Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-42605 |
|
Path Traversal in path-traversal (CVE-2026-42605)
path traversal in path-traversal (CVE-2026-42605). Successful exploitation can lead to full system takeover. Exploitable via `POST /api/station/{station_id}/files/upload`.
|
| CVE-2026-42562 |
|
Privilege Escalation in CVE-2026-42562 (CVE-2026-42562)
vulnerability in CVE-2026-42562 (CVE-2026-42562). Confidential information can be exposed externally. Exploitable via `PUT /api.php/v1/users/{id}.`.
|
| CVE-2026-42224 |
|
Cross-Site Scripting (XSS) in CVE-2026-42224 (CVE-2026-42224)
cross-site scripting in CVE-2026-42224 (CVE-2026-42224). Successful exploitation can lead to full system takeover.
|
| CVE-2026-42205 |
|
Vulnerability in rails (CVE-2026-42205)
vulnerability in rails (CVE-2026-42205). Successful exploitation can lead to full system takeover.
|
| CVE-2026-41576 |
|
Cross-Site Scripting (XSS) in CVE-2026-41576 (CVE-2026-41576)
cross-site scripting in CVE-2026-41576 (CVE-2026-41576). Confidential information can be exposed externally.
|
| CVE-2026-41570 |
|
Vulnerability in phpunit-project (CVE-2026-41570)
vulnerability in phpunit-project (CVE-2026-41570). Successful exploitation can lead to full system takeover.
|
| CVE-2026-41524 |
|
Cross-Site Scripting (XSS) in laravel (CVE-2026-41524)
cross-site scripting in laravel (CVE-2026-41524). Confidential information can be exposed externally.
|
| CVE-2026-39816 |
|
Vulnerability in apache (CVE-2026-39816)
vulnerability in apache (CVE-2026-39816). Successful exploitation can lead to full system takeover.
|
| CVE-2025-66467 |
|
Vulnerability in apache (CVE-2025-66467)
vulnerability in apache (CVE-2025-66467). Successful exploitation can lead to full system takeover.
|
| CVE-2026-7330 |
|
Cross-Site Scripting (XSS) in wordpress (CVE-2026-7330)
cross-site scripting in wordpress (CVE-2026-7330). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-5127 |
|
Unsafe Deserialization in wordpress (CVE-2026-5127)
vulnerability in wordpress (CVE-2026-5127). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43284 |
|
Vulnerability in linux (CVE-2026-43284)
vulnerability in linux (CVE-2026-43284). Successful exploitation can lead to full system takeover.
|
| CVE-2026-4935 |
|
SQL Injection in wordpress (CVE-2026-4935)
SQL injection in wordpress (CVE-2026-4935). Confidential information can be exposed externally.
|
| CVE-2025-67888 |
|
OS Command Injection in CVE-2025-67888 (CVE-2025-67888)
OS command injection in CVE-2025-67888 (CVE-2025-67888). Risk of unauthorized operations or information disclosure.
|
| CVE-2024-33288 |
|
SQL Injection in sqli (CVE-2024-33288)
SQL injection in sqli (CVE-2024-33288). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8133 |
|
Vulnerability in sqli (CVE-2026-8133)
vulnerability in sqli (CVE-2026-8133). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8132 |
|
Vulnerability in sqli (CVE-2026-8132)
vulnerability in sqli (CVE-2026-8132). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8131 |
|
Vulnerability in sqli (CVE-2026-8131)
vulnerability in sqli (CVE-2026-8131). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8130 |
|
Vulnerability in sqli (CVE-2026-8130)
vulnerability in sqli (CVE-2026-8130). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8129 |
|
Vulnerability in sqli (CVE-2026-8129)
vulnerability in sqli (CVE-2026-8129). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8128 |
|
Vulnerability in sqli (CVE-2026-8128)
vulnerability in sqli (CVE-2026-8128). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8126 |
|
Vulnerability in sqli (CVE-2026-8126)
vulnerability in sqli (CVE-2026-8126). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-35435 |
|
Vulnerability in microsoft (CVE-2026-35435)
vulnerability in microsoft (CVE-2026-35435). Confidential information can be exposed externally.
|
| CVE-2026-34327 |
|
Vulnerability in microsoft (CVE-2026-34327)
vulnerability in microsoft (CVE-2026-34327). Confidential information can be exposed externally.
|
| CVE-2026-32207 |
|
Cross-Site Scripting (XSS) in microsoft (CVE-2026-32207)
cross-site scripting in microsoft (CVE-2026-32207). Successful exploitation can lead to full system takeover.
|
| CVE-2026-26164 |
|
Vulnerability in microsoft (CVE-2026-26164)
vulnerability in microsoft (CVE-2026-26164). Confidential information can be exposed externally.
|
| CVE-2026-26129 |
|
Vulnerability in microsoft (CVE-2026-26129)
vulnerability in microsoft (CVE-2026-26129). Confidential information can be exposed externally.
|
| CVE-2026-41906 |
|
Vulnerability in laravel (CVE-2026-41906)
vulnerability in laravel (CVE-2026-41906). Data can be tampered with by attackers.
|
| CVE-2026-8090 |
|
Use-After-Free in mozilla (CVE-2026-8090)
vulnerability in mozilla (CVE-2026-8090). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-6973 KEV |
|
[KEV] Vulnerability in Ivanti endpoint-manager-mobile-epmm (CVE-2026-6973)
vulnerability in Ivanti endpoint-manager-mobile-epmm (CVE-2026-6973). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-8018 |
|
Vulnerability in google (CVE-2026-8018)
vulnerability in google (CVE-2026-8018). Successful exploitation can lead to full system takeover.
|
| CVE-2026-7916 |
|
Vulnerability in google (CVE-2026-7916)
vulnerability in google (CVE-2026-7916). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43283 |
|
Vulnerability in linux (CVE-2026-43283)
vulnerability in linux (CVE-2026-43283). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43281 |
|
Out-of-Bounds Read in linux (CVE-2026-43281)
vulnerability in linux (CVE-2026-43281). Confidential information can be exposed externally. Exploitable via ``fw_xlate``.
|
| CVE-2026-43280 |
|
Out-of-Bounds Read in linux (CVE-2026-43280)
vulnerability in linux (CVE-2026-43280). Confidential information can be exposed externally.
|
| CVE-2026-43279 |
|
Out-of-Bounds Write in linux (CVE-2026-43279)
out-of-bounds write in linux (CVE-2026-43279). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43278 |
|
Vulnerability in linux (CVE-2026-43278)
vulnerability in linux (CVE-2026-43278). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43276 |
|
Vulnerability in linux (CVE-2026-43276)
vulnerability in linux (CVE-2026-43276). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43274 |
|
Out-of-Bounds Read in linux (CVE-2026-43274)
vulnerability in linux (CVE-2026-43274). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43263 |
|
Vulnerability in linux (CVE-2026-43263)
vulnerability in linux (CVE-2026-43263). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43260 |
|
Vulnerability in linux (CVE-2026-43260)
vulnerability in linux (CVE-2026-43260). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43230 |
|
Vulnerability in linux (CVE-2026-43230)
vulnerability in linux (CVE-2026-43230). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43226 |
|
Vulnerability in linux (CVE-2026-43226)
vulnerability in linux (CVE-2026-43226). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43222 |
|
Vulnerability in linux (CVE-2026-43222)
vulnerability in linux (CVE-2026-43222). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43133 |
|
Vulnerability in linux (CVE-2026-43133)
vulnerability in linux (CVE-2026-43133). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43128 |
|
Vulnerability in linux (CVE-2026-43128)
vulnerability in linux (CVE-2026-43128). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43126 |
|
Vulnerability in linux (CVE-2026-43126)
vulnerability in linux (CVE-2026-43126). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43116 |
|
Vulnerability in linux (CVE-2026-43116)
vulnerability in linux (CVE-2026-43116). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43113 |
|
Vulnerability in linux (CVE-2026-43113)
vulnerability in linux (CVE-2026-43113). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43112 |
|
Out-of-Bounds Read in linux (CVE-2026-43112)
vulnerability in linux (CVE-2026-43112). Successful exploitation can lead to full system takeover.
|