Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-43115 |
|
Vulnerability in linux (CVE-2026-43115)
vulnerability in linux (CVE-2026-43115). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43116 |
|
Vulnerability in linux (CVE-2026-43116)
vulnerability in linux (CVE-2026-43116). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43117 |
|
Vulnerability in linux (CVE-2026-43117)
vulnerability in linux (CVE-2026-43117). Confidential information can be exposed externally.
|
| CVE-2026-43118 |
|
Vulnerability in c (CVE-2026-43118)
vulnerability in c (CVE-2026-43118). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43110 |
|
Vulnerability in linux (CVE-2026-43110)
vulnerability in linux (CVE-2026-43110). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43111 |
|
Use-After-Free in linux (CVE-2026-43111)
vulnerability in linux (CVE-2026-43111). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43112 |
|
Out-of-Bounds Read in linux (CVE-2026-43112)
vulnerability in linux (CVE-2026-43112). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43083 |
|
Vulnerability in linux (CVE-2026-43083)
vulnerability in linux (CVE-2026-43083). Confidential information can be exposed externally.
|
| CVE-2026-0300 KEV |
|
[KEV] Out-of-Bounds Write in Palo alto networks palo-alto-networks (CVE-2026-0300)
out-of-bounds write in Palo alto networks palo-alto-networks (CVE-2026-0300). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-39852 |
|
Authentication Bypass in io.quarkus:quarkus-vertx-http (CVE-2026-39852)
authentication bypass in io.quarkus:quarkus-vertx-http (CVE-2026-39852). Confidential information can be exposed externally. Mitigation: upgrade to `3.35.1.1` or later.
|
| CVE-2026-39383 |
|
SSRF (Server-Side Request Forgery) in github.com/gotenberg/gotenberg/v8 (CVE-2026-39383)
SSRF in github.com/gotenberg/gotenberg/v8 (CVE-2026-39383). Confidential information can be exposed externally. Exploitable via ``FilterDeadline``. Mitigation: upgrade to `8.31.0` or later.
|
| CVE-2026-35579 |
|
Authentication Bypass in github.com/coredns/coredns (CVE-2026-35579)
authentication bypass in github.com/coredns/coredns (CVE-2026-35579). Successful exploitation can lead to full system takeover. Exploitable via ``tsigStatus``. Mitigation: upgrade to `1.14.3` or later.
|
| CVE-2026-35453 |
|
Cross-Site Scripting (XSS) in phpoffice/phpspreadsheet (CVE-2026-35453)
cross-site scripting in phpoffice/phpspreadsheet (CVE-2026-35453). Risk of unauthorized operations or information disclosure. Exploitable via ``formatColor``. Mitigation: upgrade to `1.30.4` or later.
|
| CVE-2026-35397 |
|
Path Traversal in jupyter-server (CVE-2026-35397)
path traversal in jupyter-server (CVE-2026-35397). Confidential information can be exposed externally. Exploitable via ``root_dir``. Mitigation: upgrade to `2.18.0` or later.
|
| CVE-2026-34084 |
|
Unsafe Deserialization in phpoffice/phpspreadsheet (CVE-2026-34084)
vulnerability in phpoffice/phpspreadsheet (CVE-2026-34084). Successful exploitation can lead to full system takeover. Exploitable via ``is_file``. Mitigation: upgrade to `1.30.3` or later.
|
| CVE-2026-33489 |
|
Vulnerability in github.com/coredns/coredns (CVE-2026-33489)
vulnerability in github.com/coredns/coredns (CVE-2026-33489). Confidential information can be exposed externally. Mitigation: upgrade to `1.14.3` or later.
|
| CVE-2026-33190 |
|
Authentication Bypass in github.com/coredns/coredns (CVE-2026-33190)
authentication bypass in github.com/coredns/coredns (CVE-2026-33190). Confidential information can be exposed externally. Mitigation: upgrade to `1.14.3` or later.
|
| CVE-2026-32936 |
|
Vulnerability in github.com/coredns/coredns (CVE-2026-32936)
vulnerability in github.com/coredns/coredns (CVE-2026-32936). Risk of unauthorized operations or information disclosure. Exploitable via ``dns``. Mitigation: upgrade to `1.14.3` or later.
|
| CVE-2026-32934 |
|
Vulnerability in github.com/coredns/coredns (CVE-2026-32934)
vulnerability in github.com/coredns/coredns (CVE-2026-32934). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.14.3` or later.
|
| CVE-2026-38428 |
|
SQL Injection in sqli (CVE-2026-38428)
SQL injection in sqli (CVE-2026-38428). Successful exploitation can lead to full system takeover. Exploitable via `GET /api/v1/main/flows/search`.
|
| CVE-2025-61669 |
|
Open Redirect in jupyter-server (CVE-2025-61669)
vulnerability in jupyter-server (CVE-2025-61669). Risk of unauthorized operations or information disclosure. Exploitable via ``google.com``. Mitigation: upgrade to `2.18.0` or later.
|
| CVE-2026-43071 |
|
Vulnerability in c (CVE-2026-43071)
vulnerability in c (CVE-2026-43071). Confidential information can be exposed externally.
|
| CVE-2026-43067 |
|
Vulnerability in linux (CVE-2026-43067)
vulnerability in linux (CVE-2026-43067). Successful exploitation can lead to full system takeover.
|
| CVE-2026-26956 |
|
Vulnerability in vm2-project (CVE-2026-26956)
vulnerability in vm2-project (CVE-2026-26956). Successful exploitation can lead to full system takeover. Exploitable via ``catch``.
|
| CVE-2026-35527 |
|
SSRF (Server-Side Request Forgery) in github.com/lxc/incus/v6/cmd/incusd (CVE-2026-35527)
SSRF in github.com/lxc/incus/v6/cmd/incusd (CVE-2026-35527). Risk of unauthorized operations or information disclosure. Exploitable via ``restricted.images.servers``. Mitigation: upgrade to `7.0.0` or later.
|
| CVE-2026-43047 |
|
Out-of-Bounds Write in linux (CVE-2026-43047)
out-of-bounds write in linux (CVE-2026-43047). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43039 |
|
Vulnerability in linux (CVE-2026-43039)
vulnerability in linux (CVE-2026-43039). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43040 |
|
Vulnerability in linux (CVE-2026-43040)
vulnerability in linux (CVE-2026-43040). Confidential information can be exposed externally.
|
| CVE-2026-43041 |
|
Vulnerability in linux (CVE-2026-43041)
vulnerability in linux (CVE-2026-43041). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43042 |
|
Out-of-Bounds Read in linux (CVE-2026-43042)
vulnerability in linux (CVE-2026-43042). Confidential information can be exposed externally.
|
| CVE-2026-43043 |
|
Vulnerability in linux (CVE-2026-43043)
vulnerability in linux (CVE-2026-43043). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43044 |
|
Vulnerability in linux (CVE-2026-43044)
vulnerability in linux (CVE-2026-43044). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43045 |
|
Vulnerability in linux (CVE-2026-43045)
vulnerability in linux (CVE-2026-43045). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43046 |
|
Vulnerability in c (CVE-2026-43046)
vulnerability in c (CVE-2026-43046). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43034 |
|
Vulnerability in linux (CVE-2026-43034)
vulnerability in linux (CVE-2026-43034). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43035 |
|
Vulnerability in linux (CVE-2026-43035)
vulnerability in linux (CVE-2026-43035). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43036 |
|
Vulnerability in linux (CVE-2026-43036)
vulnerability in linux (CVE-2026-43036). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43038 |
|
Vulnerability in linux (CVE-2026-43038)
vulnerability in linux (CVE-2026-43038). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43026 |
|
Vulnerability in linux (CVE-2026-43026)
vulnerability in linux (CVE-2026-43026). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43033 |
|
Vulnerability in linux (CVE-2026-43033)
vulnerability in linux (CVE-2026-43033). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43032 |
|
Vulnerability in linux (CVE-2026-43032)
vulnerability in linux (CVE-2026-43032). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43031 |
|
Vulnerability in linux (CVE-2026-43031)
vulnerability in linux (CVE-2026-43031). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43030 |
|
Vulnerability in linux (CVE-2026-43030)
vulnerability in linux (CVE-2026-43030). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43028 |
|
Vulnerability in c (CVE-2026-43028)
vulnerability in c (CVE-2026-43028). Confidential information can be exposed externally.
|
| CVE-2026-43027 |
|
Use-After-Free in linux (CVE-2026-43027)
vulnerability in linux (CVE-2026-43027). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43029 |
|
Vulnerability in c (CVE-2026-43029)
vulnerability in c (CVE-2026-43029). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43022 |
|
Vulnerability in linux (CVE-2026-43022)
vulnerability in linux (CVE-2026-43022). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43023 |
|
Vulnerability in linux (CVE-2026-43023)
vulnerability in linux (CVE-2026-43023). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43024 |
|
Vulnerability in linux (CVE-2026-43024)
vulnerability in linux (CVE-2026-43024). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43025 |
|
Out-of-Bounds Read in linux (CVE-2026-43025)
vulnerability in linux (CVE-2026-43025). Confidential information can be exposed externally.
|