[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-UBUNTU-CVE-2026-26079":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T15:11:42.125Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":16,"duplicates":17,"related":18,"reserved_at":9,"published_at":19,"modified_at":20,"state":9,"summary":21,"references_raw":23,"kevs":70,"epss":9,"epss_history":71,"metrics":72,"affected":79},"UBUNTU-CVE-2026-26079","Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13 allows Cascading Style Sheets (CSS) injection, e.g., because comments are mishandled.",null,[],[],[],[14],{"_key":15},"CVE-2026-26079",[],[],[],"2026-02-11T05:16:00Z","2026-03-30T17:59:43.432529Z",{"cisa_kev":22,"cisa_ransomware":22,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[24,30,34,38,42,46,50,54,58,62,66],{"url":25,"sources":26,"tags":28},"https://ubuntu.com/security/CVE-2026-26079",[27],"osv_ubuntu",[29],"REPORT",{"url":31,"sources":32,"tags":33},"https://www.cve.org/CVERecord?id=CVE-2026-26079",[27],[29],{"url":35,"sources":36,"tags":37},"https://github.com/roundcube/roundcubemail/commit/1f4c3a5af5033747f9685a8a395dbd8228d19816",[27],[29],{"url":39,"sources":40,"tags":41},"https://github.com/roundcube/roundcubemail/commit/2b5625f1d2ef7e050fd1ae481b2a52dc35466447",[27],[29],{"url":43,"sources":44,"tags":45},"https://github.com/roundcube/roundcubemail/commit/53d75d5dfebef235a344d476b900c20c12d52b01",[27],[29],{"url":47,"sources":48,"tags":49},"https://github.com/roundcube/roundcubemail/commit/5a3315cce587e0be58335d11ff9a5571c90494a5",[27],[29],{"url":51,"sources":52,"tags":53},"https://github.com/roundcube/roundcubemail/commit/bf89cbaa5897d8ad62e8057d9a3f6babb90b7954",[27],[29],{"url":55,"sources":56,"tags":57},"https://github.com/roundcube/roundcubemail/commit/c15f5dbf093a497e19a749b20e7f8fb5a9c24cde",[27],[29],{"url":59,"sources":60,"tags":61},"https://github.com/roundcube/roundcubemail/releases/tag/1.5.13",[27],[29],{"url":63,"sources":64,"tags":65},"https://github.com/roundcube/roundcubemail/releases/tag/1.6.13",[27],[29],{"url":67,"sources":68,"tags":69},"https://roundcube.net/news/2026/02/08/security-updates-1.6.13-and-1.5.13",[27],[29],[],[],[73],{"source":27,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":74,"cvss_v4_0":9},{"baseScore":75,"baseSeverity":9,"vectorString":76,"impactScore":77,"exploitabilityScore":78},4.7,"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",2.3,7.2,[80],{"ecosystem":81,"name":82,"vendor":83,"product":82,"cpe_part":9,"purl_type":84,"purl_namespace":83,"purl_name":82,"source":9,"versions":85},"Ubuntu","roundcube","ubuntu","deb",[86,90],{"version":87,"is_range":88,"range_type":89,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"all",true,"ecosystem",{"version":87,"is_range":88,"range_type":89,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9}]