Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2025-63705 |
|
OS Command Injection in CVE-2025-63705 (CVE-2025-63705)
OS command injection in CVE-2025-63705 (CVE-2025-63705). Successful exploitation can lead to full system takeover.
|
| CVE-2026-30495 |
|
Vulnerability in CVE-2026-30495 (CVE-2026-30495)
vulnerability in CVE-2026-30495 (CVE-2026-30495). Successful exploitation can lead to full system takeover.
|
| CVE-2026-8093 |
|
Buffer Overflow in CVE-2026-8093 (CVE-2026-8093)
vulnerability in CVE-2026-8093 (CVE-2026-8093). Successful exploitation can lead to full system takeover.
|
| CVE-2026-8092 |
|
Out-of-Bounds Read in CVE-2026-8092 (CVE-2026-8092)
vulnerability in CVE-2026-8092 (CVE-2026-8092). Successful exploitation can lead to full system takeover.
|
| CVE-2026-8090 |
|
Use-After-Free in mozilla (CVE-2026-8090)
vulnerability in mozilla (CVE-2026-8090). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-4430 |
|
Out-of-Bounds Write in libreoffice (CVE-2026-4430)
out-of-bounds write in libreoffice (CVE-2026-4430). Successful exploitation can lead to full system takeover.
|
| CVE-2025-9661 |
|
OS Command Injection in hitachi (CVE-2025-9661)
OS command injection in hitachi (CVE-2025-9661). Successful exploitation can lead to full system takeover.
|
| CVE-2026-41139 |
|
Vulnerability in mathjs (CVE-2026-41139)
vulnerability in mathjs (CVE-2026-41139). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `15.2.0` or later.
|
| CVE-2026-41142 |
|
Vulnerability in openexr (CVE-2026-41142)
vulnerability in openexr (CVE-2026-41142). Successful exploitation can lead to full system takeover.
|
| CVE-2026-6973 KEV |
|
[KEV] Vulnerability in Ivanti endpoint-manager-mobile-epmm (CVE-2026-6973)
vulnerability in Ivanti endpoint-manager-mobile-epmm (CVE-2026-6973). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2026-8018 |
|
Vulnerability in google (CVE-2026-8018)
vulnerability in google (CVE-2026-8018). Successful exploitation can lead to full system takeover.
|
| CVE-2026-7916 |
|
Vulnerability in google (CVE-2026-7916)
vulnerability in google (CVE-2026-7916). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43283 |
|
Vulnerability in linux (CVE-2026-43283)
vulnerability in linux (CVE-2026-43283). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43281 |
|
Out-of-Bounds Read in linux (CVE-2026-43281)
vulnerability in linux (CVE-2026-43281). Confidential information can be exposed externally. Exploitable via ``fw_xlate``.
|
| CVE-2026-43280 |
|
Out-of-Bounds Read in linux (CVE-2026-43280)
vulnerability in linux (CVE-2026-43280). Confidential information can be exposed externally.
|
| CVE-2026-43279 |
|
Out-of-Bounds Write in linux (CVE-2026-43279)
out-of-bounds write in linux (CVE-2026-43279). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43278 |
|
Vulnerability in linux (CVE-2026-43278)
vulnerability in linux (CVE-2026-43278). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43276 |
|
Vulnerability in linux (CVE-2026-43276)
vulnerability in linux (CVE-2026-43276). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43274 |
|
Out-of-Bounds Read in linux (CVE-2026-43274)
vulnerability in linux (CVE-2026-43274). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43263 |
|
Vulnerability in linux (CVE-2026-43263)
vulnerability in linux (CVE-2026-43263). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43260 |
|
Vulnerability in linux (CVE-2026-43260)
vulnerability in linux (CVE-2026-43260). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43258 |
|
Vulnerability in CVE-2026-43258 (CVE-2026-43258)
vulnerability in CVE-2026-43258 (CVE-2026-43258). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43256 |
|
Vulnerability in CVE-2026-43256 (CVE-2026-43256)
vulnerability in CVE-2026-43256 (CVE-2026-43256). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43254 |
|
Vulnerability in CVE-2026-43254 (CVE-2026-43254)
vulnerability in CVE-2026-43254 (CVE-2026-43254). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43253 |
|
Vulnerability in CVE-2026-43253 (CVE-2026-43253)
vulnerability in CVE-2026-43253 (CVE-2026-43253). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43249 |
|
Vulnerability in CVE-2026-43249 (CVE-2026-43249)
vulnerability in CVE-2026-43249 (CVE-2026-43249). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43248 |
|
Vulnerability in CVE-2026-43248 (CVE-2026-43248)
vulnerability in CVE-2026-43248 (CVE-2026-43248). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43245 |
|
Vulnerability in CVE-2026-43245 (CVE-2026-43245)
vulnerability in CVE-2026-43245 (CVE-2026-43245). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43239 |
|
Vulnerability in CVE-2026-43239 (CVE-2026-43239)
vulnerability in CVE-2026-43239 (CVE-2026-43239). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43237 |
|
Vulnerability in c (CVE-2026-43237)
vulnerability in c (CVE-2026-43237). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43236 |
|
Vulnerability in c (CVE-2026-43236)
vulnerability in c (CVE-2026-43236). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43233 |
|
Vulnerability in CVE-2026-43233 (CVE-2026-43233)
vulnerability in CVE-2026-43233 (CVE-2026-43233). Risk of unauthorized operations or information disclosure. Exploitable via ``len``.
|
| CVE-2026-43232 |
|
Vulnerability in CVE-2026-43232 (CVE-2026-43232)
vulnerability in CVE-2026-43232 (CVE-2026-43232). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43230 |
|
Vulnerability in linux (CVE-2026-43230)
vulnerability in linux (CVE-2026-43230). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43226 |
|
Vulnerability in linux (CVE-2026-43226)
vulnerability in linux (CVE-2026-43226). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43222 |
|
Vulnerability in linux (CVE-2026-43222)
vulnerability in linux (CVE-2026-43222). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43215 |
|
Vulnerability in CVE-2026-43215 (CVE-2026-43215)
vulnerability in CVE-2026-43215 (CVE-2026-43215). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43214 |
|
Vulnerability in c (CVE-2026-43214)
vulnerability in c (CVE-2026-43214). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43213 |
|
Vulnerability in c (CVE-2026-43213)
vulnerability in c (CVE-2026-43213). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43212 |
|
Vulnerability in CVE-2026-43212 (CVE-2026-43212)
vulnerability in CVE-2026-43212 (CVE-2026-43212). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43211 |
|
Vulnerability in CVE-2026-43211 (CVE-2026-43211)
vulnerability in CVE-2026-43211 (CVE-2026-43211). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43207 |
|
Vulnerability in CVE-2026-43207 (CVE-2026-43207)
vulnerability in CVE-2026-43207 (CVE-2026-43207). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43206 |
|
Vulnerability in privilege-escalation (CVE-2026-43206)
vulnerability in privilege-escalation (CVE-2026-43206). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43203 |
|
Vulnerability in CVE-2026-43203 (CVE-2026-43203)
vulnerability in CVE-2026-43203 (CVE-2026-43203). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43199 |
|
Vulnerability in CVE-2026-43199 (CVE-2026-43199)
vulnerability in CVE-2026-43199 (CVE-2026-43199). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43194 |
|
Vulnerability in CVE-2026-43194 (CVE-2026-43194)
vulnerability in CVE-2026-43194 (CVE-2026-43194). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43190 |
|
Vulnerability in c (CVE-2026-43190)
vulnerability in c (CVE-2026-43190). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-43187 |
|
Vulnerability in CVE-2026-43187 (CVE-2026-43187)
vulnerability in CVE-2026-43187 (CVE-2026-43187). Successful exploitation can lead to full system takeover.
|
| CVE-2026-43184 |
|
Vulnerability in CVE-2026-43184 (CVE-2026-43184)
vulnerability in CVE-2026-43184 (CVE-2026-43184). Confidential information can be exposed externally.
|
| CVE-2026-43180 |
|
Vulnerability in CVE-2026-43180 (CVE-2026-43180)
vulnerability in CVE-2026-43180 (CVE-2026-43180). Successful exploitation can lead to full system takeover.
|