Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-8092 |
|
Out-of-Bounds Read in CVE-2026-8092 (CVE-2026-8092)
vulnerability in CVE-2026-8092 (CVE-2026-8092). Successful exploitation can lead to full system takeover.
|
| CVE-2026-8090 |
|
Use-After-Free in mozilla (CVE-2026-8090)
vulnerability in mozilla (CVE-2026-8090). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43111 |
|
Use-After-Free in linux (CVE-2026-43111)
vulnerability in linux (CVE-2026-43111). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43027 |
|
Use-After-Free in linux (CVE-2026-43027)
vulnerability in linux (CVE-2026-43027). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43019 |
|
Use-After-Free in linux (CVE-2026-43019)
vulnerability in linux (CVE-2026-43019). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43018 |
|
Use-After-Free in linux (CVE-2026-43018)
vulnerability in linux (CVE-2026-43018). Successful exploitation can lead to full system takeover.
|
| CVE-2026-31758 |
|
Use-After-Free in linux (CVE-2026-31758)
vulnerability in linux (CVE-2026-31758). Successful exploitation can lead to full system takeover.
|
| CVE-2026-31731 |
|
Use-After-Free in linux (CVE-2026-31731)
vulnerability in linux (CVE-2026-31731). Successful exploitation can lead to full system takeover.
|
| CVE-2020-9715 KEV |
|
[KEV] Use-After-Free in Adobe acrobat (CVE-2020-9715)
vulnerability in Adobe acrobat (CVE-2020-9715). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-34757 |
|
Use-After-Free in CVE-2026-34757 (CVE-2026-34757)
vulnerability in CVE-2026-34757 (CVE-2026-34757). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.6.57` or later.
|
| CVE-2026-5281 KEV |
|
[KEV] Use-After-Free in Google dawn (CVE-2026-5281)
vulnerability in Google dawn (CVE-2026-5281). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-43000 KEV |
|
[KEV] Use-After-Free in Apple multiple-products (CVE-2023-43000)
vulnerability in Apple multiple-products (CVE-2023-43000). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-41974 KEV |
|
[KEV] Use-After-Free in Apple ios-and-ipados (CVE-2023-41974)
vulnerability in Apple ios-and-ipados (CVE-2023-41974). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-2441 KEV |
|
[KEV] Use-After-Free in Google chromium (CVE-2026-2441)
vulnerability in Google chromium (CVE-2026-2441). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-43529 KEV |
|
[KEV] Use-After-Free in Apple multiple-products (CVE-2025-43529)
vulnerability in Apple multiple-products (CVE-2025-43529). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-62221 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2025-62221)
vulnerability in Microsoft windows (CVE-2025-62221). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-27038 KEV |
|
[KEV] Use-After-Free in Qualcomm multiple-chipsets (CVE-2025-27038)
vulnerability in Qualcomm multiple-chipsets (CVE-2025-27038). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-32709 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2025-32709)
vulnerability in Microsoft windows (CVE-2025-32709). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-32701 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2025-32701)
vulnerability in Microsoft windows (CVE-2025-32701). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-30400 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2025-30400)
vulnerability in Microsoft windows (CVE-2025-30400). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-29824 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2025-29824)
vulnerability in Microsoft windows (CVE-2025-29824). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-24983 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2025-24983)
vulnerability in Microsoft windows (CVE-2025-24983). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-24085 KEV |
|
[KEV] Use-After-Free in Apple multiple-products (CVE-2025-24085)
vulnerability in Apple multiple-products (CVE-2025-24085). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-21335 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2025-21335)
vulnerability in Microsoft windows (CVE-2025-21335). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2025-21334 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2025-21334)
vulnerability in Microsoft windows (CVE-2025-21334). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2024-9680 KEV |
|
[KEV] Use-After-Free in Mozilla firefox (CVE-2024-9680)
vulnerability in Mozilla firefox (CVE-2024-9680). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2024-43047 KEV |
|
[KEV] Use-After-Free in Qualcomm multiple-chipsets (CVE-2024-43047)
vulnerability in Qualcomm multiple-chipsets (CVE-2024-43047). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2024-38107 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2024-38107)
vulnerability in Microsoft windows (CVE-2024-38107). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2024-38193 KEV |
|
[KEV] Use-After-Free in Microsoft windows (CVE-2024-38193)
vulnerability in Microsoft windows (CVE-2024-38193). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2024-36971 KEV |
|
[KEV] Use-After-Free in Android kernel (CVE-2024-36971)
vulnerability in Android kernel (CVE-2024-36971). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2012-4792 KEV |
|
[KEV] Use-After-Free in Microsoft internet-explorer (CVE-2012-4792)
vulnerability in Microsoft internet-explorer (CVE-2012-4792). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-2586 KEV |
|
[KEV] Use-After-Free in Linux kernel (CVE-2022-2586)
vulnerability in Linux kernel (CVE-2022-2586). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2024-4610 KEV |
|
[KEV] Use-After-Free in Arm mali-gpu-kernel-driver (CVE-2024-4610)
vulnerability in Arm mali-gpu-kernel-driver (CVE-2024-4610). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2024-1086 KEV |
|
[KEV] Use-After-Free in Linux kernel (CVE-2024-1086)
vulnerability in Linux kernel (CVE-2024-1086). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2024-4671 KEV |
|
[KEV] Use-After-Free in Google chromium (CVE-2024-4671)
vulnerability in Google chromium (CVE-2024-4671). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-33063 KEV |
|
[KEV] Use-After-Free in Qualcomm multiple-chipsets (CVE-2023-33063)
vulnerability in Qualcomm multiple-chipsets (CVE-2023-33063). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-22071 KEV |
|
[KEV] Use-After-Free in Qualcomm multiple-chipsets (CVE-2022-22071)
vulnerability in Qualcomm multiple-chipsets (CVE-2022-22071). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-21608 KEV |
|
[KEV] Use-After-Free in Adobe acrobat-and-reader (CVE-2023-21608)
vulnerability in Adobe acrobat-and-reader (CVE-2023-21608). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-4211 KEV |
|
[KEV] Use-After-Free in Arm mali-gpu-kernel-driver (CVE-2023-4211)
vulnerability in Arm mali-gpu-kernel-driver (CVE-2023-4211). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-36802 KEV |
|
[KEV] Use-After-Free in Microsoft streaming-service-proxy (CVE-2023-36802)
vulnerability in Microsoft streaming-service-proxy (CVE-2023-36802). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2021-29256 KEV |
|
[KEV] Use-After-Free in Arm mali-graphics-processing-unit-gpu (CVE-2021-29256)
vulnerability in Arm mali-graphics-processing-unit-gpu (CVE-2021-29256). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2021-25394 KEV |
|
[KEV] Use-After-Free in Samsung mobile-devices (CVE-2021-25394)
vulnerability in Samsung mobile-devices (CVE-2021-25394). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-9079 KEV |
|
[KEV] Use-After-Free in Mozilla firefox (CVE-2016-9079)
vulnerability in Mozilla firefox (CVE-2016-9079). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-32373 KEV |
|
[KEV] Use-After-Free in Apple multiple-products (CVE-2023-32373)
vulnerability in Apple multiple-products (CVE-2023-32373). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-29336 KEV |
|
[KEV] Use-After-Free in Microsoft win32k (CVE-2023-29336)
vulnerability in Microsoft win32k (CVE-2023-29336). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-8526 KEV |
|
[KEV] Use-After-Free in Apple macos (CVE-2019-8526)
vulnerability in Apple macos (CVE-2019-8526). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-28205 KEV |
|
[KEV] Use-After-Free in Apple multiple-products (CVE-2023-28205)
vulnerability in Apple multiple-products (CVE-2023-28205). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-38181 KEV |
|
[KEV] Use-After-Free in Arm mali-graphics-processing-unit-gpu (CVE-2022-38181)
vulnerability in Arm mali-graphics-processing-unit-gpu (CVE-2022-38181). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2023-0266 KEV |
|
[KEV] Use-After-Free in Linux kernel (CVE-2023-0266)
vulnerability in Linux kernel (CVE-2023-0266). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-3038 KEV |
|
[KEV] Use-After-Free in Google chromium-network-service (CVE-2022-3038)
vulnerability in Google chromium-network-service (CVE-2022-3038). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|