Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| ROOT-OS-DEBIAN-11-CVE-2023-52935 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2023-52935)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2023-52935). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2019-15794 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2019-15794)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2019-15794). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2025-68206 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-68206)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-68206). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2008-4609 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2008-4609)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2008-4609). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2025-38445 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-38445)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-38445). Confidential information can be exposed externally. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2024-56715 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2024-56715)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2024-56715). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2025-38700 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-38700)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-38700). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2023-53282 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2023-53282)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2023-53282). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2022-49935 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2022-49935)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2022-49935). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2024-40975 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2024-40975)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2024-40975). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2025-39744 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-39744)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-39744). Confidential information can be exposed externally. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2022-50116 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2022-50116)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2022-50116). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2025-21792 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-21792)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-21792). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2025-38708 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-38708)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-38708). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2025-37830 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-37830)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-37830). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2023-53149 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2023-53149)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2023-53149). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2026-43047 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2026-43047)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2026-43047). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2022-49138 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2022-49138)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2022-49138). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2024-41062 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2024-41062)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2024-41062). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2024-49905 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2024-49905)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2024-49905). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2026-43011 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2026-43011)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2026-43011). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.79` or later.
|
| ROOT-OS-DEBIAN-11-CVE-2025-68819 |
|
Vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-68819)
vulnerability in rootio-linux (ROOT-OS-DEBIAN-11-CVE-2025-68819). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.10.251-3.root.io.76, 5.10.251-3.root.io.78, 5.10.251-3.root.io.79, 5.10.251-3.root.io.77, 5.10.251-3.root.io.75` or later.
|
| CVE-2026-43944 |
|
Vulnerability in electerm (CVE-2026-43944)
vulnerability in electerm (CVE-2026-43944). Successful exploitation can lead to full system takeover. Exploitable via ``opts``. Mitigation: upgrade to `> 3.8.8` or later.
|
| CVE-2026-43941 |
|
Vulnerability in electerm (CVE-2026-43941)
vulnerability in electerm (CVE-2026-43941). Successful exploitation can lead to full system takeover. Exploitable via ``shell.openExternal``.
|
| CVE-2026-41500 |
|
Command Injection in electerm-project (CVE-2026-41500)
command injection in electerm-project (CVE-2026-41500). Successful exploitation can lead to full system takeover. Exploitable via ``releaseInfo.name``. Mitigation: upgrade to `> 3.2.0` or later.
|
| CVE-2026-41501 |
|
Command Injection in electerm (CVE-2026-41501)
command injection in electerm (CVE-2026-41501). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `> 3.2.0` or later.
|
| CVE-2025-63703 |
|
Vulnerability in npm (CVE-2025-63703)
vulnerability in npm (CVE-2025-63703). Successful exploitation can lead to full system takeover.
|
| CVE-2025-63704 |
|
Vulnerability in prototype-pollution (CVE-2025-63704)
vulnerability in prototype-pollution (CVE-2025-63704). Successful exploitation can lead to full system takeover.
|
| CVE-2025-63706 |
|
Code Injection in npm (CVE-2025-63706)
code injection in npm (CVE-2025-63706). Successful exploitation can lead to full system takeover.
|
| CVE-2026-7924 |
|
Vulnerability in chromium (CVE-2026-7924)
vulnerability in chromium (CVE-2026-7924). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `148.0.7778.96-1~deb12u1` or later.
|
| CVE-2026-7925 |
|
Vulnerability in chromium (CVE-2026-7925)
vulnerability in chromium (CVE-2026-7925). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `148.0.7778.96-1~deb12u1` or later.
|
| CVE-2026-7923 |
|
Vulnerability in chromium (CVE-2026-7923)
vulnerability in chromium (CVE-2026-7923). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `148.0.7778.96-1~deb12u1` or later.
|
| openSUSE-SU-2026:10716-1 |
|
Vulnerability in copacetic (openSUSE-SU-2026:10716-1)
vulnerability in copacetic (openSUSE-SU-2026:10716-1). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `0.14.0-1.1` or later.
|
| openSUSE-SU-2026:10718-1 |
|
Vulnerability in python-Django (openSUSE-SU-2026:10718-1)
vulnerability in python-Django (openSUSE-SU-2026:10718-1). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `5.2.14-1.1` or later.
|
| openSUSE-SU-2026:10719-1 |
|
Vulnerability in valkey (openSUSE-SU-2026:10719-1)
vulnerability in valkey (openSUSE-SU-2026:10719-1). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `9.0.4-1.1` or later.
|
| openSUSE-SU-2026:10717-1 |
|
Vulnerability in libexif (openSUSE-SU-2026:10717-1)
vulnerability in libexif (openSUSE-SU-2026:10717-1). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `0.6.26-1.1` or later.
|
| CVE-2026-34282 |
|
Vulnerability in java (CVE-2026-34282)
vulnerability in java (CVE-2026-34282). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-34268 |
|
Vulnerability in java (CVE-2026-34268)
vulnerability in java (CVE-2026-34268). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-23865 |
|
Vulnerability in java (CVE-2026-23865)
vulnerability in java (CVE-2026-23865). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-22021 |
|
Vulnerability in java (CVE-2026-22021)
vulnerability in java (CVE-2026-22021). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-22013 |
|
Vulnerability in java (CVE-2026-22013)
vulnerability in java (CVE-2026-22013). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-22008 |
|
Vulnerability in java (CVE-2026-22008)
vulnerability in java (CVE-2026-22008). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `25.0.2` or later.
|
| CVE-2026-22007 |
|
Vulnerability in java (CVE-2026-22007)
vulnerability in java (CVE-2026-22007). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491, 11.0.31, 17.0.19, 21.0.11, 25.0.3, 26.0.1` or later.
|
| CVE-2026-22003 |
|
Vulnerability in java (CVE-2026-22003)
vulnerability in java (CVE-2026-22003). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|
| CVE-2026-21947 |
|
Vulnerability in java (CVE-2026-21947)
vulnerability in java (CVE-2026-21947). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481` or later.
|
| CVE-2026-21945 |
|
Vulnerability in java (CVE-2026-21945)
vulnerability in java (CVE-2026-21945). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-21933 |
|
Vulnerability in java (CVE-2026-21933)
vulnerability in java (CVE-2026-21933). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-21932 |
|
Vulnerability in java (CVE-2026-21932)
vulnerability in java (CVE-2026-21932). Data can be tampered with by attackers. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-21925 |
|
Vulnerability in java (CVE-2026-21925)
vulnerability in java (CVE-2026-21925). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.481, 11.0.30, 17.0.18, 21.0.10, 25.0.2` or later.
|
| CVE-2026-20676 |
|
Vulnerability in java (CVE-2026-20676)
vulnerability in java (CVE-2026-20676). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.8.0, 8.0.491` or later.
|