Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Group: operating-systems Clear
ID Title
CVE-2026-43284 Vulnerability in linux (CVE-2026-43284)
vulnerability in linux (CVE-2026-43284). Successful exploitation can lead to full system takeover.
CVE-2026-8018 Vulnerability in google (CVE-2026-8018)
vulnerability in google (CVE-2026-8018). Successful exploitation can lead to full system takeover.
CVE-2026-7916 Vulnerability in google (CVE-2026-7916)
vulnerability in google (CVE-2026-7916). Successful exploitation can lead to full system takeover.
CVE-2026-43283 Vulnerability in linux (CVE-2026-43283)
vulnerability in linux (CVE-2026-43283). Successful exploitation can lead to full system takeover.
CVE-2026-43281 Out-of-Bounds Read in linux (CVE-2026-43281)
vulnerability in linux (CVE-2026-43281). Confidential information can be exposed externally. Exploitable via ``fw_xlate``.
CVE-2026-43280 Out-of-Bounds Read in linux (CVE-2026-43280)
vulnerability in linux (CVE-2026-43280). Confidential information can be exposed externally.
CVE-2026-43279 Out-of-Bounds Write in linux (CVE-2026-43279)
out-of-bounds write in linux (CVE-2026-43279). Successful exploitation can lead to full system takeover.
CVE-2026-43278 Vulnerability in linux (CVE-2026-43278)
vulnerability in linux (CVE-2026-43278). Successful exploitation can lead to full system takeover.
CVE-2026-43276 Vulnerability in linux (CVE-2026-43276)
vulnerability in linux (CVE-2026-43276). Successful exploitation can lead to full system takeover.
CVE-2026-43274 Out-of-Bounds Read in linux (CVE-2026-43274)
vulnerability in linux (CVE-2026-43274). Successful exploitation can lead to full system takeover.
CVE-2026-43263 Vulnerability in linux (CVE-2026-43263)
vulnerability in linux (CVE-2026-43263). Successful exploitation can lead to full system takeover.
CVE-2026-43260 Vulnerability in linux (CVE-2026-43260)
vulnerability in linux (CVE-2026-43260). Successful exploitation can lead to full system takeover.
CVE-2026-43230 Vulnerability in linux (CVE-2026-43230)
vulnerability in linux (CVE-2026-43230). Risk of unauthorized operations or information disclosure.
CVE-2026-43226 Vulnerability in linux (CVE-2026-43226)
vulnerability in linux (CVE-2026-43226). Risk of unauthorized operations or information disclosure.
CVE-2026-43222 Vulnerability in linux (CVE-2026-43222)
vulnerability in linux (CVE-2026-43222). Successful exploitation can lead to full system takeover.
CVE-2026-43133 Vulnerability in linux (CVE-2026-43133)
vulnerability in linux (CVE-2026-43133). Risk of unauthorized operations or information disclosure.
CVE-2026-43128 Vulnerability in linux (CVE-2026-43128)
vulnerability in linux (CVE-2026-43128). Successful exploitation can lead to full system takeover.
CVE-2026-43126 Vulnerability in linux (CVE-2026-43126)
vulnerability in linux (CVE-2026-43126). Successful exploitation can lead to full system takeover.
CVE-2026-43116 Vulnerability in linux (CVE-2026-43116)
vulnerability in linux (CVE-2026-43116). Successful exploitation can lead to full system takeover.
CVE-2026-43113 Vulnerability in linux (CVE-2026-43113)
vulnerability in linux (CVE-2026-43113). Successful exploitation can lead to full system takeover.
CVE-2026-43112 Out-of-Bounds Read in linux (CVE-2026-43112)
vulnerability in linux (CVE-2026-43112). Successful exploitation can lead to full system takeover.
CVE-2026-43111 Use-After-Free in linux (CVE-2026-43111)
vulnerability in linux (CVE-2026-43111). Successful exploitation can lead to full system takeover.
CVE-2026-43110 Vulnerability in linux (CVE-2026-43110)
vulnerability in linux (CVE-2026-43110). Successful exploitation can lead to full system takeover.
CVE-2026-43047 Out-of-Bounds Write in linux (CVE-2026-43047)
out-of-bounds write in linux (CVE-2026-43047). Successful exploitation can lead to full system takeover.
CVE-2026-43044 Vulnerability in linux (CVE-2026-43044)
vulnerability in linux (CVE-2026-43044). Successful exploitation can lead to full system takeover.
CVE-2026-43042 Out-of-Bounds Read in linux (CVE-2026-43042)
vulnerability in linux (CVE-2026-43042). Confidential information can be exposed externally.
CVE-2026-43040 Vulnerability in linux (CVE-2026-43040)
vulnerability in linux (CVE-2026-43040). Confidential information can be exposed externally.
CVE-2026-43033 Vulnerability in linux (CVE-2026-43033)
vulnerability in linux (CVE-2026-43033). Successful exploitation can lead to full system takeover.
CVE-2026-43027 Use-After-Free in linux (CVE-2026-43027)
vulnerability in linux (CVE-2026-43027). Successful exploitation can lead to full system takeover.
CVE-2026-43028 Vulnerability in c (CVE-2026-43028)
vulnerability in c (CVE-2026-43028). Confidential information can be exposed externally.
CVE-2026-43029 Vulnerability in c (CVE-2026-43029)
vulnerability in c (CVE-2026-43029). Risk of unauthorized operations or information disclosure.
CVE-2026-43030 Vulnerability in linux (CVE-2026-43030)
vulnerability in linux (CVE-2026-43030). Successful exploitation can lead to full system takeover.
CVE-2026-43031 Vulnerability in linux (CVE-2026-43031)
vulnerability in linux (CVE-2026-43031). Risk of unauthorized operations or information disclosure.
CVE-2026-43019 Use-After-Free in linux (CVE-2026-43019)
vulnerability in linux (CVE-2026-43019). Successful exploitation can lead to full system takeover.
CVE-2026-43020 Out-of-Bounds Write in linux (CVE-2026-43020)
out-of-bounds write in linux (CVE-2026-43020). Successful exploitation can lead to full system takeover.
CVE-2026-43023 Vulnerability in linux (CVE-2026-43023)
vulnerability in linux (CVE-2026-43023). Successful exploitation can lead to full system takeover.
CVE-2026-43025 Out-of-Bounds Read in linux (CVE-2026-43025)
vulnerability in linux (CVE-2026-43025). Confidential information can be exposed externally.
CVE-2026-43018 Use-After-Free in linux (CVE-2026-43018)
vulnerability in linux (CVE-2026-43018). Successful exploitation can lead to full system takeover.
CVE-2026-31761 Vulnerability in linux (CVE-2026-31761)
vulnerability in linux (CVE-2026-31761). Successful exploitation can lead to full system takeover.
CVE-2026-31764 Vulnerability in linux (CVE-2026-31764)
vulnerability in linux (CVE-2026-31764). Successful exploitation can lead to full system takeover.
CVE-2026-31759 Vulnerability in linux (CVE-2026-31759)
vulnerability in linux (CVE-2026-31759). Successful exploitation can lead to full system takeover.
CVE-2026-31758 Use-After-Free in linux (CVE-2026-31758)
vulnerability in linux (CVE-2026-31758). Successful exploitation can lead to full system takeover.
CVE-2026-31731 Use-After-Free in linux (CVE-2026-31731)
vulnerability in linux (CVE-2026-31731). Successful exploitation can lead to full system takeover.
CVE-2026-31730 Vulnerability in linux (CVE-2026-31730)
vulnerability in linux (CVE-2026-31730). Successful exploitation can lead to full system takeover.
CVE-2026-31431 KEV [KEV] Vulnerability in Linux redhat (CVE-2026-31431)
vulnerability in Linux redhat (CVE-2026-31431). Successful exploitation can lead to full system takeover. Listed in CISA KEV — actively exploited.
CVE-2026-32202 KEV [KEV] Vulnerability in Microsoft windows (CVE-2026-32202)
vulnerability in Microsoft windows (CVE-2026-32202). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
CVE-2026-33825 KEV [KEV] Vulnerability in Microsoft defender (CVE-2026-33825)
vulnerability in Microsoft defender (CVE-2026-33825). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
CVE-2009-0238 KEV [KEV] Code Injection in Microsoft office (CVE-2009-0238)
code injection in Microsoft office (CVE-2009-0238). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
CVE-2025-60710 KEV [KEV] Vulnerability in Microsoft windows (CVE-2025-60710)
vulnerability in Microsoft windows (CVE-2025-60710). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
CVE-2023-36424 KEV [KEV] Out-of-Bounds Read in Microsoft windows (CVE-2023-36424)
vulnerability in Microsoft windows (CVE-2023-36424). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →