Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| MINI-9qff-rhfw-jwhj |
|
MINI-9qff-rhfw-jwhj |
| MINI-2544-3hx5-2f6j |
|
MINI-2544-3hx5-2f6j |
| MINI-2hrf-5358-9hqg |
|
MINI-2hrf-5358-9hqg |
| MINI-67jq-xfv2-mfgp |
|
MINI-67jq-xfv2-mfgp |
| MINI-5rmr-fqhq-5wq9 |
|
MINI-5rmr-fqhq-5wq9 |
| MINI-9fjc-c42m-rfgf |
|
MINI-9fjc-c42m-rfgf |
| MINI-638c-rp93-hmh9 |
|
MINI-638c-rp93-hmh9 |
| MINI-w4jv-2rc7-rcmf |
|
MINI-w4jv-2rc7-rcmf |
| MINI-rh86-483m-5xhf |
|
MINI-rh86-483m-5xhf |
| MINI-w9qc-h2v4-2mvp |
|
MINI-w9qc-h2v4-2mvp |
| MINI-pf66-h576-gpxh |
|
MINI-pf66-h576-gpxh |
| MINI-j52g-cfm8-c6cj |
|
MINI-j52g-cfm8-c6cj |
| MINI-wcw2-68vh-f869 |
|
MINI-wcw2-68vh-f869 |
| MINI-j3x5-4pfg-2pqg |
|
MINI-j3x5-4pfg-2pqg |
| MINI-qh95-8cm6-pgqm |
|
MINI-qh95-8cm6-pgqm |
| ROOT-APP-NPM-CVE-2026-24781 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-24781)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-24781). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.2, 3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-44004 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44004)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44004). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `3.10.5-root.io.1, 3.10.5-root.io.2, 3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-43999 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-43999)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-43999). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.2, 3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-43997 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-43997)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-43997). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.2, 3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-24118 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-24118)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-24118). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.2, 3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-44006 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44006)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44006). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-44009 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44009)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44009). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-44005 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44005)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44005). Data can be tampered with by attackers. Mitigation: upgrade to `3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-44007 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44007)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44007). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.2, 3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-44001 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44001)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44001). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-43998 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-43998)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-43998). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.1, 3.10.5-root.io.2, 3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-44008 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44008)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-44008). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.4` or later.
|
| ROOT-APP-NPM-CVE-2026-26332 |
|
Vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-26332)
vulnerability in @rootio/vm2 (ROOT-APP-NPM-CVE-2026-26332). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `3.10.5-root.io.2, 3.10.5-root.io.3, 3.10.5-root.io.4` or later.
|
| MINI-hvj5-h4v3-m54v |
|
MINI-hvj5-h4v3-m54v |
| MINI-hj64-h2w6-6wwm |
|
MINI-hj64-h2w6-6wwm |
| MINI-7w5x-j768-5jh8 |
|
MINI-7w5x-j768-5jh8 |
| MINI-94pv-hg54-w2pw |
|
MINI-94pv-hg54-w2pw |
| MINI-8v69-crqm-xj56 |
|
MINI-8v69-crqm-xj56 |
| MINI-8qx7-9c4r-95gp |
|
MINI-8qx7-9c4r-95gp |
| MINI-945q-xxv8-vh7p |
|
MINI-945q-xxv8-vh7p |
| MINI-8jcp-63r2-mm84 |
|
MINI-8jcp-63r2-mm84 |
| MAL-2026-3425 |
|
Vulnerability in xxoo-bale (MAL-2026-3425)
vulnerability in xxoo-bale (MAL-2026-3425). Risk of unauthorized operations or information disclosure.
|
| MINI-xj5p-396h-4j5w |
|
MINI-xj5p-396h-4j5w |
| MINI-x345-7qv6-8pj3 |
|
MINI-x345-7qv6-8pj3 |
| MINI-vmg2-p42g-8645 |
|
MINI-vmg2-p42g-8645 |
| MINI-vvhx-6jgv-mf25 |
|
MINI-vvhx-6jgv-mf25 |
| MINI-qrw3-59cf-c795 |
|
MINI-qrw3-59cf-c795 |
| MINI-j3p7-cjh7-wjx5 |
|
MINI-j3p7-cjh7-wjx5 |
| MINI-h43m-863j-jpx7 |
|
MINI-h43m-863j-jpx7 |
| MINI-p732-r83h-6vr4 |
|
MINI-p732-r83h-6vr4 |
| MINI-q23g-86m4-jfjc |
|
MINI-q23g-86m4-jfjc |
| MINI-pj43-pp5v-9ccv |
|
MINI-pj43-pp5v-9ccv |
| MINI-jvj8-5jq4-5qcv |
|
MINI-jvj8-5jq4-5qcv |
| MINI-j57x-2jp6-8crp |
|
MINI-j57x-2jp6-8crp |
| MINI-cvr4-h26x-qg3q |
|
MINI-cvr4-h26x-qg3q |