Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-43199 |
|
Vulnerability in CVE-2026-43199 (CVE-2026-43199)
vulnerability in CVE-2026-43199 (CVE-2026-43199). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43187 |
|
Vulnerability in CVE-2026-43187 (CVE-2026-43187)
vulnerability in CVE-2026-43187 (CVE-2026-43187). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43184 |
|
Vulnerability in CVE-2026-43184 (CVE-2026-43184)
vulnerability in CVE-2026-43184 (CVE-2026-43184). Confidential information can be exposed externally.
|
| CVE-2026-43190 |
|
Vulnerability in c (CVE-2026-43190)
vulnerability in c (CVE-2026-43190). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43178 |
|
Vulnerability in CVE-2026-43178 (CVE-2026-43178)
vulnerability in CVE-2026-43178 (CVE-2026-43178). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43176 |
|
Vulnerability in CVE-2026-43176 (CVE-2026-43176)
vulnerability in CVE-2026-43176 (CVE-2026-43176). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43180 |
|
Vulnerability in CVE-2026-43180 (CVE-2026-43180)
vulnerability in CVE-2026-43180 (CVE-2026-43180). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43172 |
|
Vulnerability in CVE-2026-43172 (CVE-2026-43172)
vulnerability in CVE-2026-43172 (CVE-2026-43172). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43164 |
|
Vulnerability in c (CVE-2026-43164)
vulnerability in c (CVE-2026-43164). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43166 |
|
Vulnerability in CVE-2026-43166 (CVE-2026-43166)
vulnerability in CVE-2026-43166 (CVE-2026-43166). Confidential information can be exposed externally.
|
| CVE-2026-43153 |
|
Vulnerability in CVE-2026-43153 (CVE-2026-43153)
vulnerability in CVE-2026-43153 (CVE-2026-43153). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43158 |
|
Vulnerability in CVE-2026-43158 (CVE-2026-43158)
vulnerability in CVE-2026-43158 (CVE-2026-43158). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43150 |
|
Vulnerability in CVE-2026-43150 (CVE-2026-43150)
vulnerability in CVE-2026-43150 (CVE-2026-43150). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43139 |
|
Vulnerability in CVE-2026-43139 (CVE-2026-43139)
vulnerability in CVE-2026-43139 (CVE-2026-43139). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43134 |
|
Vulnerability in c (CVE-2026-43134)
vulnerability in c (CVE-2026-43134). Confidential information can be exposed externally.
|
| CVE-2026-43133 |
|
Vulnerability in linux (CVE-2026-43133)
vulnerability in linux (CVE-2026-43133). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43126 |
|
Vulnerability in linux (CVE-2026-43126)
vulnerability in linux (CVE-2026-43126). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43128 |
|
Vulnerability in linux (CVE-2026-43128)
vulnerability in linux (CVE-2026-43128). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43120 |
|
Vulnerability in CVE-2026-43120 (CVE-2026-43120)
vulnerability in CVE-2026-43120 (CVE-2026-43120). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43113 |
|
Vulnerability in linux (CVE-2026-43113)
vulnerability in linux (CVE-2026-43113). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43116 |
|
Vulnerability in linux (CVE-2026-43116)
vulnerability in linux (CVE-2026-43116). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43112 |
|
Out-of-Bounds Read in linux (CVE-2026-43112)
vulnerability in linux (CVE-2026-43112). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43110 |
|
Vulnerability in linux (CVE-2026-43110)
vulnerability in linux (CVE-2026-43110). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43106 |
|
Vulnerability in CVE-2026-43106 (CVE-2026-43106)
vulnerability in CVE-2026-43106 (CVE-2026-43106). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43111 |
|
Use-After-Free in linux (CVE-2026-43111)
vulnerability in linux (CVE-2026-43111). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43101 |
|
Vulnerability in CVE-2026-43101 (CVE-2026-43101)
vulnerability in CVE-2026-43101 (CVE-2026-43101). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43099 |
|
Vulnerability in CVE-2026-43099 (CVE-2026-43099)
vulnerability in CVE-2026-43099 (CVE-2026-43099). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43093 |
|
Vulnerability in CVE-2026-43093 (CVE-2026-43093)
vulnerability in CVE-2026-43093 (CVE-2026-43093). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43091 |
|
Vulnerability in CVE-2026-43091 (CVE-2026-43091)
vulnerability in CVE-2026-43091 (CVE-2026-43091). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43084 |
|
Vulnerability in c (CVE-2026-43084)
vulnerability in c (CVE-2026-43084). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43074 |
|
Vulnerability in c (CVE-2026-43074)
vulnerability in c (CVE-2026-43074). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43075 |
|
Vulnerability in c (CVE-2026-43075)
vulnerability in c (CVE-2026-43075). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43076 |
|
Vulnerability in CVE-2026-43076 (CVE-2026-43076)
vulnerability in CVE-2026-43076 (CVE-2026-43076). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43078 |
|
Vulnerability in CVE-2026-43078 (CVE-2026-43078)
vulnerability in CVE-2026-43078 (CVE-2026-43078). Successful exploitation can lead to full system takeover.
|
| CVE-2026-0300 KEV |
|
[KEV] Out-of-Bounds Write in Palo alto networks palo-alto-networks (CVE-2026-0300)
out-of-bounds write in Palo alto networks palo-alto-networks (CVE-2026-0300). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-39852 |
|
Authentication Bypass in io.quarkus:quarkus-vertx-http (CVE-2026-39852)
authentication bypass in io.quarkus:quarkus-vertx-http (CVE-2026-39852). Confidential information can be exposed externally. Mitigation: upgrade to `3.35.1.1` or later.
|
| CVE-2026-39383 |
|
SSRF (Server-Side Request Forgery) in github.com/gotenberg/gotenberg/v8 (CVE-2026-39383)
SSRF in github.com/gotenberg/gotenberg/v8 (CVE-2026-39383). Confidential information can be exposed externally. Exploitable via ``FilterDeadline``. Mitigation: upgrade to `8.31.0` or later.
|
| CVE-2026-35397 |
|
Path Traversal in jupyter-server (CVE-2026-35397)
path traversal in jupyter-server (CVE-2026-35397). Confidential information can be exposed externally. Exploitable via ``root_dir``. Mitigation: upgrade to `2.18.0` or later.
|
| CVE-2026-40280 |
|
SSRF (Server-Side Request Forgery) in github.com/gotenberg/gotenberg/v8 (CVE-2026-40280)
SSRF in github.com/gotenberg/gotenberg/v8 (CVE-2026-40280). Confidential information can be exposed externally. Exploitable via ``downloadFrom``. Mitigation: upgrade to `8.31.0` or later.
|
| CVE-2026-33190 |
|
Authentication Bypass in github.com/coredns/coredns (CVE-2026-33190)
authentication bypass in github.com/coredns/coredns (CVE-2026-33190). Confidential information can be exposed externally. Mitigation: upgrade to `1.14.3` or later.
|
| CVE-2026-33324 |
|
SQL Injection in fit2cloud (CVE-2026-33324)
SQL injection in fit2cloud (CVE-2026-33324). Successful exploitation can lead to full system takeover.
|
| CVE-2026-33489 |
|
Vulnerability in github.com/coredns/coredns (CVE-2026-33489)
vulnerability in github.com/coredns/coredns (CVE-2026-33489). Confidential information can be exposed externally. Mitigation: upgrade to `1.14.3` or later.
|
| CVE-2026-32936 |
|
Vulnerability in github.com/coredns/coredns (CVE-2026-32936)
vulnerability in github.com/coredns/coredns (CVE-2026-32936). Risk of unauthorized operations or information disclosure. Exploitable via ``dns``. Mitigation: upgrade to `1.14.3` or later.
|
| CVE-2026-32934 |
|
Vulnerability in github.com/coredns/coredns (CVE-2026-32934)
vulnerability in github.com/coredns/coredns (CVE-2026-32934). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.14.3` or later.
|
| CVE-2026-43070 |
|
Vulnerability in CVE-2026-43070 (CVE-2026-43070)
vulnerability in CVE-2026-43070 (CVE-2026-43070). Successful exploitation can lead to full system takeover. Exploitable via ``__mark_reg_known``.
|
| CVE-2026-43062 |
|
Vulnerability in CVE-2026-43062 (CVE-2026-43062)
vulnerability in CVE-2026-43062 (CVE-2026-43062). Data can be tampered with by attackers.
|
| CVE-2026-43060 |
|
Vulnerability in CVE-2026-43060 (CVE-2026-43060)
vulnerability in CVE-2026-43060 (CVE-2026-43060). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43063 |
|
Vulnerability in CVE-2026-43063 (CVE-2026-43063)
vulnerability in CVE-2026-43063 (CVE-2026-43063). Successful exploitation can lead to full system takeover.
|
| CVE-2026-44028 |
|
Vulnerability in CVE-2026-44028 (CVE-2026-44028)
vulnerability in CVE-2026-44028 (CVE-2026-44028). Confidential information can be exposed externally.
|
| CVE-2026-42084 |
|
Vulnerability in openc3 (CVE-2026-42084)
vulnerability in openc3 (CVE-2026-42084). Confidential information can be exposed externally.
|