Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-8088 |
|
Buffer Overflow in c (CVE-2026-8088)
vulnerability in c (CVE-2026-8088). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8084 |
|
Buffer Overflow in gdal (CVE-2026-8084)
vulnerability in gdal (CVE-2026-8084). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-42216 |
|
Out-of-Bounds Read in openexr (CVE-2026-42216)
vulnerability in openexr (CVE-2026-42216). Confidential information can be exposed externally. Exploitable via ``c13e0e1320a6652e02c5c90c6dbd984d532efe44``.
|
| CVE-2024-47778 |
|
Out-of-Bounds Read in java (CVE-2024-47778)
vulnerability in java (CVE-2024-47778). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.24.10` or later.
|
| CVE-2024-47777 |
|
Out-of-Bounds Read in java (CVE-2024-47777)
vulnerability in java (CVE-2024-47777). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.24.10` or later.
|
| CVE-2024-47776 |
|
Out-of-Bounds Read in java (CVE-2024-47776)
vulnerability in java (CVE-2024-47776). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.24.10` or later.
|
| CVE-2024-47775 |
|
Out-of-Bounds Read in java (CVE-2024-47775)
vulnerability in java (CVE-2024-47775). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.24.10` or later.
|
| CVE-2024-47597 |
|
Out-of-Bounds Read in java (CVE-2024-47597)
vulnerability in java (CVE-2024-47597). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.24.10` or later.
|
| CVE-2024-47596 |
|
Out-of-Bounds Read in java (CVE-2024-47596)
vulnerability in java (CVE-2024-47596). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.24.10` or later.
|
| CVE-2026-43281 |
|
Out-of-Bounds Read in linux (CVE-2026-43281)
vulnerability in linux (CVE-2026-43281). Confidential information can be exposed externally. Exploitable via ``fw_xlate``.
|
| CVE-2026-43280 |
|
Out-of-Bounds Read in linux (CVE-2026-43280)
vulnerability in linux (CVE-2026-43280). Confidential information can be exposed externally.
|
| CVE-2026-43274 |
|
Out-of-Bounds Read in linux (CVE-2026-43274)
vulnerability in linux (CVE-2026-43274). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43197 |
|
Vulnerability in linux (CVE-2026-43197)
vulnerability in linux (CVE-2026-43197). Confidential information can be exposed externally.
|
| CVE-2026-43112 |
|
Out-of-Bounds Read in linux (CVE-2026-43112)
vulnerability in linux (CVE-2026-43112). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43042 |
|
Out-of-Bounds Read in linux (CVE-2026-43042)
vulnerability in linux (CVE-2026-43042). Confidential information can be exposed externally.
|
| CVE-2026-43025 |
|
Out-of-Bounds Read in linux (CVE-2026-43025)
vulnerability in linux (CVE-2026-43025). Confidential information can be exposed externally.
|
| CVE-2023-36424 KEV |
|
[KEV] Out-of-Bounds Read in Microsoft windows (CVE-2023-36424)
vulnerability in Microsoft windows (CVE-2023-36424). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-3055 KEV |
|
[KEV] Out-of-Bounds Read in Citrix netscaler (CVE-2026-3055)
vulnerability in Citrix netscaler (CVE-2026-3055). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-5777 KEV |
|
[KEV] Out-of-Bounds Read in Citrix netscaler-adc-and-gateway (CVE-2025-5777)
vulnerability in Citrix netscaler-adc-and-gateway (CVE-2025-5777). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-5419 KEV |
|
[KEV] Out-of-Bounds Read in Google chromium-v8 (CVE-2025-5419)
vulnerability in Google chromium-v8 (CVE-2025-5419). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2024-53150 KEV |
|
[KEV] Out-of-Bounds Read in Linux kernel (CVE-2024-53150)
vulnerability in Linux kernel (CVE-2024-53150). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-24991 KEV |
|
[KEV] Out-of-Bounds Read in Microsoft windows (CVE-2025-24991)
vulnerability in Microsoft windows (CVE-2025-24991). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-22226 KEV |
|
[KEV] Out-of-Bounds Read in Vmware esxi (CVE-2025-22226)
vulnerability in Vmware esxi (CVE-2025-22226). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-42916 KEV |
|
[KEV] Out-of-Bounds Read in Apple multiple-products (CVE-2023-42916)
vulnerability in Apple multiple-products (CVE-2023-42916). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2021-25487 KEV |
|
[KEV] Out-of-Bounds Read in Samsung mobile-devices (CVE-2021-25487)
vulnerability in Samsung mobile-devices (CVE-2021-25487). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-28204 KEV |
|
[KEV] Out-of-Bounds Read in Apple multiple-products (CVE-2023-28204)
vulnerability in Apple multiple-products (CVE-2023-28204). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-5198 KEV |
|
[KEV] Out-of-Bounds Read in Google chromium-v8 (CVE-2016-5198)
vulnerability in Google chromium-v8 (CVE-2016-5198). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-5030 KEV |
|
[KEV] Out-of-Bounds Read in Google chromium-v8 (CVE-2017-5030)
vulnerability in Google chromium-v8 (CVE-2017-5030). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2014-0160 KEV |
|
[KEV] Out-of-Bounds Read in openssl (CVE-2014-0160)
vulnerability in openssl (CVE-2014-0160). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-22674 KEV |
|
[KEV] Vulnerability in Apple macos (CVE-2022-22674)
vulnerability in Apple macos (CVE-2022-22674). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-22675 KEV |
|
[KEV] Vulnerability in Apple macos (CVE-2022-22675)
vulnerability in Apple macos (CVE-2022-22675). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2020-11899 KEV |
|
[KEV] Out-of-Bounds Read in Treck tcp/ip stack treck-tcpip-stack (CVE-2020-11899)
vulnerability in Treck tcp/ip stack treck-tcpip-stack (CVE-2020-11899). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|