Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-43284 |
|
Vulnerability in linux (CVE-2026-43284)
vulnerability in linux (CVE-2026-43284). Successful exploitation can lead to full system takeover.
|
| CVE-2026-8018 |
|
Vulnerability in google (CVE-2026-8018)
vulnerability in google (CVE-2026-8018). Successful exploitation can lead to full system takeover.
|
| CVE-2026-7916 |
|
Vulnerability in google (CVE-2026-7916)
vulnerability in google (CVE-2026-7916). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43283 |
|
Vulnerability in linux (CVE-2026-43283)
vulnerability in linux (CVE-2026-43283). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43281 |
|
Out-of-Bounds Read in linux (CVE-2026-43281)
vulnerability in linux (CVE-2026-43281). Confidential information can be exposed externally. Exploitable via ``fw_xlate``.
|
| CVE-2026-43280 |
|
Out-of-Bounds Read in linux (CVE-2026-43280)
vulnerability in linux (CVE-2026-43280). Confidential information can be exposed externally.
|
| CVE-2026-43279 |
|
Out-of-Bounds Write in linux (CVE-2026-43279)
out-of-bounds write in linux (CVE-2026-43279). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43278 |
|
Vulnerability in linux (CVE-2026-43278)
vulnerability in linux (CVE-2026-43278). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43276 |
|
Vulnerability in linux (CVE-2026-43276)
vulnerability in linux (CVE-2026-43276). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43274 |
|
Out-of-Bounds Read in linux (CVE-2026-43274)
vulnerability in linux (CVE-2026-43274). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43263 |
|
Vulnerability in linux (CVE-2026-43263)
vulnerability in linux (CVE-2026-43263). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43260 |
|
Vulnerability in linux (CVE-2026-43260)
vulnerability in linux (CVE-2026-43260). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43230 |
|
Vulnerability in linux (CVE-2026-43230)
vulnerability in linux (CVE-2026-43230). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43226 |
|
Vulnerability in linux (CVE-2026-43226)
vulnerability in linux (CVE-2026-43226). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43222 |
|
Vulnerability in linux (CVE-2026-43222)
vulnerability in linux (CVE-2026-43222). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43133 |
|
Vulnerability in linux (CVE-2026-43133)
vulnerability in linux (CVE-2026-43133). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43128 |
|
Vulnerability in linux (CVE-2026-43128)
vulnerability in linux (CVE-2026-43128). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43126 |
|
Vulnerability in linux (CVE-2026-43126)
vulnerability in linux (CVE-2026-43126). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43116 |
|
Vulnerability in linux (CVE-2026-43116)
vulnerability in linux (CVE-2026-43116). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43113 |
|
Vulnerability in linux (CVE-2026-43113)
vulnerability in linux (CVE-2026-43113). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43112 |
|
Out-of-Bounds Read in linux (CVE-2026-43112)
vulnerability in linux (CVE-2026-43112). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43111 |
|
Use-After-Free in linux (CVE-2026-43111)
vulnerability in linux (CVE-2026-43111). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43110 |
|
Vulnerability in linux (CVE-2026-43110)
vulnerability in linux (CVE-2026-43110). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43047 |
|
Out-of-Bounds Write in linux (CVE-2026-43047)
out-of-bounds write in linux (CVE-2026-43047). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43044 |
|
Vulnerability in linux (CVE-2026-43044)
vulnerability in linux (CVE-2026-43044). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43042 |
|
Out-of-Bounds Read in linux (CVE-2026-43042)
vulnerability in linux (CVE-2026-43042). Confidential information can be exposed externally.
|
| CVE-2026-43040 |
|
Vulnerability in linux (CVE-2026-43040)
vulnerability in linux (CVE-2026-43040). Confidential information can be exposed externally.
|
| CVE-2026-43033 |
|
Vulnerability in linux (CVE-2026-43033)
vulnerability in linux (CVE-2026-43033). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43027 |
|
Use-After-Free in linux (CVE-2026-43027)
vulnerability in linux (CVE-2026-43027). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43028 |
|
Vulnerability in c (CVE-2026-43028)
vulnerability in c (CVE-2026-43028). Confidential information can be exposed externally.
|
| CVE-2026-43029 |
|
Vulnerability in c (CVE-2026-43029)
vulnerability in c (CVE-2026-43029). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43030 |
|
Vulnerability in linux (CVE-2026-43030)
vulnerability in linux (CVE-2026-43030). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43031 |
|
Vulnerability in linux (CVE-2026-43031)
vulnerability in linux (CVE-2026-43031). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43019 |
|
Use-After-Free in linux (CVE-2026-43019)
vulnerability in linux (CVE-2026-43019). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43020 |
|
Out-of-Bounds Write in linux (CVE-2026-43020)
out-of-bounds write in linux (CVE-2026-43020). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43023 |
|
Vulnerability in linux (CVE-2026-43023)
vulnerability in linux (CVE-2026-43023). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43025 |
|
Out-of-Bounds Read in linux (CVE-2026-43025)
vulnerability in linux (CVE-2026-43025). Confidential information can be exposed externally.
|
| CVE-2026-43018 |
|
Use-After-Free in linux (CVE-2026-43018)
vulnerability in linux (CVE-2026-43018). Successful exploitation can lead to full system takeover.
|
| CVE-2026-31761 |
|
Vulnerability in linux (CVE-2026-31761)
vulnerability in linux (CVE-2026-31761). Successful exploitation can lead to full system takeover.
|
| CVE-2026-31764 |
|
Vulnerability in linux (CVE-2026-31764)
vulnerability in linux (CVE-2026-31764). Successful exploitation can lead to full system takeover.
|
| CVE-2026-31759 |
|
Vulnerability in linux (CVE-2026-31759)
vulnerability in linux (CVE-2026-31759). Successful exploitation can lead to full system takeover.
|
| CVE-2026-31758 |
|
Use-After-Free in linux (CVE-2026-31758)
vulnerability in linux (CVE-2026-31758). Successful exploitation can lead to full system takeover.
|
| CVE-2026-31731 |
|
Use-After-Free in linux (CVE-2026-31731)
vulnerability in linux (CVE-2026-31731). Successful exploitation can lead to full system takeover.
|
| CVE-2026-31730 |
|
Vulnerability in linux (CVE-2026-31730)
vulnerability in linux (CVE-2026-31730). Successful exploitation can lead to full system takeover.
|
| CVE-2026-31431 KEV |
|
[KEV] Vulnerability in Linux redhat (CVE-2026-31431)
vulnerability in Linux redhat (CVE-2026-31431). Successful exploitation can lead to full system takeover. Listed in CISA KEV — actively exploited.
|
| CVE-2026-32202 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2026-32202)
vulnerability in Microsoft windows (CVE-2026-32202). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-33825 KEV |
|
[KEV] Vulnerability in Microsoft defender (CVE-2026-33825)
vulnerability in Microsoft defender (CVE-2026-33825). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-0238 KEV |
|
[KEV] Code Injection in Microsoft office (CVE-2009-0238)
code injection in Microsoft office (CVE-2009-0238). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-60710 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2025-60710)
vulnerability in Microsoft windows (CVE-2025-60710). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-36424 KEV |
|
[KEV] Out-of-Bounds Read in Microsoft windows (CVE-2023-36424)
vulnerability in Microsoft windows (CVE-2023-36424). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|