Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-8186 |
|
Buffer Overflow in c (CVE-2026-8186)
vulnerability in c (CVE-2026-8186). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8138 |
|
Buffer Overflow in CVE-2026-8138 (CVE-2026-8138)
vulnerability in CVE-2026-8138 (CVE-2026-8138). Successful exploitation can lead to full system takeover.
|
| CVE-2026-8137 |
|
Buffer Overflow in CVE-2026-8137 (CVE-2026-8137)
vulnerability in CVE-2026-8137 (CVE-2026-8137). Successful exploitation can lead to full system takeover.
|
| CVE-2026-8088 |
|
Buffer Overflow in c (CVE-2026-8088)
vulnerability in c (CVE-2026-8088). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8087 |
|
Buffer Overflow in c (CVE-2026-8087)
vulnerability in c (CVE-2026-8087). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8086 |
|
Buffer Overflow in gdal (CVE-2026-8086)
vulnerability in gdal (CVE-2026-8086). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8084 |
|
Buffer Overflow in gdal (CVE-2026-8084)
vulnerability in gdal (CVE-2026-8084). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8093 |
|
Buffer Overflow in CVE-2026-8093 (CVE-2026-8093)
vulnerability in CVE-2026-8093 (CVE-2026-8093). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43208 |
|
Vulnerability in linux (CVE-2026-43208)
vulnerability in linux (CVE-2026-43208). Successful exploitation can lead to full system takeover.
|
| CVE-2025-31277 KEV |
|
[KEV] Buffer Overflow in Apple multiple-products (CVE-2025-31277)
vulnerability in Apple multiple-products (CVE-2025-31277). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-3910 KEV |
|
[KEV] Buffer Overflow in Google chromium-v8 (CVE-2026-3910)
vulnerability in Google chromium-v8 (CVE-2026-3910). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-20700 KEV |
|
[KEV] Buffer Overflow in Apple multiple-products (CVE-2026-20700)
vulnerability in Apple multiple-products (CVE-2026-20700). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-7775 KEV |
|
[KEV] Buffer Overflow in Citrix netscaler (CVE-2025-7775)
vulnerability in Citrix netscaler (CVE-2025-7775). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2014-3931 KEV |
|
[KEV] Buffer Overflow in Looking glass looking-glass (CVE-2014-3931)
vulnerability in Looking glass looking-glass (CVE-2014-3931). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-6543 KEV |
|
[KEV] Buffer Overflow in Citrix netscaler-adc-and-gateway (CVE-2025-6543)
vulnerability in Citrix netscaler-adc-and-gateway (CVE-2025-6543). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-1000253 KEV |
|
[KEV] Buffer Overflow in Linux kernel (CVE-2017-1000253)
vulnerability in Linux kernel (CVE-2017-1000253). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-6549 KEV |
|
[KEV] Buffer Overflow in Citrix netscaler-adc-and-netscaler-gateway (CVE-2023-6549)
vulnerability in Citrix netscaler-adc-and-netscaler-gateway (CVE-2023-6549). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-4966 KEV |
|
[KEV] Buffer Overflow in Citrix netscaler-adc-and-netscaler-gateway (CVE-2023-4966)
vulnerability in Citrix netscaler-adc-and-netscaler-gateway (CVE-2023-4966). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-6742 KEV |
|
[KEV] Buffer Overflow in Cisco ios-and-ios-xe-software (CVE-2017-6742)
vulnerability in Cisco ios-and-ios-xe-software (CVE-2017-6742). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-22706 KEV |
|
[KEV] Buffer Overflow in Arm mali-graphics-processing-unit-gpu (CVE-2022-22706)
vulnerability in Arm mali-graphics-processing-unit-gpu (CVE-2022-22706). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2013-2597 KEV |
|
[KEV] Buffer Overflow in Code aurora code-aurora (CVE-2013-2597)
vulnerability in Code aurora code-aurora (CVE-2013-2597). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-7445 KEV |
|
[KEV] Buffer Overflow in Mikrotik routeros (CVE-2018-7445)
vulnerability in Mikrotik routeros (CVE-2018-7445). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2021-30983 KEV |
|
[KEV] Buffer Overflow in Apple ios-and-ipados (CVE-2021-30983)
vulnerability in Apple ios-and-ipados (CVE-2021-30983). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-4344 KEV |
|
[KEV] Buffer Overflow in Apple multiple-products (CVE-2018-4344)
vulnerability in Apple multiple-products (CVE-2018-4344). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2007-5659 KEV |
|
[KEV] Buffer Overflow in Adobe acrobat-and-reader (CVE-2007-5659)
vulnerability in Adobe acrobat-and-reader (CVE-2007-5659). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-6862 KEV |
|
[KEV] Buffer Overflow in Netgear multiple-devices (CVE-2017-6862)
vulnerability in Netgear multiple-devices (CVE-2017-6862). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-1646 KEV |
|
[KEV] Buffer Overflow in Google chromium-v8 (CVE-2016-1646)
vulnerability in Google chromium-v8 (CVE-2016-1646). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2013-1331 KEV |
|
[KEV] Buffer Overflow in Microsoft office (CVE-2013-1331)
vulnerability in Microsoft office (CVE-2013-1331). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2012-1889 KEV |
|
[KEV] Buffer Overflow in Microsoft xml-core-services (CVE-2012-1889)
vulnerability in Microsoft xml-core-services (CVE-2012-1889). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2010-2883 KEV |
|
[KEV] Buffer Overflow in Adobe acrobat-and-reader (CVE-2010-2883)
vulnerability in Adobe acrobat-and-reader (CVE-2010-2883). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2010-2572 KEV |
|
[KEV] Buffer Overflow in Microsoft powerpoint (CVE-2010-2572)
vulnerability in Microsoft powerpoint (CVE-2010-2572). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-3953 KEV |
|
[KEV] Buffer Overflow in Adobe acrobat-and-reader (CVE-2009-3953)
vulnerability in Adobe acrobat-and-reader (CVE-2009-3953). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-0563 KEV |
|
[KEV] Buffer Overflow in Microsoft office (CVE-2009-0563)
vulnerability in Microsoft office (CVE-2009-0563). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-2360 KEV |
|
[KEV] Buffer Overflow in Microsoft win32k (CVE-2015-2360)
vulnerability in Microsoft win32k (CVE-2015-2360). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-2425 KEV |
|
[KEV] Buffer Overflow in Microsoft internet-explorer (CVE-2015-2425)
vulnerability in Microsoft internet-explorer (CVE-2015-2425). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2014-8439 KEV |
|
[KEV] Buffer Overflow in Adobe flash-player (CVE-2014-8439)
vulnerability in Adobe flash-player (CVE-2014-8439). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-0005 KEV |
|
[KEV] Buffer Overflow in Microsoft windows (CVE-2017-0005)
vulnerability in Microsoft windows (CVE-2017-0005). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-0149 KEV |
|
[KEV] Buffer Overflow in Microsoft internet-explorer (CVE-2017-0149)
vulnerability in Microsoft internet-explorer (CVE-2017-0149). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-4657 KEV |
|
[KEV] Buffer Overflow in Apple ios (CVE-2016-4657)
vulnerability in Apple ios (CVE-2016-4657). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-6366 KEV |
|
[KEV] Buffer Overflow in Cisco adaptive-security-appliance-asa (CVE-2016-6366)
vulnerability in Cisco adaptive-security-appliance-asa (CVE-2016-6366). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-8720 KEV |
|
[KEV] Buffer Overflow in webkitgtk (CVE-2019-8720)
vulnerability in webkitgtk (CVE-2019-8720). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-4523 KEV |
|
[KEV] Buffer Overflow in Trihedral vtscada-formerly-vts (CVE-2016-4523)
vulnerability in Trihedral vtscada-formerly-vts (CVE-2016-4523). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-3113 KEV |
|
[KEV] Buffer Overflow in Adobe flash-player (CVE-2015-3113)
vulnerability in Adobe flash-player (CVE-2015-3113). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-2502 KEV |
|
[KEV] Buffer Overflow in Microsoft internet-explorer (CVE-2015-2502)
vulnerability in Microsoft internet-explorer (CVE-2015-2502). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2010-4398 KEV |
|
[KEV] Buffer Overflow in Microsoft windows (CVE-2010-4398)
vulnerability in Microsoft windows (CVE-2010-4398). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-7201 KEV |
|
[KEV] Buffer Overflow in Microsoft edge (CVE-2016-7201)
vulnerability in Microsoft edge (CVE-2016-7201). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-7200 KEV |
|
[KEV] Buffer Overflow in Microsoft edge (CVE-2016-7200)
vulnerability in Microsoft edge (CVE-2016-7200). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-0189 KEV |
|
[KEV] Buffer Overflow in Microsoft internet-explorer (CVE-2016-0189)
vulnerability in Microsoft internet-explorer (CVE-2016-0189). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-2426 KEV |
|
[KEV] Buffer Overflow in Microsoft windows (CVE-2015-2426)
vulnerability in Microsoft windows (CVE-2015-2426). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-2419 KEV |
|
[KEV] Buffer Overflow in Microsoft internet-explorer (CVE-2015-2419)
vulnerability in Microsoft internet-explorer (CVE-2015-2419). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|