8

CVSS3.1

CVE-2026-22029 - React Router vulnerable to XSS via Open Redirects

React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs…

πŸ“… Published: Jan. 10, 2026, 2:42 a.m. πŸ”„ Last Modified: Jan. 12, 2026, 6:10 p.m.

8.2

CVSS3.1

CVE-2026-21884 - React Router SSR XSS in ScrollRestoration

React Router is a router for React. In @remix-run/react version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, a XSS vulnerability exists in in React Router's <ScrollRestoration> API in Framework Mode when using the getKey/storageKey props during Server-Side Rendering which could allow arb…

πŸ“… Published: Jan. 10, 2026, 2:41 a.m. πŸ”„ Last Modified: Jan. 12, 2026, 6:11 p.m.

9.1

CVSS3.1

CVE-2025-61686 - React Router has Path Traversal in File Session Storage

React Router is a router for React. In @react-router/node versions 7.0.0 through 7.9.3, @remix-run/deno prior to version 2.17.2, and @remix-run/node prior to version 2.17.2, if createFileSessionStorage() is being used from @react-router/node (or @remix-run/node/@remix-run/deno in Remix v2) with an …

πŸ“… Published: Jan. 10, 2026, 2:41 a.m. πŸ”„ Last Modified: Jan. 10, 2026, 3:15 a.m.

7.6

CVSS3.1

CVE-2025-59057 - React Router has XSS Vulnerability

React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. and react-router versions 7.0.0 through 7.8.2, a XSS vulnerability exists in in React Router's meta()/<Meta> APIs in Framework Mode when generating script:ld+json tags which could allow arbitrary JavaScript exec…

πŸ“… Published: Jan. 10, 2026, 2:40 a.m. πŸ”„ Last Modified: Jan. 12, 2026, 6:12 p.m.

6.5

CVSS3.1

CVE-2025-68470 - React Router has unexpected external redirect via untrusted paths

React Router is a router for React. In versions 6.0.0 through 6.30.1 and 7.0.0 through 7.9.5, an attacker-supplied path can be crafted so that when a React Router application navigates to it via navigate(), <Link>, or redirect(), the app performs a navigation/redirect to an external URL. This is on…

πŸ“… Published: Jan. 10, 2026, 2:39 a.m. πŸ”„ Last Modified: Jan. 12, 2026, 6:17 p.m.

8.9

CVSS4.0

CVE-2026-22612 - Fickling vulnerable to detection bypass due to "builtins" blindness

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, Fickling is vulnerable to detection bypass due to "builtins" blindness. This issue has been patched in version 0.1.7.

πŸ“… Published: Jan. 10, 2026, 1:35 a.m. πŸ”„ Last Modified: Jan. 12, 2026, 6:18 p.m.

8.9

CVSS4.0

CVE-2026-22609 - Fickling has Static Analysis Bypass via Incomplete Dangerous Module Blocklist

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, the unsafe_imports() method in Fickling's static analyzer fails to flag several high-risk Python modules that can be used for arbitrary code execution. Malicious pickles importing these modules will not be detecte…

πŸ“… Published: Jan. 10, 2026, 1:35 a.m. πŸ”„ Last Modified: Jan. 10, 2026, 1:35 a.m.

8.9

CVSS4.0

CVE-2026-22608 - Fickling vulnerable to use of ctypes and pydoc gadget chain to bypass detection

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, both ctypes and pydoc modules aren't explicitly blocked. Even other existing pickle scanning tools (like picklescan) do not block pydoc.locate. Chaining these two together can achieve RCE while the scanner still r…

πŸ“… Published: Jan. 10, 2026, 1:35 a.m. πŸ”„ Last Modified: Jan. 10, 2026, 1:35 a.m.

8.9

CVSS4.0

CVE-2026-22607 - Fickling Blocklist Bypass: cProfile.run()

Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python's cProfile module as unsafe. Because of this, a malicious pickle that uses cProfile.run() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a user relies on Fickl…

πŸ“… Published: Jan. 10, 2026, 1:35 a.m. πŸ”„ Last Modified: Jan. 10, 2026, 1:35 a.m.

8.9

CVSS4.0

CVE-2026-22606 - Fickling has a bypass via runpy.run_path() and runpy.run_module()

Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python’s runpy module as unsafe. Because of this, a malicious pickle that uses runpy.run_path() or runpy.run_module() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a…

πŸ“… Published: Jan. 10, 2026, 1:35 a.m. πŸ”„ Last Modified: Jan. 10, 2026, 1:35 a.m.
Total resulsts: 327160
Page 22 of 32,716
Β« previous page Β» next page
Filters