Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

ID Title
CVE-2025-63705 OS Command Injection in CVE-2025-63705 (CVE-2025-63705)
OS command injection in CVE-2025-63705 (CVE-2025-63705). Successful exploitation can lead to full system takeover.
CVE-2026-30495 Vulnerability in CVE-2026-30495 (CVE-2026-30495)
vulnerability in CVE-2026-30495 (CVE-2026-30495). Successful exploitation can lead to full system takeover.
CVE-2026-8093 Buffer Overflow in CVE-2026-8093 (CVE-2026-8093)
vulnerability in CVE-2026-8093 (CVE-2026-8093). Successful exploitation can lead to full system takeover.
CVE-2026-8092 Out-of-Bounds Read in CVE-2026-8092 (CVE-2026-8092)
vulnerability in CVE-2026-8092 (CVE-2026-8092). Successful exploitation can lead to full system takeover.
CVE-2026-8090 Use-After-Free in mozilla (CVE-2026-8090)
vulnerability in mozilla (CVE-2026-8090). Risk of unauthorized operations or information disclosure.
CVE-2026-4430 Out-of-Bounds Write in libreoffice (CVE-2026-4430)
out-of-bounds write in libreoffice (CVE-2026-4430). Successful exploitation can lead to full system takeover.
CVE-2025-9661 OS Command Injection in hitachi (CVE-2025-9661)
OS command injection in hitachi (CVE-2025-9661). Successful exploitation can lead to full system takeover.
CVE-2026-41139 Vulnerability in mathjs (CVE-2026-41139)
vulnerability in mathjs (CVE-2026-41139). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `15.2.0` or later.
CVE-2026-41142 Vulnerability in openexr (CVE-2026-41142)
vulnerability in openexr (CVE-2026-41142). Successful exploitation can lead to full system takeover.
CVE-2026-6973 KEV [KEV] Vulnerability in Ivanti endpoint-manager-mobile-epmm (CVE-2026-6973)
vulnerability in Ivanti endpoint-manager-mobile-epmm (CVE-2026-6973). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
CVE-2026-8018 Vulnerability in google (CVE-2026-8018)
vulnerability in google (CVE-2026-8018). Successful exploitation can lead to full system takeover.
CVE-2026-7916 Vulnerability in google (CVE-2026-7916)
vulnerability in google (CVE-2026-7916). Successful exploitation can lead to full system takeover.
CVE-2026-43283 Vulnerability in linux (CVE-2026-43283)
vulnerability in linux (CVE-2026-43283). Successful exploitation can lead to full system takeover.
CVE-2026-43281 Out-of-Bounds Read in linux (CVE-2026-43281)
vulnerability in linux (CVE-2026-43281). Confidential information can be exposed externally. Exploitable via ``fw_xlate``.
CVE-2026-43280 Out-of-Bounds Read in linux (CVE-2026-43280)
vulnerability in linux (CVE-2026-43280). Confidential information can be exposed externally.
CVE-2026-43279 Out-of-Bounds Write in linux (CVE-2026-43279)
out-of-bounds write in linux (CVE-2026-43279). Successful exploitation can lead to full system takeover.
CVE-2026-43278 Vulnerability in linux (CVE-2026-43278)
vulnerability in linux (CVE-2026-43278). Successful exploitation can lead to full system takeover.
CVE-2026-43276 Vulnerability in linux (CVE-2026-43276)
vulnerability in linux (CVE-2026-43276). Successful exploitation can lead to full system takeover.
CVE-2026-43274 Out-of-Bounds Read in linux (CVE-2026-43274)
vulnerability in linux (CVE-2026-43274). Successful exploitation can lead to full system takeover.
CVE-2026-43263 Vulnerability in linux (CVE-2026-43263)
vulnerability in linux (CVE-2026-43263). Successful exploitation can lead to full system takeover.
CVE-2026-43260 Vulnerability in linux (CVE-2026-43260)
vulnerability in linux (CVE-2026-43260). Successful exploitation can lead to full system takeover.
CVE-2026-43258 Vulnerability in CVE-2026-43258 (CVE-2026-43258)
vulnerability in CVE-2026-43258 (CVE-2026-43258). Successful exploitation can lead to full system takeover.
CVE-2026-43256 Vulnerability in CVE-2026-43256 (CVE-2026-43256)
vulnerability in CVE-2026-43256 (CVE-2026-43256). Successful exploitation can lead to full system takeover.
CVE-2026-43254 Vulnerability in CVE-2026-43254 (CVE-2026-43254)
vulnerability in CVE-2026-43254 (CVE-2026-43254). Risk of unauthorized operations or information disclosure.
CVE-2026-43253 Vulnerability in CVE-2026-43253 (CVE-2026-43253)
vulnerability in CVE-2026-43253 (CVE-2026-43253). Risk of unauthorized operations or information disclosure.
CVE-2026-43249 Vulnerability in CVE-2026-43249 (CVE-2026-43249)
vulnerability in CVE-2026-43249 (CVE-2026-43249). Successful exploitation can lead to full system takeover.
CVE-2026-43248 Vulnerability in CVE-2026-43248 (CVE-2026-43248)
vulnerability in CVE-2026-43248 (CVE-2026-43248). Successful exploitation can lead to full system takeover.
CVE-2026-43245 Vulnerability in CVE-2026-43245 (CVE-2026-43245)
vulnerability in CVE-2026-43245 (CVE-2026-43245). Risk of unauthorized operations or information disclosure.
CVE-2026-43239 Vulnerability in CVE-2026-43239 (CVE-2026-43239)
vulnerability in CVE-2026-43239 (CVE-2026-43239). Successful exploitation can lead to full system takeover.
CVE-2026-43237 Vulnerability in c (CVE-2026-43237)
vulnerability in c (CVE-2026-43237). Successful exploitation can lead to full system takeover.
CVE-2026-43236 Vulnerability in c (CVE-2026-43236)
vulnerability in c (CVE-2026-43236). Successful exploitation can lead to full system takeover.
CVE-2026-43233 Vulnerability in CVE-2026-43233 (CVE-2026-43233)
vulnerability in CVE-2026-43233 (CVE-2026-43233). Risk of unauthorized operations or information disclosure. Exploitable via ``len``.
CVE-2026-43232 Vulnerability in CVE-2026-43232 (CVE-2026-43232)
vulnerability in CVE-2026-43232 (CVE-2026-43232). Successful exploitation can lead to full system takeover.
CVE-2026-43230 Vulnerability in linux (CVE-2026-43230)
vulnerability in linux (CVE-2026-43230). Risk of unauthorized operations or information disclosure.
CVE-2026-43226 Vulnerability in linux (CVE-2026-43226)
vulnerability in linux (CVE-2026-43226). Risk of unauthorized operations or information disclosure.
CVE-2026-43222 Vulnerability in linux (CVE-2026-43222)
vulnerability in linux (CVE-2026-43222). Successful exploitation can lead to full system takeover.
CVE-2026-43215 Vulnerability in CVE-2026-43215 (CVE-2026-43215)
vulnerability in CVE-2026-43215 (CVE-2026-43215). Successful exploitation can lead to full system takeover.
CVE-2026-43214 Vulnerability in c (CVE-2026-43214)
vulnerability in c (CVE-2026-43214). Successful exploitation can lead to full system takeover.
CVE-2026-43213 Vulnerability in c (CVE-2026-43213)
vulnerability in c (CVE-2026-43213). Successful exploitation can lead to full system takeover.
CVE-2026-43212 Vulnerability in CVE-2026-43212 (CVE-2026-43212)
vulnerability in CVE-2026-43212 (CVE-2026-43212). Successful exploitation can lead to full system takeover.
CVE-2026-43211 Vulnerability in CVE-2026-43211 (CVE-2026-43211)
vulnerability in CVE-2026-43211 (CVE-2026-43211). Successful exploitation can lead to full system takeover.
CVE-2026-43207 Vulnerability in CVE-2026-43207 (CVE-2026-43207)
vulnerability in CVE-2026-43207 (CVE-2026-43207). Successful exploitation can lead to full system takeover.
CVE-2026-43206 Vulnerability in privilege-escalation (CVE-2026-43206)
vulnerability in privilege-escalation (CVE-2026-43206). Successful exploitation can lead to full system takeover.
CVE-2026-43203 Vulnerability in CVE-2026-43203 (CVE-2026-43203)
vulnerability in CVE-2026-43203 (CVE-2026-43203). Successful exploitation can lead to full system takeover.
CVE-2026-43199 Vulnerability in CVE-2026-43199 (CVE-2026-43199)
vulnerability in CVE-2026-43199 (CVE-2026-43199). Risk of unauthorized operations or information disclosure.
CVE-2026-43194 Vulnerability in CVE-2026-43194 (CVE-2026-43194)
vulnerability in CVE-2026-43194 (CVE-2026-43194). Risk of unauthorized operations or information disclosure.
CVE-2026-43190 Vulnerability in c (CVE-2026-43190)
vulnerability in c (CVE-2026-43190). Risk of unauthorized operations or information disclosure.
CVE-2026-43187 Vulnerability in CVE-2026-43187 (CVE-2026-43187)
vulnerability in CVE-2026-43187 (CVE-2026-43187). Successful exploitation can lead to full system takeover.
CVE-2026-43184 Vulnerability in CVE-2026-43184 (CVE-2026-43184)
vulnerability in CVE-2026-43184 (CVE-2026-43184). Confidential information can be exposed externally.
CVE-2026-43180 Vulnerability in CVE-2026-43180 (CVE-2026-43180)
vulnerability in CVE-2026-43180 (CVE-2026-43180). Successful exploitation can lead to full system takeover.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →