ethereum/go-ethereum/security/advisories/GHSA-2gjw-fg97-vg3r CVE-2026-26315 https://github.com/ethereum/go-ethereum/security/advisories/GHSA-m6j8-rg6r-7mv8 2026-02-17 2026-04-12
chromium -- security fixes chromium 147.0.7727.101 ungoogled-chromium 147.0.7727.101

Chrome Releases reports:

This update includes 31 security fixes:

  • [490170083] Critical CVE-2026-6296: Heap buffer overflow in ANGLE. Reported by cinzinga on 2026-03-05
  • [493628982] Critical CVE-2026-6297: Use after free in Proxy. Reported by heapracer on 2026-03-17
  • [495700484] Critical CVE-2026-6298: Heap buffer overflow in Skia. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-24
  • [497053588] Critical CVE-2026-6299: Use after free in Prerender. Reported by Google on 2026-03-28
  • [497724498] Critical CVE-2026-6358: Use after free in XR. Reported by Jihyeon Jeong (Compsec Lab, Seoul National University / Research Intern) on 2026-03-30
  • [490251701] High CVE-2026-6359: Use after free in Video. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-06
  • [491994185] High CVE-2026-6300: Use after free in CSS. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-12
  • [495273999] High CVE-2026-6301: Type Confusion in Turbofan. Reported by qymag1c on 2026-03-23
  • [495477995] High CVE-2026-6302: Use after free in Video. Reported by Syn4pse on 2026-03-24
  • [496282147] High CVE-2026-6303: Use after free in Codecs. Reported by Google on 2026-03-25
  • [496393742] High CVE-2026-6304: Use after free in Graphite. Reported by Google on 2026-03-26
  • [496618639] High CVE-2026-6305: Heap buffer overflow in PDFium. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-26
  • [496907110] High CVE-2026-6306: Heap buffer overflow in PDFium. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-27
  • [497404188] High CVE-2026-6307: Type Confusion in Turbofan. Reported by Project WhatForLunch (@pjwhatforlunch) on 2026-03-29
  • [497412658] High CVE-2026-6308: Out of bounds read in Media. Reported by Google on 2026-03-29
  • [497846428] High CVE-2026-6309: Use after free in Viz. Reported by Google on 2026-03-30
  • [497880137] High CVE-2026-6360: Use after free in FileSystem. Reported by asjidkalam on 2026-03-31
  • [497969820] High CVE-2026-6310: Use after free in Dawn. Reported by Google on 2026-03-31
  • [498201025] High CVE-2026-6311: Uninitialized Use in Accessibility. Reported by Google on 2026-03-31
  • [498269651] High CVE-2026-6312: Insufficient policy enforcement in Passwords. Reported by Google on 2026-03-31
  • [498765210] High CVE-2026-6313: Insufficient policy enforcement in CORS. Reported by Google on 2026-04-02
  • [498782145] High CVE-2026-6314: Out of bounds write in GPU. Reported by Google on 2026-04-02
  • [499247910] High CVE-2026-6315: Use after free in Permissions. Reported by Google on 2026-04-03
  • [499384399] High CVE-2026-6316: Use after free in Forms. Reported by Google on 2026-04-03
  • [500036290] High CVE-2026-6361: Heap buffer overflow in PDFium. Reported by Google on 2026-04-06
  • [500066234] High CVE-2026-6362: Use after free in Codecs. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-04-07
  • [500091052] High CVE-2026-6317: Use after free in Cast. Reported by Google on 2026-04-06
  • [495751197] Medium CVE-2026-6363: Type Confusion in V8. Reported by Google on 2026-03-24
  • [495996858] Medium CVE-2026-6318: Use after free in Codecs. Reported by Syn4pse on 2026-03-25
  • [499018889] Medium CVE-2026-6319: Use after free in Payments. Reported by pwn2addr on 2026-04-02
  • [502103414] Medium CVE-2026-6364: Out of bounds read in Skia. Reported by Google Threat Intelligence on 2026-04-13
CVE-2026-6296 CVE-2026-6297 CVE-2026-6298 CVE-2026-6299 CVE-2026-6358 CVE-2026-6359 CVE-2026-6300 CVE-2026-6301 CVE-2026-6302 CVE-2026-6303 CVE-2026-6304 CVE-2026-6305 CVE-2026-6306 CVE-2026-6307 CVE-2026-6308 CVE-2026-6309 CVE-2026-6360 CVE-2026-6310 CVE-2026-6311 CVE-2026-6312 CVE-2026-6313 CVE-2026-6314 CVE-2026-6315 CVE-2026-6316 CVE-2026-6361 CVE-2026-6362 CVE-2026-6317 CVE-2026-6363 CVE-2026-6318 CVE-2026-6319 CVE-2026-6364 https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html 2026-04-15 2026-04-16
PHP Composer -- Multiple vulnerabilities php82-composer php83-composer php84-composer php85-composer 2.9.6

Composer project reports:

Fixed command injection via malicious Perforce reference (GHSA-gqw4-4w2p-838q / CVE-2026-40261)

Fixed command injection via malicious Perforce repository definition (GHSA-wg36-wvj6-r67p / CVE-2026-40176)

CVE-2026-40261 CVE-2026-40176 https://github.com/composer/composer/releases/tag/2.9.6 2026-04-14 2026-04-14
xwayland -- Multiple vulnerabilities xwayland 24.1.10

X.Org project reports:

Multiple issues have been found in the X server and Xwayland implementations published by X.Org for which we are releasing security fixes for in xorg-server-21.1.22 and xwayland-24.1.10.

CVE-2026-33999 CVE-2026-34000 CVE-2026-34001 CVE-2026-34002 CVE-2026-34003 https://lists.x.org/archives/xorg-announce/2026-April/003677.html 2026-04-14 2026-04-14
xorg-server -- Multiple vulnerabilities xorg-server 21.1.22

X.Org project reports:

Multiple issues have been found in the X server and Xwayland implementations published by X.Org for which we are releasing security fixes for in xorg-server-21.1.22 and xwayland-24.1.10.

CVE-2026-33999 CVE-2026-34000 CVE-2026-34001 CVE-2026-34002 CVE-2026-34003 https://lists.x.org/archives/xorg-announce/2026-April/003677.html 2026-04-14 2026-04-14
python -- more webbrowser.open() command injection vulnerabilities python3100 python3110 python3120 python3130 python3143.14.4_2

Seth Larson reports:

[CVE-2026-4786] Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()

There is a HIGH severity vulnerability affecting CPython.

Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.

CVE-2026-4786 https://mail.python.org/archives/list/security-announce@python.org/thread/JQDUNJVB4AQNTJECSUKOBDU3XCJIPSE5/ https://www.cve.org/CVERecord?id=CVE-2026-4786 https://github.com/python/cpython/issues/148169 https://github.com/python/cpython/pull/148170 2026-04-06 2026-04-13
Python -- use-after-free vulnerability in decompressors under memory pressure python3100 python3110 python3120 python3130 python3143.14.4_1

Seth Larson reports:

There is a CRITICAL severity vulnerability affecting CPython.

Use-after-free (UAF) was possible in the lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile when a memory allocation fails with a MemoryError and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition.

The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a MemoryError is raised during decompression. Using the helper functions to one-shot decompress data such as lzma.decompress(), bz2.decompress(), gzip.decompress(), and zlib.decompress() are not affected as a new decompressor instance is created for each call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.

CVE-2026-6100 https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/ https://github.com/python/cpython/issues/148395 2026-04-11 2026-04-13
Vaultwarden -- Multiple vulnerabilities vaultwarden 1.35.5

The Vaultwarden project reports:

GHSA-937x-3j8m-7w7p Unconfirmed Owner Can Purge Entire Organization Vault.

GHSA-569v-845w-g82p Cross-Org Group Binding Enables Unauthorized Read And Write Access Into Another Organization

GHSA-6j4w-g4jh-xjfx Refresh tokens not invalidated on security stamp rotation

https://github.com/dani-garcia/vaultwarden/releases/tag/1.35.5 2026-04-12 2026-04-12
Python -- HTTP proxy CONNECT tunnel does not sanitize CR/LF python3100 python3110 python3120 python3130 python3143.14.4

Seth Larson reports:

HTTP proxy via "CONNECT" tunneling doesn't sanitize CR/LF (CVE-2026-1502).

CVE-2026-1502 https://github.com/python/cpython/issues/146211 2026-03-20 2026-04-12
Python -- configparser vulnerable to excessive CPU use python3100 python3110 python3120 python3130 python3143.14.4

Stan Ulbrych reports:

configparser.RawConfigParser.{OPTCRE,OPTCRE_NV} regexes [are] vulnerable to quadratic backtracking.

https://github.com/python/cpython/issues/146333 2026-03-23 2026-04-12
py-ormar -- vulnerabilities py310-ormar py311-ormar py312-ormar py313-ormar py313t-ormar py314-ormar 0.23.1

https://github.com/ormar-orm/ormar/security/advisories reports:

  • SQL Injection in aggregate functions min() and max()
  • Pydantic Validation Bypass via __pk_only__ and __excluded__ Kwargs Injection in Model Constructor
CVE-2026-26198 https://github.com/ormar-orm/ormar/security/advisories/GHSA-xxh2-68g9-8jqr CVE-2026-27953 https://github.com/ormar-orm/ormar/security/advisories/GHSA-f964-whrq-44h8 2026-02-22 2026-04-11
(lib)tiff -- Integer Overflow or Wraparound tiff 4.7.1_1

PrymEvol and Quang Luong reports:

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.

CVE-2026-4775 https://cveawg.mitre.org/api/cve/CVE-2026-4775 2026-03-24 2026-04-11
DNSdist -- vulnerabilities dnsdist 2.0.3

https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-02.html reports:

  • CVE-2026-0396: HTML injection in the web dashboard
  • CVE-2026-0397: Information disclosure via CORS misconfiguration
  • CVE-2026-24028: Out-of-bounds read when parsing DNS packets via Lua
  • CVE-2026-24029: DNS over HTTPS ACL bypass
  • CVE-2026-24030: Unbounded memory allocation for DoQ and DoH3
  • CVE-2026-27853: Out-of-bounds write when rewriting large DNS packets
  • CVE-2026-27854: Use after free when parsing EDNS options in Lua
CVE-2026-0396 CVE-2026-0397 CVE-2026-24028 CVE-2026-24029 CVE-2026-24030 CVE-2026-27853 CVE-2026-27854 https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-02.html 2026-03-31 2026-04-10
Mbed TLS -- vulnerabilities mbedtls3 3.6.6 mbedtls4 4.1.0

https://mbed-tls.readthedocs.io/en/latest/security-advisories/ reports:

  • Client impersonation while resuming a TLS 1.3 session (CVE-2026-34873)
  • Entropy on Linux can fall back to /dev/urandom (CVE-2026-34871)
  • PSA random generator cloning (CVE-2026-25835)
  • Compiler-induced constant-time violations (CVE-2025-66442)
  • Null pointer dereference when setting a distinguished name (CVE-2026-34874)
  • Buffer overflow in FFDH public key export (CVE-2026-34875)
  • FFDH: lack of contributory behaviour due to improper input validation (CVE-2026-34872)
  • Signature Algorithm Injection (CVE-2026-25834)
  • CCM multipart finish tag-length validation bypass (CVE-2026-34876)
  • Risk of insufficient protection of serialized session or context data leading to potential memory safety issues (CVE-2026-34877)
  • Buffer underflow in x509_inet_pton_ipv6() (CVE-2026-25833)
CVE-2026-34873 CVE-2026-34871 CVE-2026-25835 CVE-2025-66442 CVE-2026-34874 CVE-2026-34875 CVE-2026-34872 CVE-2026-25834 CVE-2026-34876 CVE-2026-34877 CVE-2026-25833 https://mbed-tls.readthedocs.io/en/latest/security-advisories/ 2026-03-31 2026-04-10
chromium -- security fixes chromium 147.0.7727.55 ungoogled-chromium 147.0.7727.55

Chrome Releases reports:

This update includes multiple security fixes:

  • Critical CVE-2026-5858: Heap buffer overflow in WebML.
  • Critical CVE-2026-5859: Integer overflow in WebML.
  • High CVE-2026-5860: Use after free in WebRTC.
  • High CVE-2026-5861: Use after free in V8.
  • High CVE-2026-5862: Inappropriate implementation in V8.
  • High CVE-2026-5863: Inappropriate implementation in V8.
  • High CVE-2026-5864: Heap buffer overflow in WebAudio.
  • High CVE-2026-5865: Type Confusion in V8.
  • High CVE-2026-5866: Use after free in Media.
  • High CVE-2026-5867: Heap buffer overflow in WebML.
  • High CVE-2026-5868: Heap buffer overflow in ANGLE.
  • High CVE-2026-5869: Heap buffer overflow in WebML.
  • High CVE-2026-5870: Integer overflow in Skia.
  • High CVE-2026-5871: Type Confusion in V8.
  • High CVE-2026-5872: Use after free in Blink.
  • High CVE-2026-5873: Out of bounds read and write in V8.
  • Medium CVE-2026-5874: Use after free in PrivateAI.
  • Medium CVE-2026-5875: Policy bypass in Blink.
  • Medium CVE-2026-5876: Side-channel information leakage in Navigation.
  • Medium CVE-2026-5877: Use after free in Navigation.
  • Medium CVE-2026-5878: Incorrect security UI in Blink.
  • Medium CVE-2026-5879: Insufficient validation of untrusted input in ANGLE.
  • Medium CVE-2026-5880: Incorrect security UI in browser UI.
  • Medium CVE-2026-5881: Policy bypass in LocalNetworkAccess.
  • Medium CVE-2026-5882: Incorrect security UI in Fullscreen.
  • Medium CVE-2026-5883: Use after free in Media.
  • Medium CVE-2026-5884: Insufficient validation of untrusted input in Media.
  • Medium CVE-2026-5885: Insufficient validation of untrusted input in WebML.
  • Medium CVE-2026-5886: Out of bounds read in WebAudio.
  • Medium CVE-2026-5887: Insufficient validation of untrusted input in Downloads.
  • Medium CVE-2026-5888: Uninitialized Use in WebCodecs.
  • Medium CVE-2026-5889: Cryptographic Flaw in PDFium.
  • Medium CVE-2026-5890: Race in WebCodecs.
  • Medium CVE-2026-5891: Insufficient policy enforcement in browser UI.
  • Medium CVE-2026-5892: Insufficient policy enforcement in PWAs.
  • Medium CVE-2026-5893: Race in V8.
  • Low CVE-2026-5894: Inappropriate implementation in PDF.
  • Low CVE-2026-5895: Incorrect security UI in Omnibox.
  • Low CVE-2026-5896: Policy bypass in Audio.
  • Low CVE-2026-5897: Incorrect security UI in Downloads.
  • Low CVE-2026-5898: Incorrect security UI in Omnibox.
  • Low CVE-2026-5899: Incorrect security UI in History Navigation.
  • Low CVE-2026-5900: Policy bypass in Downloads.
  • Low CVE-2026-5901: Policy bypass in DevTools.
  • Low CVE-2026-5902: Race in Media.
  • Low CVE-2026-5903: Policy bypass in IFrameSandbox.
  • Low CVE-2026-5904: Use after free in V8.
  • Low CVE-2026-5905: Incorrect security UI in Permissions.
  • Low CVE-2026-5906: Incorrect security UI in Omnibox.
  • Low CVE-2026-5907: Insufficient data validation in Media.
  • Low CVE-2026-5908: Integer overflow in Media.
  • Low CVE-2026-5909: Integer overflow in Media.
  • Low CVE-2026-5910: Integer overflow in Media.
  • Low CVE-2026-5911: Policy bypass in ServiceWorkers.
  • Low CVE-2026-5912: Integer overflow in WebRTC.
  • Low CVE-2026-5913: Out of bounds read in Blink.
  • Low CVE-2026-5914: Type Confusion in CSS.
  • Low CVE-2026-5915: Insufficient validation of untrusted input in WebML.
  • Low CVE-2026-5918: Inappropriate implementation in Navigation.
  • Low CVE-2026-5919: Insufficient validation of untrusted input in WebSockets.
CVE-2026-5858 CVE-2026-5859 CVE-2026-5860 CVE-2026-5861 CVE-2026-5862 CVE-2026-5863 CVE-2026-5864 CVE-2026-5865 CVE-2026-5866 CVE-2026-5867 CVE-2026-5868 CVE-2026-5869 CVE-2026-5870 CVE-2026-5871 CVE-2026-5872 CVE-2026-5873 CVE-2026-5874 CVE-2026-5875 CVE-2026-5876 CVE-2026-5877 CVE-2026-5878 CVE-2026-5879 CVE-2026-5880 CVE-2026-5881 CVE-2026-5882 CVE-2026-5883 CVE-2026-5884 CVE-2026-5885 CVE-2026-5886 CVE-2026-5887 CVE-2026-5888 CVE-2026-5889 CVE-2026-5890 CVE-2026-5891 CVE-2026-5892 CVE-2026-5893 CVE-2026-5894 CVE-2026-5895 CVE-2026-5896 CVE-2026-5897 CVE-2026-5898 CVE-2026-5899 CVE-2026-5900 CVE-2026-5901 CVE-2026-5902 CVE-2026-5903 CVE-2026-5904 CVE-2026-5905 CVE-2026-5906 CVE-2026-5907 CVE-2026-5908 CVE-2026-5909 CVE-2026-5910 CVE-2026-5911 CVE-2026-5912 CVE-2026-5913 CVE-2026-5914 CVE-2026-5915 CVE-2026-5918 CVE-2026-5919 https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html 2026-04-07 2026-04-10
Mozilla -- Memory safety bugs firefox 149.0.2,2 thunderbird 149.0.2

https://bugzilla.mozilla.org/buglist.cgi?bug_id=2025475%2C2025477 reports:

Memory safety bugs present in Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2026-5735 https://cveawg.mitre.org/api/cve/CVE-2026-5735 2026-04-07 2026-04-09
Mozilla -- Memory safety bugs firefox 149.0.2,2 firefox-esr 140.9.1 thunderbird 140.9.1

https://bugzilla.mozilla.org/buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505 reports:

Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2026-5734 https://cveawg.mitre.org/api/cve/CVE-2026-5734 2026-04-07 2026-04-09
Mozilla -- Incorrect boundary conditions firefox 149.0.2,2 thunderbird 149.0.2

https://bugzilla.mozilla.org/show_bug.cgi?id=2022554 reports:

Incorrect boundary conditions in the Graphics: WebGPU component.

CVE-2026-5733 https://cveawg.mitre.org/api/cve/CVE-2026-5733 2026-04-07 2026-04-09
Mozilla -- Incorrect boundary conditions, integer overflow firefox 149.0.2,2 firefox-esr 140.9.1 thunderbird 149.0.2 thunderbird 140.9.1

https://bugzilla.mozilla.org/show_bug.cgi?id=2017867 reports:

Incorrect boundary conditions, integer overflow in the Graphics: Text component.

CVE-2026-5732 https://cveawg.mitre.org/api/cve/CVE-2026-5732 2026-04-07 2026-04-09
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.10.018.10.3 18.9.018.9.5 11.3.018.8.9

Gitlab reports:

Exposed Method issue in websocket connections impacts GitLab CE/EE

Denial of Service issue in Terraform state lock API impacts GitLab CE/EE

Denial of Service issue in GraphQL API impacts GitLab CE/EE

Denial of Service issue in CSV import impacts GitLab CE/EE

Denial of Service issue in GraphQL SBOM API impacts GitLab EE

Code Injection issue in Code Quality reports impacts GitLab EE

Cross-site Scripting issue in analytics dashboards impacts GitLab EE

Incorrect Authorization issue in vulnerability flags AI detection API impacts GitLab EE

Information Disclosure issue in certain GraphQl query impacts GitLab EE

Improper Access Control issue in Environments API impacts GitLab EE

Information Disclosure issue in CSV export impacts GitLab CE/EE

Missing Authorization issue in custom role permissions impacts GitLab CE/EE

CVE-2026-5173 CVE-2026-1092 CVE-2025-12664 CVE-2026-1403 CVE-2026-1101 CVE-2026-1516 CVE-2026-4332 CVE-2026-2619 CVE-2025-9484 CVE-2026-1752 CVE-2026-2104 CVE-2026-4916 https://about.gitlab.com/releases/2026/04/08/patch-release-gitlab-18-10-3-released/ 2026-04-08 2026-04-09
OpenSSL -- Multiple vulnerabilities openssl 3.0.20,1 openssl34 3.4.5 openssl35 3.5.6 openssl36 3.6.2 openssl111 1.1.1zg

The OpenSSL project reports:

Seven vulnerabilities in OpenSSL library. Highest classification Moderate.

CVE-2026-31790 CVE-2026-2637 CVE-2026-28386 CVE-2026-28387 CVE-2026-28388 CVE-2026-28389 CVE-2026-28390 CVE-2026-31789 https://openssl-library.org/news/secadv/20260407.txt 2026-04-07 2026-04-07
nghttp2 -- CWE-617: Reachable Assertion libnghttp2 1.68.1 nghttp2 1.68.1

https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6 reports:

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.

CVE-2026-27135 https://cveawg.mitre.org/api/cve/CVE-2026-27135 2026-03-18 2026-04-05
MongoDB Server -- CWE-617: Reachable Assertion mongodb80 8.0.18 mongodb70 7.0.31

https://jira.mongodb.org/browse/SERVER-101758 reports:

A user with access to the cluster with a limited set of privilege actions can trigger a crash of amongod process during the limited and unpredictable window when the cluster is being promoted from a replica set to a sharded cluster. This may cause a denial of service by taking down the primary of the replica set.

CVE-2026-5170 https://cveawg.mitre.org/api/cve/CVE-2026-5170 2026-03-30 2026-04-03
openexr -- multiple vulnerabilities openexr 3.4.9

Cary Phillips reports:

[OpenEXR 3.4.9] addresses the following CVEs:

  • CVE-2026-34589 DWA Lossy Decoder Heap Out-of-Bounds Write
  • CVE-2026-34588 Signed 32-bit Overflow in PIZ Decoder Leads to OOB Read/Write
  • CVE-2026-34380 Signed integer overflow (undefined behavior) in undo_pxr24_impl may allow bounds-check bypass in PXR24 decompression
  • CVE-2026-34379 Misaligned write in LossyDctDecoder_execute leading to undefined behavior (DWA/DWAB decompression)
  • CVE-2026-34378 Signed integer overflow in generic_unpack() when parsing EXR files with crafted negative dataWindow.min.x
CVE-2026-34589 CVE-2026-34588 CVE-2026-34380 CVE-2026-34379 CVE-2026-34378 https://github.com/AcademySoftwareFoundation/openexr/blob/v3.4.9-rc/CHANGES.md#version-349-april--3-2026 https://lists.aswf.io/g/openexr-dev/message/5436 2026-03-26 2026-04-02
Python -- The webbrowser.open() API allows leading dashes python310 3.10.20_2 python311 3.11.15_2 python312 3.12.13_2 python313 3.13.12_3 python313t 3.13.12_3 python314 3.14.4

https://github.com/python/cpython/pull/143931 reports:

The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open().

CVE-2026-4519 https://cveawg.mitre.org/api/cve/CVE-2026-4519 2026-03-20 2026-04-01 2026-04-04
Python -- poplib module, when passed a user-controlled command, can have additional commands injected using newlines python310 0 python311 0 python312 0 python313 0 python313t 0 python314 0

Python Software Foundation Security Developer reports:

The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.

CVE-2025-15367 https://cveawg.mitre.org/api/cve/CVE-2025-15367 2026-01-20 2026-04-01 2026-04-04
Python -- imaplib module, when passed a user-controlled command, can have additional commands injected using newlines python310 0 python311 0 python312 0 python313 0 python313t 0 python314 0

Python Software Foundation Security Developer reports:

The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.

CVE-2025-15366 https://cveawg.mitre.org/api/cve/CVE-2025-15366 2026-01-20 2026-04-01 2026-04-04
chromium -- security fixes chromium 146.0.7680.177 ungoogled-chromium 146.0.7680.177

Chrome Releases reports:

This update includes 21 security fixes:

  • [493952652] High CVE-2026-5273: Use after free in CSS. Reported by Anonymous on 2026-03-18
  • [491732188] High CVE-2026-5272: Heap buffer overflow in GPU. Reported by inspector-ambitious on 2026-03-11
  • [488596746] High CVE-2026-5274: Integer overflow in Codecs. Reported by heapracer (@heapracer) on 2026-03-01
  • [489494022] High CVE-2026-5275: Heap buffer overflow in ANGLE. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-04
  • [489711638] High CVE-2026-5276: Insufficient policy enforcement in WebUSB. Reported by Ariel Simon on 2026-03-04
  • [489791424] High CVE-2026-5277: Integer overflow in ANGLE. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-05
  • [490254128] High CVE-2026-5278: Use after free in Web MIDI. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-06
  • [490642836] High CVE-2026-5279: Object corruption in V8. Reported by Hyeonjun Ahn (@_deayzl) on 2026-03-08
  • [491515787] High CVE-2026-5280: Use after free in WebCodecs. Reported by heapracer (@heapracer) on 2026-03-11
  • [491518608] High CVE-2026-5281: Use after free in Dawn. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-10
  • [491655161] High CVE-2026-5282: Out of bounds read in WebCodecs. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-11
  • [492131521] High CVE-2026-5283: Inappropriate implementation in ANGLE. Reported by sweetchip on 2026-03-12
  • [492139412] High CVE-2026-5284: Use after free in Dawn. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-12
  • [492228019] High CVE-2026-5285: Use after free in WebGL. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-13
  • [493900619] High CVE-2026-5286: Use after free in Dawn. Reported by sweetchip on 2026-03-18
  • [494644471] High CVE-2026-5287: Use after free in PDF. Reported by Syn4pse on 2026-03-21
  • [495507390] High CVE-2026-5288: Use after free in WebView. Reported by Google on 2026-03-23
  • [495931147] High CVE-2026-5289: Use after free in Navigation. Reported by Google on 2026-03-25
  • [496205576] High CVE-2026-5290: Use after free in Compositing. Reported by Google on 2026-03-25
  • [490118036] Medium CVE-2026-5291: Inappropriate implementation in WebGL. Reported by heapracer (@heapracer) on 2026-03-06
  • [492213293] Medium CVE-2026-5292: Out of bounds read in WebCodecs. Reported by Google on 2026-03-12
CVE-2026-5273 CVE-2026-5272 CVE-2026-5274 CVE-2026-5275 CVE-2026-5276 CVE-2026-5277 CVE-2026-5278 CVE-2026-5279 CVE-2026-5280 CVE-2026-5281 CVE-2026-5282 CVE-2026-5283 CVE-2026-5284 CVE-2026-5285 CVE-2026-5286 CVE-2026-5287 CVE-2026-5288 CVE-2026-5289 CVE-2026-5290 CVE-2026-5291 CVE-2026-5292 https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html 2026-03-31 2026-04-01
traefik -- Multiple vulnerabilities traefik 3.6.12

The traefik project releases a new version addressing multiple CVEs:

  • CVE-2026-33433 (BasicAuth/DigestAuth Identity Spoofing via Non-Canonical headerField)
  • CVE-2026-33186 (authorization bypass via missing leading slash in :path)
CVE-2026-33433 CVE-2026-33186 https://github.com/traefik/traefik/releases/tag/v3.6.12 2026-03-26 2026-03-29
Roundcube -- SVG Attribute Bypass roundcube-php82 roundcube-php83 roundcube-php84 roundcube-php85 1.6.15,1

The Roundcube project reports:

.

https://github.com/roundcube/roundcubemail/releases/tag/1.6.15 2026-03-29 2026-03-29
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.10.018.10.1 18.9.018.9.3 7.11.018.8.7

Gitlab reports:

Improper Handling of Parameters issue in Jira Connect installations impacts GitLab CE/EE

Cross-Site Request Forgery issue in GLQL API impacts GitLab CE/EE

HTML Injection in vulnerability report impacts GitLab EE

Denial of Service issue in GraphQL API impacts GitLab CE/EE

Improper Access Control issue in WebAuthn 2FA impacts GitLab CE/EE

Improper Access Control issue in GraphQL query impacts GitLab EE

Denial of Service issue in CI configuration processing impacts GitLab CE/EE

Denial of Service issue in webhook configuration impacts GitLab CE/EE

Cross-site Scripting issue in Mermaid diagram renderer impacts GitLab CE/EE

Improper Access Control issue in Merge Requests impacts GitLab CE/EE

Access Control issue in GraphQL API impacts GitLab EE

Incorrect Authorization issue in authorization caching impacts GitLab EE

CVE-2026-2370 CVE-2026-3857 CVE-2026-2995 CVE-2026-3988 CVE-2026-2745 CVE-2026-1724 CVE-2025-13436 CVE-2025-13078 CVE-2026-2973 CVE-2026-2726 CVE-2025-14595 CVE-2026-4363 https://about.gitlab.com/releases/2026/03/25/patch-release-gitlab-18-10-1-released/ 2026-03-25 2026-03-29
jenkins -- multiple vulnerabilities jenkins 2.555 jenkins-lts 2.541.3

Jenkins Security Advisory 2026-03-18:

  • SECURITY-3657 / CVE-2026-33001: Arbitrary file write vulnerability through specially crafted archives in Jenkins (High)
  • SECURITY-3674 / CVE-2026-33002: DNS rebinding vulnerability in WebSocket CLI origin validation in Jenkins (High)
CVE-2026-33001 CVE-2026-33002 https://www.jenkins.io/security/advisory/2026-03-18/ 2026-03-18 2026-03-27
Mozilla -- Multiple vulnerabilities firefox 149.0.0,2 thunderbird 149.0.0

CVE-2026-4729: Memory safety bugs

CVE-2026-4728: Spoofing issue in the Privacy: Anti-Tracking component.

CVE-2026-4727: Denial-of-service in the Libraries component in NSS.

CVE-2026-4726: Denial-of-service in the XML component.

CVE-2026-4725: Sandbox escape due to use-after-free in the Graphics: Canvas2D component.

CVE-2026-4724: Undefined behavior in the Audio/Video component.

CVE-2026-4723: Use-after-free in the JavaScript Engine component.

CVE-2026-4722: Privilege escalation in the IPC component.

CVE-2026-4729 CVE-2026-4728 CVE-2026-4727 CVE-2026-4726 CVE-2026-4725 CVE-2026-4724 CVE-2026-4723 CVE-2026-4722 2026-03-24 2026-03-26
Mozilla -- Multiple vulnerabilities firefox 149.0.0,2 firefox-esr 140.9.0 thunderbird 149.0.0

CVE-2026-4721: Memory safety bugs. Potential arbitrary code execution.

CVE-2026-4709: Incorrect boundary conditions in the Audio/Video: GMP component.

CVE-2026-4707: Incorrect boundary conditions in the Graphics: Canvas2D component.

CVE-2026-4706: Incorrect boundary conditions in the Graphics: Canvas2D component.

CVE-2026-4699: Incorrect boundary conditions in the Layout: Text and Fonts component.

CVE-2026-4698: JIT miscompilation in the JavaScript Engine: JIT component.

CVE-2026-4696: Use-after-free in the Layout: Text and Fonts component.

CVE-2026-4694: Incorrect boundary conditions, integer overflow in the Graphics component.

CVE-2026-4693: Incorrect boundary conditions in the Audio/Video: Playback component.

CVE-2026-4692: Sandbox escape in the Responsive Design Mode component.

CVE-2026-4691: Use-after-free in the CSS Parsing and Computation component.

CVE-2026-4690: Sandbox escape due to integer overflow in the XPCOM component.

CVE-2026-4689: Sandbox escape due to integer overflow in the XPCOM component.

CVE-2026-4687: Sandbox escape in the Telemetry component.

CVE-2026-4686: Incorrect boundary conditions in the Graphics: Canvas2D component.

CVE-2026-4685: Incorrect boundary conditions in the Graphics: Canvas2D component.

CVE-2026-4684: Race condition, use-after-free in the Graphics: WebRender component.

CVE-2026-4721 CVE-2026-4709 CVE-2026-4707 CVE-2026-4706 CVE-2026-4699 CVE-2026-4698 CVE-2026-4696 CVE-2026-4694 CVE-2026-4693 CVE-2026-4692 CVE-2026-4691 CVE-2026-4690 CVE-2026-4689 CVE-2026-4687 CVE-2026-4686 CVE-2026-4685 CVE-2026-4684 2026-03-24 2026-03-26
Mozilla -- Multiple vulnerabilities firefox 149.0.0,2 thunderbird 149.0.0

CVE-2026-4688: Sandbox escape due to use-after-free in Disability Access APIs.

CVE-2026-4695: Incorrect boundary conditions in the Audio/Video: Web Codecs component.

CVE-2026-4697: Incorrect boundary conditions in the Audio/Video: Web Codecs component.

CVE-2026-4700: Mitigation bypass in the Networking: HTTP component.

CVE-2026-4701: Use-after-free in the JavaScript Engine component.

CVE-2026-4702: JIT miscompilation in the JavaScript Engine component.

CVE-2026-4704: Denial-of-service in the WebRTC: Signaling component.

CVE-2026-4705: Undefined behavior in the WebRTC: Signaling component.

CVE-2026-4708: Incorrect boundary conditions in the Graphics component.

CVE-2026-4710: Incorrect boundary conditions in the Audio/Video component.

CVE-2026-4711: Use-after-free in the Widget: Cocoa component.

CVE-2026-4712: Information disclosure in the Widget: Cocoa component.

CVE-2026-4713: Incorrect boundary conditions in the Graphics component.

CVE-2026-4714: Incorrect boundary conditions in the Audio/Video component.

CVE-2026-4715: Uninitialized memory in the Graphics: Canvas2D component.

CVE-2026-4716: Incorrect boundary conditions and uninitialized memory in the JavaScript Engine.

CVE-2026-4717: Privilege escalation in the Netmonitor component.

CVE-2026-4718: Undefined behavior in the WebRTC: Signaling component.

CVE-2026-4719: Incorrect boundary conditions in the Graphics: Text component.

CVE-2026-4720: Memory safety bugs

CVE-2026-4688 CVE-2026-4695 CVE-2026-4697 CVE-2026-4700 CVE-2026-4701 CVE-2026-4702 CVE-2026-4704 CVE-2026-4705 CVE-2026-4708 CVE-2026-4710 CVE-2026-4711 CVE-2026-4712 CVE-2026-4713 CVE-2026-4714 CVE-2026-4715 CVE-2026-4716 CVE-2026-4717 CVE-2026-4718 CVE-2026-4719 CVE-2026-4720 2026-03-24 2026-03-26
FreeBSD -- Remote code execution via RPCSEC_GSS packet validation FreeBSD-kernel 15.015.0_5 14.414.4_1 14.314.3_10 13.513.5_11

Problem Description:

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first.

Impact:

As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel.

In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

CVE-2026-4747 SA-26:08.rpcsec_gss 2026-03-25 2026-03-26
FreeBSD -- Remote denial of service via null pointer dereference FreeBSD-kernel 15.015.0_5

Problem Description:

On a system exposing an NVMe/TCP target, a remote client can trigger a kernel panic by sending a CONNECT command for an I/O queue with a bogus or stale CNTLID.

Impact:

An attacker with network access to the NVMe/TCP target can trigger an unauthenticated Denial of Service condition on the affected machine.

CVE-2026-4652 SA-26:07.nvmf 2026-03-25 2026-03-26
FreeBSD -- TCP: remotely exploitable DoS vector (mbuf leak) FreeBSD-kernel 15.015.0_5 14.414.4_1 14.314.3_10

Problem Description:

When a challenge ACK is to be sent tcp_respond() constructs and sends the challenge ACK and consumes the mbuf that is passed in. When no challenge ACK should be sent the function returns and leaks the mbuf.

Impact:

If an attacker is either on path with an established TCP connection, or can themselves establish a TCP connection, to an affected FreeBSD machine, they can easily craft and send packets which meet the challenge ACK criteria and cause the FreeBSD host to leak an mbuf for each crafted packet in excess of the configured rate limit settings i.e. with default settings, crafted packets in excess of the first 5 sent within a 1s period will leak an mbuf.

Technically, off-path attackers can also exploit this problem by guessing the IP addresses, TCP port numbers and in some cases the sequence numbers of established connections and spoofing packets towards a FreeBSD machine, but this is harder to do effectively.

CVE-2026-4247 SA-26:06.tcp 2026-03-25 2026-03-26
chromium -- security fixes chromium 146.0.7680.164 ungoogled-chromium 146.0.7680.164

Chrome Releases reports:

This update includes 8 security fixes:

  • [485397284] High CVE-2026-4673: Heap buffer overflow in WebAudio. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-18
  • [488188166] High CVE-2026-4674: Out of bounds read in CSS. Reported by Syn4pse on 2026-02-27
  • [488270257] High CVE-2026-4675: Heap buffer overflow in WebGL. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-02-27
  • [488613135] High CVE-2026-4676: Use after free in Dawn. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-01
  • [490533968] High CVE-2026-4677: Out of bounds read in WebAudio. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-07
  • [491164019] High CVE-2026-4678: Use after free in WebGPU. Reported by Google on 2026-03-10
  • [491516670] High CVE-2026-4679: Integer overflow in Fonts. Reported by GF, Un3xploitable Of DeadSec on 2026-03-11
  • [491869946] High CVE-2026-4680: Use after free in FedCM. Reported by Shaheen Fazim on 2026-03-12
CVE-2026-4673 CVE-2026-4674 CVE-2026-4675 CVE-2026-4676 CVE-2026-4677 CVE-2026-4678 CVE-2026-4679 CVE-2026-4680 https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html 2026-03-23 2026-03-24
chromium -- security fixes chromium 146.0.7680.153 ungoogled-chromium 146.0.7680.153

Chrome Releases reports:

This update includes 26 security fixes:

  • [475877320] Critical CVE-2026-4439: Out of bounds memory access in WebGL. Reported by Goodluck on 2026-01-15
  • [485935305] Critical CVE-2026-4440: Out of bounds read and write in WebGL. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-20
  • [489381399] Critical CVE-2026-4441: Use after free in Base. Reported by Google on 2026-03-03
  • [484751092] High CVE-2026-4442: Heap buffer overflow in CSS. Reported by Syn4pse on 2026-02-16
  • [485292589] High CVE-2026-4443: Heap buffer overflow in WebAudio. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-18
  • [486349161] High CVE-2026-4444: Stack buffer overflow in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-21
  • [486421953] High CVE-2026-4445: Use after free in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-22
  • [486421954] High CVE-2026-4446: Use after free in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-22
  • [486657483] High CVE-2026-4447: Inappropriate implementation in V8. Reported by Erge on 2026-02-23
  • [486972661] High CVE-2026-4448: Heap buffer overflow in ANGLE. Reported by M. Fauzan Wijaya (Gh05t666nero) on 2026-02-23
  • [487117772] High CVE-2026-4449: Use after free in Blink. Reported by Syn4pse on 2026-02-24
  • [487746373] High CVE-2026-4450: Out of bounds write in V8. Reported by qymag1c on 2026-02-26
  • [487768779] High CVE-2026-4451: Insufficient validation of untrusted input in Navigation. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-26
  • [487977696] High CVE-2026-4452: Integer overflow in ANGLE. Reported by cinzinga on 2026-02-26
  • [488400770] High CVE-2026-4453: Integer overflow in Dawn. Reported by sweetchip on 2026-02-27
  • [488585488] High CVE-2026-4454: Use after free in Network. Reported by heapracer (@heapracer) on 2026-03-01
  • [488585504] High CVE-2026-4455: Heap buffer overflow in PDFium. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-01
  • [488617440] High CVE-2026-4456: Use after free in Digital Credentials API. Reported by sean wong on 2026-02-28
  • [488803413] High CVE-2026-4457: Type Confusion in V8. Reported by Zhenpeng (Leo) Lin at depthfirst on 2026-03-01
  • [489619753] High CVE-2026-4458: Use after free in Extensions. Reported by Shaheen Fazim on 2026-03-04
  • [490246422] High CVE-2026-4459: Out of bounds read and write in WebAudio. Reported by Jihyeon Jeong (Compsec Lab, Seoul National University / Research Intern) on 2026-03-06
  • [490254124] High CVE-2026-4460: Out of bounds read in Skia. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-06
  • [490558172] High CVE-2026-4461: Inappropriate implementation in V8. Reported by Google on 2026-03-07
  • [491080830] High CVE-2026-4462: Out of bounds read in Blink. Reported by heapracer (@heapracer) on 2026-03-09
  • [491358681] High CVE-2026-4463: Heap buffer overflow in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-10
  • [487208468] Medium CVE-2026-4464: Integer overflow in ANGLE. Reported by heesun on 2026-02-24
CVE-2026-4439 CVE-2026-4440 CVE-2026-4441 CVE-2026-4442 CVE-2026-4443 CVE-2026-4444 CVE-2026-4445 CVE-2026-4446 CVE-2026-4447 CVE-2026-4448 CVE-2026-4449 CVE-2026-4450 CVE-2026-4451 CVE-2026-4452 CVE-2026-4453 CVE-2026-4454 CVE-2026-4455 CVE-2026-4456 CVE-2026-4457 CVE-2026-4458 CVE-2026-4459 CVE-2026-4460 CVE-2026-4461 CVE-2026-4462 CVE-2026-4463 CVE-2026-4464 https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html 2026-03-18 2026-03-24
traefik -- Multiple vulnerabilities traefik 3.6.11

The traefik project releases a new version addressing multiple CVEs:

  • CVE-2026-32595 (BasicAuth Middleware Timing Attack)
  • CVE-2026-32305 (Potential mTLS Bypass via Fragmented TLS ClientHello)
  • CVE-2026-32695 (Details not yet available)
CVE-2026-32595 CVE-2026-32305 CVE-2026-32695 https://github.com/traefik/traefik/releases/tag/v3.6.11 2026-03-19 2026-03-22
UniFi Network Application - Multiple vulnerabilities unifi10 10.1.89 unifi9 9.0.114

https://community.ui.com/releases/Security-Advisory-Bulletin-062-062/c29719c0-405e-4d4a-8f26-e343e99f931b reports:

An Authenticated NoSQL Injection vulnerability found in UniFi Network Application could allow a malicious actor with authenticated access to the network to escalate privileges.

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.

CVE-2026-22558 https://cveawg.mitre.org/api/cve/CVE-2026-22558 CVE-2026-22557 https://cveawg.mitre.org/api/cve/CVE-2026-22557 2026-03-19 2026-03-19
Roundcube -- Multiple vulnerabilities roundcube-php82 roundcube-php83 roundcube-php84 roundcube-php85 1.6.14,1

The Roundcube project reports:

pre-auth arbitrary file write via unsafe deserialization in redis/memcache session handler

password could get changed without providing the old password

IMAP Injection + CSRF bypass in mail search

remote image blocking bypass via various SVG animate attributes

remote image blocking bypass via a crafted body background attribute

fixed position mitigation bypass via use of !important

XSS issue in a HTML attachment preview

SSRF + Information Disclosure via stylesheet links to a local network hosts

https://github.com/roundcube/roundcubemail/releases/tag/1.6.14 2026-03-18 2026-03-19
homebox -- multiple vulnerabilities homebox 0.24.0

Homebox reports:

CVE-2026-27981 CVE-2026-27600 CVE-2026-26272 2026-03-01 2026-03-17
chromium -- security fix chromium 146.0.7680.80 ungoogled-chromium 146.0.7680.80

Chrome Releases reports:

This update includes 1 security fix:

  • [491421267] High CVE-2026-3909: Out of bounds write in Skia. Reported by Google Threat Analysis Group on 2026-03-10
CVE-2026-3909 https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_13.html 2026-03-13 2026-03-15
chromium -- security fixes chromium 146.0.7680.75 ungoogled-chromium 146.0.7680.75

Chrome Releases reports:

This update includes 2 security fixes:

  • [491421267] High CVE-2026-3909: Out of bounds write in Skia. Reported by Google on 2026-03-10
  • [491410818] High CVE-2026-3910: Inappropriate implementation in V8. Reported by Google on 2026-03-10
CVE-2026-3909 CVE-2026-3910 https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html 2026-03-12 2026-03-15
chromium -- security fixes chromium 146.0.7680.71 ungoogled-chromium 146.0.7680.71

Chrome Releases reports:

This update includes 29 security fixes:

  • [483445078] Critical CVE-2026-3913: Heap buffer overflow in WebML. Reported by Tobias Wienand on 2026-02-10
  • [481776048] High CVE-2026-3914: Integer overflow in WebML. Reported by cinzinga on 2026-02-04
  • [483971526] High CVE-2026-3915: Heap buffer overflow in WebML. Reported by Tobias Wienand on 2026-02-12
  • [482828615] High CVE-2026-3916: Out of bounds read in Web Speech. Reported by Grischa Hauser on 2026-02-09
  • [483569512] High CVE-2026-3917: Use after free in Agents. Reported by Syn4pse on 2026-02-11
  • [483853103] High CVE-2026-3918: Use after free in WebMCP. Reported by Syn4pse on 2026-02-12
  • [444176961] High CVE-2026-3919: Use after free in Extensions. Reported by Huinian Yang (@vmth6) of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd. on 2025-09-10
  • [482875307] High CVE-2026-3920: Out of bounds memory access in WebML. Reported by Google on 2026-02-09
  • [484946544] High CVE-2026-3921: Use after free in TextEncoding. Reported by Pranamya Keshkamat & Cantina.xyz on 2026-02-17
  • [485397139] High CVE-2026-3922: Use after free in MediaStream. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-18
  • [485935314] High CVE-2026-3923: Use after free in WebMIDI. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-20
  • [487338366] High CVE-2026-3924: Use after free in WindowDialog. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-25
  • [418214610] Medium CVE-2026-3925: Incorrect security UI in LookalikeChecks. Reported by NDevTK and Alesandro Ortiz on 2025-05-17
  • [478659010] Medium CVE-2026-3926: Out of bounds read in V8. Reported by qymag1c on 2026-01-26
  • [474948986] Medium CVE-2026-3927: Incorrect security UI in PictureInPicture. Reported by Barath Stalin K on 2026-01-11
  • [435980394] Medium CVE-2026-3928: Insufficient policy enforcement in Extensions. Reported by portsniffer443 on 2025-08-03
  • [477180001] Medium CVE-2026-3929: Side-channel information leakage in ResourceTiming. Reported by Povcfe of Tencent Security Xuanwu Lab on 2026-01-20
  • [476898368] Medium CVE-2026-3930: Unsafe navigation in Navigation. Reported by Povcfe of Tencent Security Xuanwu Lab on 2026-01-19
  • [417599694] Medium CVE-2026-3931: Heap buffer overflow in Skia. Reported by Huinian Yang (@vmth6) of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd. on 2025-05-14
  • [478296121] Medium CVE-2026-3932: Insufficient policy enforcement in PDF. Reported by Ayato Shitomi on 2026-01-23
  • [478783560] Medium CVE-2026-3934: Insufficient policy enforcement in ChromeDriver. Reported by Povcfe of Tencent Security Xuanwu Lab on 2026-01-26
  • [479326680] Medium CVE-2026-3935: Incorrect security UI in WebAppInstalls. Reported by Barath Stalin K on 2026-01-28
  • [481920229] Medium CVE-2026-3936: Use after free in WebView. Reported by Am4deu$ on 2026-02-05
  • [473118648] Low CVE-2026-3937: Incorrect security UI in Downloads. Reported by Abhishek Kumar on 2026-01-03
  • [474763968] Low CVE-2026-3938: Insufficient policy enforcement in Clipboard. Reported by vicevirus on 2026-01-10
  • [40058077] Low CVE-2026-3939: Insufficient policy enforcement in PDF. Reported by NDevTK on 2021-11-30
  • [470574526] Low CVE-2026-3940: Insufficient policy enforcement in DevTools. Reported by Jorian Woltjer, Mian, bug_blitzer on 2025-12-21
  • [474670215] Low CVE-2026-3941: Insufficient policy enforcement in DevTools. Reported by Lyra Rebane (rebane2001) on 2026-01-10
  • [475238879] Low CVE-2026-3942: Incorrect security UI in PictureInPicture. Reported by Barath Stalin K on 2026-01-12
CVE-2026-3913 CVE-2026-3914 CVE-2026-3915 CVE-2026-3916 CVE-2026-3917 CVE-2026-3918 CVE-2026-3919 CVE-2026-3920 CVE-2026-3921 CVE-2026-3922 CVE-2026-3923 CVE-2026-3924 CVE-2026-3925 CVE-2026-3926 CVE-2026-3927 CVE-2026-3928 CVE-2026-3929 CVE-2026-3930 CVE-2026-3931 CVE-2026-3932 CVE-2026-3934 CVE-2026-3935 CVE-2026-3936 CVE-2026-3937 CVE-2026-3938 CVE-2026-3939 CVE-2026-3940 CVE-2026-3941 CVE-2026-3942 https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html 2026-03-10 2026-03-15
OpenSSL -- key agreement vulnerability openssl35 3.5.5_1 openssl36 3.6.1_1

The OpenSSL project reports:

TLS 1.3 server may choose unexpected key agreement group (Low)

An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the "DEFAULT" keyword.

CVE-2026-2673 https://openssl-library.org/news/secadv/20260313.txt 2026-03-13 2026-03-13
Mozilla -- Undefined behavior in the DOM: Core & HTML component firefox 148.0.0,2 firefox-esr 140.8.0 thunderbird 148.0.0

https://bugzilla.mozilla.org/show_bug.cgi?id=2014593 reports:

Undefined behavior in the DOM: Core & HTML component.

CVE-2026-2771 https://cveawg.mitre.org/api/cve/CVE-2026-2771 2026-02-24 2026-03-12
Firefox -- Same-origin policy bypass firefox 148.0.2,2

https://bugzilla.mozilla.org/show_bug.cgi?id=2018400 reports:

Same-origin policy bypass in the CSS Parsing and Computation component.

CVE-2026-3846 https://cveawg.mitre.org/api/cve/CVE-2026-3846 2026-03-10 2026-03-12
firefox -- Memory safety bugs firefox 148.0.2,2

https://bugzilla.mozilla.org/buglist.cgi?bug_id=2017513%2C2017622%2C2019341 reports:

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2026-3847 https://cveawg.mitre.org/api/cve/CVE-2026-3847 2026-03-10 2026-03-12
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.9.018.9.2 18.8.018.8.6 1.0.018.7.6

Gitlab reports:

Cross-site Scripting issue in Markdown placeholder processing impacts GitLab CE/EE

Denial of Service issue in GraphQL API impacts GitLab CE/EE

Denial of Service issue in repository archive endpoint impacts GitLab CE/EE

Denial of Service issue in protected branches API impacts GitLab CE/EE

Denial of Service issue in webhook custom headers impacts GitLab CE/EE

Denial of Service issue in webhook endpoint impacts GitLab CE/EE

Improper Neutralization of CRLF Sequences issue impacts GitLab CE/EE

Improper Access Control issue in runners API impacts GitLab CE/EE

Improper Access Control issue in snippet rendering impacts GitLab CE/EE

Information Disclosure issue in inaccessible issues impacts GitLab CE/EE

Missing Authorization issue in Group Import impacts GitLab CE/EE

Incorrect Reference issue in repository download impacts GitLab CE/EE

Incorrect Authorization issue in Virtual Registry impacts GitLab EE

Improper Escaping of Output issue in Datadog integration impacts GitLab CE/EE

CVE-2026-1090 CVE-2026-1069 CVE-2025-13929 CVE-2025-14513 CVE-2025-13690 CVE-2025-12576 CVE-2026-3848 CVE-2025-12555 CVE-2026-0602 CVE-2026-1732 CVE-2026-1663 CVE-2026-1230 CVE-2025-12704 CVE-2025-12697 https://about.gitlab.com/releases/2026/03/11/patch-release-gitlab-18-9-2-released/ 2026-03-11 2026-03-11
curl -- Multiple vulnerabilities curl 8.18.0

The curl project reports:

Multiple vulnerabilities

CVE-2025-15224 CVE-2025-15079 CVE-2025-14819 CVE-2025-14524 CVE-2025-14017 CVE-2025-13034 https://curl.se/docs/vuln-8.17.0.html 2026-01-06 2026-03-11
curl -- Multiple vulnerabilties curl 8.19.0

The curl project reports:

  • use after free in SMB connection reuse
  • wrong proxy connection reuse with credentials
  • token leak with redirect and netrc
  • bad reuse of HTTP Negotiate connection
CVE-2026-3805 CVE-2026-3784 CVE-2026-3783 CVE-2026-1965 https://curl.se/docs/vuln-8.18.0.html 2026-03-11 2026-03-11
gstreamer1 -- multiple vulnerabilities gstreamer1 1.28.1 gstreamer1-plugins 1.28.1 gstreamer1-plugins-good 1.28.1 gstreamer1-plugins-bad 1.28.1 gstreamer1-plugins-ugly 1.28.1

The GStreamer project reports multiple security vulnerabilities fixed in the 1.28.1 release:

Twelve security vulnerabilities were addressed, including:

  • Out-of-bounds reads and writes in the H.266 video parser, WAV parser, MP4 and ASF demuxers, and DVB subtitle decoder.
  • Integer overflows in the RIFF parser and Huffman table handling in the JPEG parser.
  • Stack buffer overflows in the RTP QDM2 depayloader and H.266 parser.

These could lead to application crashes or potentially arbitrary code execution.

CVE-2026-1940 CVE-2026-3082 CVE-2026-2921 CVE-2026-2922 CVE-2026-2920 CVE-2026-2923 CVE-2026-3083 CVE-2026-3085 CVE-2026-3086 CVE-2026-3081 CVE-2026-3084 https://gstreamer.freedesktop.org/security/sa-2026-0001.html https://gstreamer.freedesktop.org/security/sa-2026-0002.html https://gstreamer.freedesktop.org/security/sa-2026-0003.html https://gstreamer.freedesktop.org/security/sa-2026-0004.html https://gstreamer.freedesktop.org/security/sa-2026-0005.html https://gstreamer.freedesktop.org/security/sa-2026-0006.html https://gstreamer.freedesktop.org/security/sa-2026-0007.html https://gstreamer.freedesktop.org/security/sa-2026-0008.html https://gstreamer.freedesktop.org/security/sa-2026-0009.html https://gstreamer.freedesktop.org/security/sa-2026-0010.html https://gstreamer.freedesktop.org/security/sa-2026-0011.html https://gstreamer.freedesktop.org/security/sa-2026-0012.html 2026-02-25 2026-03-07
oauth2-proxy -- multiple vulnerabilities oauth2-proxy 7.14.2

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed.

CVE-2025-68121 2026-02-05 2026-02-27
Mozilla -- Multiple vulnerabilities firefox 148.0.0,2 firefox-esr 140.8.0 thunderbird 148.0.0

CVE-2026-2809: Memory safety bug in the JavaScript: WebAssembly component.

CVE-2026-2808: Integer overflow in the JavaScript: Standard Library component.

CVE-2026-2809 CVE-2026-2808 2026-02-24 2026-02-26
Firefox -- Multiple vulnerabilities firefox 148.0.0,2 thunderbird 148.0.0

CVE-2026-2807: Memory safety bugs present in Firefox 147 and Thunderbird 147

CVE-2026-2806: Uninitialized memory in the Graphics: Text component.

CVE-2026-2805: Invalid pointer in the DOM: Core & HTML component.

CVE-2026-2804: Use-after-free in the JavaScript: WebAssembly component.

CVE-2026-2803: Information disclosure, mitigation bypass in the Settings UI component.

CVE-2026-2802: Race condition in the JavaScript: GC component.

CVE-2026-2801: Incorrect boundary conditions in the JavaScript: WebAssembly component.

CVE-2026-2799: Use-after-free in the DOM: Core & HTML component.

CVE-2026-2798: Use-after-free in the DOM: Core & HTML component.

CVE-2026-2797: Use-after-free in the JavaScript: GC component.

CVE-2026-2796: JIT miscompilation in the JavaScript: WebAssembly component

CVE-2026-2795: Use-after-free in the JavaScript: GC component.

CVE-2026-2807 CVE-2026-2806 CVE-2026-2805 CVE-2026-2804 CVE-2026-2803 CVE-2026-2802 CVE-2026-2801 CVE-2026-2799 CVE-2026-2798 CVE-2026-2797 CVE-2026-2796 CVE-2026-2795 2026-02-24 2026-02-26
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.9.018.9.1 18.8.018.8.5 9.0.018.7.5

Gitlab reports:

Cross-site Scripting issue in Mermaid sandbox impacts GitLab CE/EE

Denial of Service issue in container registry impacts GitLab CE/EE

Denial of Service issue in Jira events endpoint impacts GitLab CE/EE

Regular Expression Denial of Service issue in GitLab merge requests impacts GitLab CE/EE

Missing rate limit in Bitbucket Server importer impacts GitLab CE/EE

Denial of Service issue in CI trigger API impacts GitLab CE/EE

Denial of Service issue in token decoder impacts GitLab CE/EE

Improper Access Control issue in Conan package registry impacts GitLab EE

Access Control issue in CI job mutation impacts GitLab CE/EE

CVE-2026-0752 CVE-2025-14511 CVE-2026-1662 CVE-2026-1388 CVE-2026-2845 CVE-2025-3525 CVE-2026-1725 CVE-2026-1747 CVE-2025-14103 https://about.gitlab.com/releases/2026/02/25/patch-release-gitlab-18-9-1-released/ 2026-02-25 2026-02-26
mail/mailpit -- Server-Side Request Forgery (SSRF) via Link Check API mailpit 1.29.2

Mailpit author reports:

The Link Check API (/api/v1/message/{ID}/link-check) is vulnerable to Server-Side Request Forgery (SSRF). The server performs HTTP HEAD requests to every URL found in an email without validating target hosts or filtering private/internal IP addresses. The response returns status codes and status text per link, making this a non-blind SSRF. In the default configuration (no authentication on SMTP or API), this is fully exploitable remotely with zero user interaction.

CVE-2026-27808 https://github.com/axllent/mailpit/security/advisories/GHSA-mpf7-p9x7-96r3 2026-02-25 2026-02-25
FreeBSD -- Local DoS and possible privilege escalation via routing sockets FreeBSD-kernel 15.015.0_4 14.314.3_9 13.513.5_10

Problem Description:

The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been validated, but this is not necessarily the case, and it's possible for a malicious userspace program to craft a request which triggers a 127-byte overflow.

In practice, this overflow immediately overwrites the canary for the rtsock_msg_buffer() stack frame, resulting in a panic once the function returns.

Impact:

The bug allows an unprivileged user to crash the kernel by triggering a stack buffer overflow in rtsock_msg_buffer(). In particular, the overflow will corrupt a stack canary value that is verified when the function returns; this mitigates the impact of the stack overflow by triggering a kernel panic.

Other kernel bugs may exist which allow userspace to find the canary value and thus defeat the mitigation, at which point local privilege escalation may be possible.

CVE-2026-3038 SA-26:05.route 2026-02-24 2026-02-25
FreeBSD -- Jail chroot escape via fd exchange with a different jail FreeBSD-kernel 14.314.3_9 13.513.5_10

Problem Description:

If two sibling jails are restricted to separate filesystem trees, which is to say that neither of the two jail root directories is an ancestor of the other, jailed processes may nonetheless be able to access a shared directory via a nullfs mount, if the administrator has configured one.

In this case, cooperating processes in the two jails may establish a connection using a unix domain socket and exchange directory descriptors with each other.

When performing a filesystem name lookup, at each step of the lookup, the kernel checks whether the lookup would descend below the jail root of the current process. If the jail root directory is not encountered, the lookup continues.

Impact:

In a configuration where processes in two different jails are able to exchange file descriptors using a unix domain socket, it is possible for a jailed process to receive a directory for a descriptor that is below that process' jail root. This enables full filesystem access for a jailed process, breaking the chroot.

Note that the system administrator is still responsible for ensuring that an unprivileged user on the jail host is not able to pass directory descriptors to a jailed process, even in a patched kernel.

CVE-2025-15576 SA-26:04.jail 2026-02-24 2026-02-25
Vaultwarden -- Multiple vulnerabilities vaultwarden 1.35.4

The Vaultwarden project reports:

  • GHSA-w9f8-m526-h7fh. This vulnerability would allow an attacker to access a cipher from a different user (fully encrypted) if they already know its internal UUID.
  • GHSA-h4hq-rgvh-wh27. This vulnerability allows an attacker with manager-level access within an organization to modify collections they can access, even if they do not have management permissions for them.
  • GHSA-r32r-j5jq-3w4m. This vulnerability allows an attacker with manager-level access within an organization to modify collections they are not assigned.
https://github.com/dani-garcia/vaultwarden/releases/tag/1.35.4 2026-02-23 2026-02-24
openexr -- buffer overflow in istream_nonparallel_read on invalid input data openexr 3.3.7 3.4.03.4.5

Cary Phillips reports:

[openexr] v3.4.5 [...] fixes an incorrect size check in istream_nonparallel_read that could lead to a buffer overflow on invalid input data.

https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.4.5 https://github.com/AcademySoftwareFoundation/openexr/commit/6bb2ddf1068573d073edf81270a015b38cc05cef 2026-02-16 2026-02-22
jenkins -- multiple vulnerabilities jenkins 2.551 jenkins-lts 2.541.2

Jenkins Security Advisory:

Description

(High) SECURITY-3669 / CVE-2026-27099

Stored XSS vulnerability in node offline cause description

(Medium) SECURITY-3658 / CVE-2026-27100

Build information disclosure vulnerability through Run Parameter

CVE-2026-27099 CVE-2026-27100 https://www.jenkins.io/security/advisory/2026-02-18/ 2026-02-18 2026-02-20
Mozilla -- Heap buffer overflow firefox 147.0.4,2 firefox-esr 140.7.1 thunderbird 147.0.2

https://bugzilla.mozilla.org/show_bug.cgi?id=2014390 reports:

Heap buffer overflow in libvpx.

CVE-2026-2447 https://cveawg.mitre.org/api/cve/CVE-2026-2447 2026-02-16 2026-02-20
chromium -- security fixes chromium 145.0.7632.109 ungoogled-chromium 145.0.7632.109

Chrome Releases reports:

This update includes 3 security fixes:

  • [477033835] High CVE-2026-2648: Heap buffer overflow in PDFium. Reported by soiax on 2026-01-19
  • [481074858] High CVE-2026-2649: Integer overflow in V8. Reported by JunYoung Park(@candymate) of KAIST Hacking Lab on 2026-02-03
  • [476461867] Medium CVE-2026-2650: Heap buffer overflow in Media. Reported by Google on 2026-01-18
CVE-2026-2648 CVE-2026-2649 CVE-2026-2650 https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_18.html 2026-02-18 2026-02-19
powerdns-recursor -- Denial of Service powerdns-recursor 5.3.5

PowerDNS Team reports:

2025-07: Internal logic flaw in cache management can lead to a denial of service in Recursor

2025-08: Insufficient validation of incoming notifies over TCP can lead to a denial of service in Recursor

2026-01: Crafted zones can lead to increased resource usage in Recursor

2026-01: This problem can be triggered by publishing and querying a crafted zone that causes large memory usage.

CVE-2025-59029 CVE-2025-59030 CVE-2026-24027 CVE-2026-0398 https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-07.html https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html 2025-12-08 2026-02-16
png -- CWE-122: Heap-based Buffer Overflow png 1.6.55

https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3 reports:

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.

CVE-2026-25646 https://cveawg.mitre.org/api/cve/CVE-2026-25646 2026-02-10 2026-02-16
traefik -- TCP readTimeout bypass via STARTTLS on Postgres traefik 3.6.8

The traefik project reports:

There is a potential vulnerability in Traefik managing STARTTLS requests. An unauthenticated client can bypass Traefik entrypoint respondingTimeouts.readTimeout by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinitely, leading to a denial of service

CVE-2026-25949 https://nvd.nist.gov/vuln/detail/CVE-2026-25949 2026-02-11 2026-02-14
munge -- CWE-787: Out-of-bounds Write munge 0.5.18

https://github.com/dun/munge/security/advisories/GHSA-r9cr-jf4v-75gh reports:

MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.

CVE-2026-25506 https://cveawg.mitre.org/api/cve/CVE-2026-25506 2026-02-10 2026-02-14
chromium -- security fix chromium 145.0.7632.75 ungoogled-chromium 145.0.7632.75

Chrome Releases reports:

This update includes 1 security fix:

  • [483569511] High CVE-2026-2441: Use after free in CSS. Reported by Shaheen Fazim on 2026-02-11
CVE-2026-2441 https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html 2026-02-13 2026-02-14
expat -- multiple vulnerabilities expat 2.7.4

expat team reports:

Update contains 2 security fixes:

  • CVE-2026-24515: NULL dereference in function XML_ExternalEntityParserCreate
  • CVE-2026-25210: missing check for integer overflow in function doContent
CVE-2026-24515 CVE-2026-25210 2026-01-31 2026-02-10
PostgreSQL -- Multiple vulnerabilities postgresql14-server 14.21 postgresql15-server 15.16 postgresql16-server 16.12 postgresql17-server 17.8 postgresql18-server 18.2 postgresql14-server 14.21

The PostgreSQL project reports:

Improper validation of type oidvector in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely.

Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.

Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.

Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database.

Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation.

CVE-2026-2003 CVE-2026-2004 CVE-2026-2005 CVE-2026-2006 CVE-2026-2007 https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/ 2026-02-12 2026-02-12
MongoDB Server -- CWE-704 Incorrect Type Conversion or Cast mongodb70 7.0.29

https://jira.mongodb.org/browse/SERVER-113685 reports:

An authorized user may disable the MongoDB server by issuing a query against a collection that contains an invalid compound wildcard index.

CVE-2026-25613 https://cveawg.mitre.org/api/cve/CVE-2026-25613 2026-02-10 2026-02-12
MongoDB Server -- CWE-617 Reachable Assertion mongodb80 8.0.13

https://jira.mongodb.org/browse/SERVER-99119 reports:

An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid index hints.

CVE-2026-25610 https://cveawg.mitre.org/api/cve/CVE-2026-25610 2026-02-10 2026-02-12
MongoDB Server -- Multiple vulnerabilities mongodb80 8.0.18

https://jira.mongodb.org/browse/SERVER-114126 reports:

Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Memory Crash.

https://jira.mongodb.org/browse/SERVER-102364 reports:

MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce deeply nested documents. The issue arises in recursive functions because the server does not periodically check the depth of the expression.

https://jira.mongodb.org/browse/SERVER-113532 reports:

Inserting certain large documents into a replica set could lead to replica set secondaries not being able to fetch the oplog from the primary. This could stall replication inside the replica set leading to server crash.

CVE-2026-1850 CVE-2026-1849 CVE-2026-1847 https://cveawg.mitre.org/api/cve/CVE-2026-1850 https://cveawg.mitre.org/api/cve/CVE-2026-1849 https://cveawg.mitre.org/api/cve/CVE-2026-1847 2026-02-10 2026-02-12
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.8.018.8.4 18.7.018.7.4 8.0.018.6.6

Gitlab reports:

Incomplete Validation issue in Web IDE impacts GitLab CE/EE

Denial of Service issue in GraphQL introspection impacts GitLab CE/EE

Denial of Service issue in JSON validation middleware impacts GitLab CE/EE

Cross-site Scripting issue in Code Flow impacts GitLab CE/EE

HTML Injection issue in test case titles impacts GitLab CE/EE

Denial of Service issue in Markdown processor impacts GitLab CE/EE

Denial of Service issue in Markdown Preview impacts GitLab CE/EE

Denial of Service issue in dashboard impacts GitLab EE

Server-Side Request Forgery issue in Virtual Registry impacts GitLab EE

Improper Validation issue in diff parser impacts GitLab CE/EE

Server-Side Request Forgery issue in Git repository import impacts GitLab CE/EE

Authorization Bypass issue in iterations API impacts GitLab EE

Missing Authorization issue in GLQL API impacts GitLab CE/EE

Stored HTML Injection issue in project label impacts GitLab CE/EE

Authorization Bypass issue in Pipeline Schedules API impacts GitLab CE/EE

CVE-2025-7659 CVE-2025-8099 CVE-2026-0958 CVE-2025-14560 CVE-2026-0595 CVE-2026-1458 CVE-2026-1456 CVE-2026-1387 CVE-2025-12575 CVE-2026-1094 CVE-2025-12073 CVE-2026-1080 CVE-2025-14592 CVE-2026-1282 CVE-2025-14594 https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released/ 2026-02-10 2026-02-11
FreeBSD -- blocklistd(8) socket leak FreeBSD 15.015.0_3

Problem Description:

Due to a programming error, blocklistd leaks a socket descriptor for each adverse event report it receives.

Once a certain number of leaked sockets is reached, blocklistd becomes unable to run the helper script: a child process is forked, but this child dereferences a null pointer and crashes before it is able to exec the helper. At this point, blocklistd still records adverse events but is unable to block new addresses or unblock addresses whose database entries have expired.

Once a second, much higher number of leaked sockets is reached, blocklistd becomes unable to receive new adverse event reports.

Impact:

An attacker may take advantage of this by triggering a large number of adverse events from sacrificial IP addresses to effectively disable blocklistd before launching an attack.

Even in the absence of attacks or probes by would-be attackers, adverse events will occur regularly in the course of normal operations, and blocklistd will gradually run out file descriptors and become ineffective.

The accumulation of open sockets may have knock-on effects on other parts of the system, resulting in a general slowdown until blocklistd is restarted.

CVE-2026-2261 SA-26:03.blocklistd 2026-02-10 2026-02-11
chromium -- multiple security fixes chromium 144.0.7559.132 ungoogled-chromium 144.0.7559.132

Chrome Releases reports:

This update includes 2 security fixes:

  • [478942410] High CVE-2026-1861: Heap buffer overflow in libvpx. Reported by Google on 2026-01-26
  • [479726070] High CVE-2026-1862: Type Confusion in V8. Reported by Chaoyuan Peng (@ret2happy) on 2026-01-29
CVE-2026-1861 CVE-2026-1862 https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop.html 2026-02-03 2026-02-09
Roundcube -- Multiple vulnerabilities roundcube-php82 roundcube-php83 roundcube-php84 roundcube-php85 1.6.13,1

The Roundcube project reports:

Unspecified CSS injection vulnerability.

Remote image blocking bypass via SVG content.

https://github.com/roundcube/roundcubemail/releases/tag/1.6.13 2026-02-08 2026-02-08
qt6-webengine -- multiple vulnerabilities qt6-pdf qt6-webengine 6.10.2

Qt qtwebengine-chromium repo reports:

Backports for 7 security bugs in Chromium:

  • CVE-2025-13638: Prevent media element GC in callbacks in WebMediaPlayerMS
  • CVE-2025-13639: Improve validation of SDP direction in remote description
  • CVE-2025-13720: Avoid downcasting Hash and Integrity reports
  • CVE-2025-14174: Metal: Don't use pixelsDepthPitch to size buffers
  • CVE-2025-14765: Polyfill unary negation and abs for amd mesa frontend
  • CVE-2026-0908: Use CheckedNumerics in HandleAllocator
  • CVE-2026-1504: Block opaque 416 responses to non-range requests
CVE-2025-13638 CVE-2025-13639 CVE-2025-13720 CVE-2025-14174 CVE-2025-14765 CVE-2026-0908 CVE-2026-1504 https://code.qt.io/cgit/qt/qtwebengine-chromium.git/log/?h=134-based 2026-02-02 2026-02-08
navidrome -- multiple vulnerabilities navidrome 0.60.0

An XSS vulnerability in the frontend allows a malicious attacker to inject code through the comment metadata of a song to exfiltrate user credentials.

Authenticated users can crash the Navidrome server by supplying an excessively large size parameter to /rest/getCoverArt or to a shared-image URL (/share/img/{token}). When processing such requests, the server attempts to create an extremely large resized image, causing uncontrolled memory growth. This triggers the Linux OOM killer, terminates the Navidrome process, and results in a full service outage.

CVE-2026-25578 https://github.com/navidrome/navidrome/security/advisories/GHSA-rh3r-8pxm-hg4w CVE-2026-25579 https://github.com/navidrome/navidrome/security/advisories/GHSA-hrr4-3wgr-68x3 2026-02-03 2026-02-07
traefik -- ACME TLS-ALPN fast path potential DoS traefik 3.6.7

The traefik project reports:

There is a potential vulnerability in Traefik ACME TLS certificates' automatic generation: the ACME TLS-ALPN fast path can allow unauthenticated clients to tie up goroutines and file descriptors indefinitely when the ACME TLS challenge is enabled.A malicious client can open many connections, send a minimal ClientHello with acme-tls/1, then stop responding, leading to denial of service of the entrypoint.

CVE-2026-22045 https://nvd.nist.gov/vuln/detail/CVE-2026-22045 2026-01-15 2026-02-07
python -- several security vulnerabilities python310 3.10.19_2 python311 3.11.14_2 python312 3.12.12_4 python313 3.13.12 python313t 3.13.12 python314 3.14.3

The Python project announces a new release with several security fixes:

  • CVE-2026-1299: gh-144125: BytesGenerator will now refuse to serialize (write) headers that are unsafely folded or delimited; see verify_generated_headers. (Contributed by Bas Bloemsaat and Petr Viktorin in gh-121650).
  • gh-143935: Fixed a bug in the folding of comments when flattening an email message using a modern email policy. Comments consisting of a very long sequence of non-foldable characters could trigger a forced line wrap that omitted the required leading space on the continuation line, causing the remainder of the comment to be interpreted as a new header field. This enabled header injection with carefully crafted inputs.
  • gh-143925: Reject control characters in data: URL media types.
  • gh-143919: Reject control characters in http.cookies.Morsel fields and values.
  • CVE-2026-0865: gh-143916: Reject C0 control characters within wsgiref.headers.Headers fields, values, and parameters.
CVE-2026-1299 CVE-2026-0865 https://docs.python.org/release/3.14.3/whatsnew/changelog.html 2026-01-16 2026-02-04 2026-03-03
xrdp -- remote code execution xrdp 0.10.5

Denis Skvortsov, Security Researcher at Kaspersky reports:

xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system.

CVE-2025-68670 https://www.cve.org/CVERecord?id=CVE-2025-68670 2025-12-06 2026-01-27
zeek -- potential DoS vulnerability zeek 8.0.6

Tim Wojtulewicz of Corelight reports:

Zeek's HTTP analyzer can be tricked into interpreting Transfer-Encoding or Content-Length headers set in MIME entities within HTTP bodies and change the analyzer behavior.

https://github.com/zeek/zeek/releases/tag/v8.0.6 2026-01-29 2026-01-29
chromium -- security fix chromium 144.0.7559.109 ungoogled-chromium 144.0.7559.109

Chrome Releases reports:

This update includes 1 security fix:

  • [474435504] High CVE-2026-1504: Inappropriate implementation in Background Fetch API. Reported by Luan Herrera (@lbherrera_) on 2026-01-09
CVE-2026-1504 https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_27.html 2026-01-27 2026-01-28
Firefox -- Multiple vulnerabilities firefox 147.0.2,2

https://bugzilla.mozilla.org/show_bug.cgi?id=2007302 reports:

Mitigation bypass in the Privacy: Anti-Tracking component.

Use-after-free in the Layout: Scrolling and Overflow component.

CVE-2026-24868 https://cveawg.mitre.org/api/cve/CVE-2026-24868 CVE-2026-24869 https://cveawg.mitre.org/api/cve/CVE-2026-24869 2026-01-27 2026-01-28
FreeBSD -- Jail escape by a privileged user via nullfs FreeBSD-kernel 14.314.3_8 13.513.5_9

Problem Description:

By default, jailed processes cannot mount filesystems, including nullfs(4). However, the allow.mount.nullfs option enables mounting nullfs filesystems, subject to privilege checks.

If a privileged user within a jail is able to nullfs-mount directories, a limitation of the kernel's path lookup logic allows that user to escape the jail's chroot, yielding access to the full filesystem of the host or parent jail.

Impact:

In a jail configured to allow nullfs(4) mounts from within the jail, the jailed root user can escape the jail's filesystem root.

CVE-2025-15547 SA-26:02.jail 2026-01-27 2026-01-28
OpenSSL -- Multiple vulnerabilities FreeBSD 15.015.0_2 14.314.3_8 13.513.5_9 openssl 3.0.19,1 openssl33 3.3.6 openssl34 3.4.4 openssl35 3.5.5 openssl36 3.6.1 openssl 3.0.19

The OpenSSL project reports:

  • Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (CVE-2025-11187)
  • Stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467)
  • NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (CVE-2025-15468)
  • "openssl dgst" one-shot codepath silently truncates inputs >16MB (CVE-2025-15469)
  • TLS 1.3 CompressedCertificate excessive memory allocation (CVE-2025-66199)
  • Heap out-of-bounds write in BIO_f_linebuffer on short writes (CVE-2025-68160)
  • Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (CVE-2025-69418)
  • Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (CVE-2025-69419)
  • Missing ASN1_TYPE validation in TS_RESP_verify_response() function (CVE-2025-69420)
  • NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (CVE-2025-69421)
  • Missing ASN1_TYPE validation in PKCS#12 parsing (CVE-2026-22795)
  • ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (CVE-2026-22796)
CVE-2025-11187 CVE-2025-15467 CVE-2025-15468 CVE-2025-15469 CVE-2025-66199 CVE-2025-68160 CVE-2025-69418 CVE-2025-69419 CVE-2025-69420 CVE-2025-69421 CVE-2026-22795 CVE-2026-22796 https://openssl-library.org/news/secadv/20260127.txt SA-26:01.openssl 2026-01-27 2026-01-27 2026-01-28
MySQL -- Multiple vulnerabilities mysql80-server 8.0.45 mysql84-server 8.4.8 mysql91-server 9.1.3 mysql94-server 9.4.3

Oracle reports:

Oracle reports multiple vulnerabilities in its MySQL server products.

CVE-2026-21949 CVE-2026-21950 CVE-2026-21968 CVE-2026-21929 CVE-2026-21936 CVE-2026-21937 CVE-2026-21941 CVE-2026-21948 CVE-2026-21952 CVE-2026-21964 CVE-2026-21965 https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL 2026-01-20 2026-01-24
wheel -- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') py310-wheel py311-wheel py312-wheel py313-wheel py313t-wheel py314-wheel 0.46.2

https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx reports:

wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.46.1 and below, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.

CVE-2026-24049 https://cveawg.mitre.org/api/cve/CVE-2026-24049 2026-01-22 2026-01-22
chromium -- multiple security fixes chromium 144.0.7559.96 ungoogled-chromium 144.0.7559.96

Chrome Releases reports:

This update includes 1 security fix:

  • [473851441] High CVE-2026-1220: Race in V8. Reported by @p1nky4745 on 2026-01-07
CVE-2026-1220 https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_20.html 2026-01-20 2026-01-22
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.8.018.8.2 18.7.018.7.2 11.9.018.6.4

Gitlab reports:

Denial of Service issue in Jira Connect integration impacts GitLab CE/EE

Incorrect Authorization issue in Releases API impacts GitLab CE/EE

Unchecked Return Value issue in authentication services impacts GitLab CE/EE

Infinite Loop issue in Wiki redirects impacts GitLab CE/EE

Denial of Service issue in API endpoint impacts GitLab CE/EE

CVE-2025-13927 CVE-2025-13928 CVE-2026-0723 CVE-2025-13335 CVE-2026-1102 https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/ 2026-01-21 2026-01-21
mail/mailpit -- multiple vulnerabilities mailpit 1.28.3

Mailpit author reports:

Ensure SMTP TO & FROM addresses are RFC 5322 compliant and prevent header injection (GHSA-54wq-72mp-cq7c)

Prevent Server-Side Request Forgery (SSRF) via HTML Check API (GHSA-6jxm-fv7w-rw5j)

CVE-2026-23829 https://github.com/axllent/mailpit/security/advisories/GHSA-54wq-72mp-cq7c CVE-2026-23845 https://github.com/axllent/mailpit/security/advisories/GHSA-6jxm-fv7w-rw5j 2026-01-18 2026-01-19
oauth2-proxy -- multiple vulnerabilities oauth2-proxy 7.14.1

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

A flaw was found in the crypto/x509 package in the Go standard library. This vulnerability allows a certificate validation bypass via an excluded subdomain constraint in a certificated chain as it does not restrict the usage of wildcard SANs in the leaf certificate.

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

CVE-2025-61729 CVE-2025-61727 CVE-2025-47914 CVE-2025-58181 2026-01-16 2026-01-18
Mozilla -- multiple vulnerabilities firefox 147.0.0,2 thunderbird 147.0.0

Memory safety bugs present in Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Denial-of-service in the DOM: Service Workers component.

Information disclosure in the XML component.

Sandbox escape in the Messaging System component.

CVE-2026-0892 CVE-2026-0889 CVE-2026-0888 CVE-2026-0881 2026-01-13 2026-01-15
Mozilla -- multiple vulnerabilities firefox 147.0.0,2 firefox-esr 140.7.0 thunderbird 147

Memory safety bugs present in firefox-esr 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146.

Spoofing issue in the DOM: Copy & Paste and Drag & Drop component.

Clickjacking issue and information disclosure in the PDF Viewer component.

Use-after-free in the JavaScript: GC component.

Use-after-free in the JavaScript Engine component.

Information disclosure in the Networking component.

Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component.

CVE-2026-0891 CVE-2026-0890 CVE-2026-0887 CVE-2026-0885 CVE-2026-0884 CVE-2026-0883 CVE-2026-0878 2026-01-13 2026-01-15
Mozilla -- multiple vulnerabilities firefox 147.0.0,2 firefox-esr 140.7 thunderbird 147.0.0

Incorrect boundary conditions in the Graphics component.

Use-after-free in the IPC component.

Sandbox escape due to integer overflow in the Graphics component.

Sandbox escape due to incorrect boundary conditions in the Graphics component.

Mitigation bypass in the DOM: Security component.

CVE-2026-0886 CVE-2026-0882 CVE-2026-0880 CVE-2026-0879 CVE-2026-0877 2026-01-13 2026-01-15
chromium -- multiple security fixes chromium 144.0.7559.59 ungoogled-chromium 144.0.7559.59

Chrome Releases reports:

This update includes 10 security fixes:

  • [458914193] High CVE-2026-0899: Out of bounds memory access in V8. Reported by @p1nky4745 on 2025-11-08
  • [465730465] High CVE-2026-0900: Inappropriate implementation in V8. Reported by Google on 2025-12-03
  • [40057499] High CVE-2026-0901: Inappropriate implementation in Blink. Reported by Irvan Kurniawan (sourc7) on 2021-10-04
  • [469143679] Medium CVE-2026-0902: Inappropriate implementation in V8. Reported by 303f06e3 on 2025-12-16
  • [444803530] Medium CVE-2026-0903: Insufficient validation of untrusted input in Downloads. Reported by Azur on 2025-09-13
  • [452209495] Medium CVE-2026-0904: Incorrect security UI in Digital Credentials. Reported by Hafiizh on 2025-10-15
  • [465466773] Medium CVE-2026-0905: Insufficient policy enforcement in Network. Reported by Google on 2025-12-02
  • [467448811] Low CVE-2026-0906: Incorrect security UI. Reported by Khalil Zhani on 2025-12-10
  • [444653104] Low CVE-2026-0907: Incorrect security UI in Split View. Reported by Hafiizh on 2025-09-12
  • [452209503] Low CVE-2026-0908: Use after free in ANGLE. Reported by Glitchers BoB 14th. on 2025-10-15
CVE-2026-0899 CVE-2026-0900 CVE-2026-0901 CVE-2026-0902 CVE-2026-0903 CVE-2026-0904 CVE-2026-0905 CVE-2026-0906 CVE-2026-0907 CVE-2026-0908 https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html 2026-01-13 2026-01-15
virtualenv -- CWE-59: Improper Link Resolution Before File Access ('Link Following') py310-virtualenv py311-virtualenv py312-virtualenv py313-virtualenv py313t-virtualenv py314-virtualenv 20.36.1

https://github.com/pypa/virtualenv/security/advisories/GHSA-597g-3phw-6986 reports:

virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in virtualenv allow local attackers to perform symlink-based attacks on directory creation operations. An attacker with local access can exploit a race condition between directory existence checks and creation to redirect virtualenv's app_data and lock file operations to attacker-controlled locations. This issue has been patched in version 20.36.1.

CVE-2026-22702 https://cveawg.mitre.org/api/cve/CVE-2026-22702 2026-01-10 2026-01-12
libtasn1 -- Stack-based buffer overflow libtasn1 4.21.0

oss-security@ list reports:

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 2026-01-07 2026-01-11
Gitlab -- vulnerabilities gitlab-ce gitlab-ee 18.7.018.7.1 18.6.018.6.3 8.3.018.5.5

Gitlab reports:

Stored Cross-site Scripting issue in GitLab Flavored Markdown placeholders impacts GitLab CE/EE

Cross-site Scripting issue in Web IDE impacts GitLab CE/EE

Missing Authorization issue in Duo Workflows API impacts GitLab EE

Missing Authorization issue in AI GraphQL mutation impacts GitLab EE

Denial of Service issue in import functionality impacts GitLab CE/EE

Insufficient Access Control Granularity issue in GraphQL runnerUpdate mutation impacts GitLab CE/EE

Information Disclosure issue in Mermaid diagram rendering impacts GitLab CE/EE

CVE-2025-9222 CVE-2025-13761 CVE-2025-13772 CVE-2025-13781 CVE-2025-10569 CVE-2025-11246 CVE-2025-3950 https://about.gitlab.com/releases/2026/01/07/patch-release-gitlab-18-7-1-released/ 2026-01-07 2026-01-11
mail/mailpit -- Cross-Site WebSocket Hijacking mailpit 1.28.2

Mailpit author reports:

The Mailpit WebSocket server is configured to accept connections from any origin. This lack of Origin header validation introduces a Cross-Site WebSocket Hijacking (CSWSH) vulnerability.

An attacker can host a malicious website that, when visited by a developer running Mailpit locally, establishes a WebSocket connection to the victim's Mailpit instance (default ws://localhost:8025). This allows the attacker to intercept sensitive data such as email contents, headers, and server statistics in real-time.

CVE-2026-22689 https://github.com/axllent/mailpit/security/advisories/GHSA-524m-q5m7-79mm 2026-01-10 2026-01-10
phpmyfaq -- multiple vulnerabilities phpmyfaq-php82 phpmyfaq-php83 phpmyfaq-php84 phpmyfaq-php85 4.0.16

phpMyFAQ team reports:

Stored cross-site scripting (XSS) and unauthenticated config backup download vulnerability

https://www.phpmyfaq.de/security/advisory-2025-12-29/ 2025-12-29 2026-01-10
chromium -- multiple security fixes chromium 143.0.7499.192 ungoogled-chromium 143.0.7499.192

Chrome Releases reports:

This update includes 1 security fix:

  • [463155954] High CVE-2026-0628: Insufficient policy enforcement in WebView tag. Reported by Gal Weizman on 2025-11-23
CVE-2026-0628 https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop.html 2026-01-06 2026-01-07
security/libsodium -- crypto_core_ed25519_is_valid_point mishandles checks for whether an elliptic curve point is valid libsodium 1.0.21

Libsodium maintainer reports:

The function crypto_core_ed25519_is_valid_point(), a low-level function used to check if a given elliptic curve point is valid, was supposed to reject points that aren't in the main cryptographic group, but some points were slipping through.

CVE-2025-69277 https://00f.net/2025/12/30/libsodium-vulnerability/ 2025-12-30 2026-01-07
mail/mailpit -- Server-Side Request Forgery mailpit 1.28.1

Mailpit author reports:

A Server-Side Request Forgery (SSRF) vulnerability exists in Mailpit's /proxy endpoint that allows attackers to make requests to internal network resources.

The /proxy endpoint allows requests to internal network resources. While it validates http:// and https:// schemes, it does not block internal IP addresses, allowing attackers to access internal services and APIs.

CVE-2026-21859 https://github.com/axllent/mailpit/security/advisories/GHSA-8v65-47jx-7mfr 2026-01-06 2026-01-06
net-mgmt/net-snmp -- Remote Code Execution (snmptrapd) net-snmp 5.9.5

net-snmp development team reports:

A specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash.

CVE-2025-68615 https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq 2025-12-23 2026-01-06
gstreamer1-plugins-bad -- Out-of-bounds reads in MIDI parser gstreamer1-plugins-bad 1.26.10

The GStreamer Security Center reports:

Multiple out-of-bounds reads in the MIDI parser that can cause crashes for certain input files.

CVE-2025-67326 CVE-2025-67327 https://gstreamer.freedesktop.org/security/sa-2025-0009.html 2025-12-27 2026-01-04