Lyrie
← All streams

CVE Deep Dives

Critical vulnerabilities, dissected.

286 stories

CRITICAL: CVE-2026-34615 (CVSS 9.3) — adobe connect

1 min·3 sources·CVE-2026-34615

CRITICAL: CVE-2026-27303 (CVSS 9.6) — adobe connect

1 min·3 sources·CVE-2026-27303

CRITICAL: CVE-2026-27246 (CVSS 9.3) — adobe connect

1 min·3 sources·CVE-2026-27246

CRITICAL: CVE-2026-27245 (CVSS 9.3) — adobe connect

1 min·3 sources·CVE-2026-27245

CRITICAL: CVE-2026-27243 (CVSS 9.3) — adobe connect

1 min·3 sources·CVE-2026-27243

CRITICAL: CVE-2026-1114 (CVSS 9.8) — lollms lollms

1 min·3 sources·CVE-2026-1114

CRITICAL: CVE-2026-34989 (CVSS 9) — ci4-cms-erp ci4ms

1 min·3 sources·CVE-2026-34989

CRITICAL: CVE-2026-7156 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7156

CRITICAL: CVE-2026-7155 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7155

CRITICAL: CVE-2026-7154 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7154

CRITICAL: CVE-2026-7152 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7152

CRITICAL: CVE-2026-7153 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7153

CRITICAL: CVE-2025-59557 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-59557

CRITICAL: CVE-2025-59007 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2025-59007

CRITICAL: CVE-2025-58963 (CVSS 10) — multiple products

1 min·3 sources·CVE-2025-58963

CRITICAL: CVE-2025-58951 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-58951

CRITICAL: CVE-2025-49931 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-49931

CRITICAL: CVE-2025-49915 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-49915

CRITICAL: CVE-2025-49380 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2025-49380

CRITICAL: CVE-2025-49055 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-49055

CRITICAL: CVE-2025-48089 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-48089

CRITICAL: CVE-2026-40372 (CVSS 9.1) — microsoft asp.net core

1 min·3 sources·CVE-2026-40372

CRITICAL: CVE-2026-5652 (CVSS 9) — craftycontrol crafty controller

1 min·3 sources·CVE-2026-5652

CRITICAL: CVE-2026-40351 (CVSS 9.8) — fastgpt fastgpt

1 min·3 sources·CVE-2026-40351

CRITICAL: CVE-2026-40575 (CVSS 9.1) — oauth2 proxy project oauth2 proxy

1 min·3 sources·CVE-2026-40575

CRITICAL: CVE-2025-44560 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2025-44560

CRITICAL: CVE-2025-66956 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2025-66956

CRITICAL: CVE-2025-69902 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2025-69902

CRITICAL: CVE-2025-70024 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2025-70024

CRITICAL: CVE-2025-70041 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2025-70041

CRITICAL: CVE-2026-25818 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-25818

CRITICAL: CVE-2026-25823 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-25823

CRITICAL: CVE-2026-29861 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-29861

CRITICAL: CVE-2026-30625 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-30625

CRITICAL: CVE-2026-31048 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31048

CRITICAL: CVE-2026-31049 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31049

CRITICAL: CVE-2025-68034 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-68034

CRITICAL: CVE-2025-68001 (CVSS 10) — multiple products

1 min·3 sources·CVE-2025-68001

CRITICAL: CVE-2025-47588 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2025-47588

CRITICAL: CVE-2025-32222 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2025-32222

CRITICAL: CVE-2026-23781 (CVSS 9.8) — bmc control-m\/managed file transfer

1 min·3 sources·CVE-2026-23781

CRITICAL: CVE-2025-70948 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-70948

CRITICAL: CVE-2026-5850 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5850

CRITICAL: CVE-2026-5851 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5851

CRITICAL: CVE-2026-5852 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5852

CRITICAL: CVE-2026-5853 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5853

CRITICAL: CVE-2026-5854 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5854

CRITICAL: CVE-2026-5975 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5975

CRITICAL: CVE-2026-5976 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5976

CRITICAL: CVE-2026-5977 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5977

CRITICAL: CVE-2026-5978 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5978

CRITICAL: CVE-2026-5993 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5993

CRITICAL: CVE-2026-5994 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5994

CRITICAL: CVE-2026-5995 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5995

CRITICAL: CVE-2026-5996 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5996

CRITICAL: CVE-2026-5997 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-5997

CRITICAL: CVE-2026-6025 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6025

CRITICAL: CVE-2026-6026 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6026

CRITICAL: CVE-2026-6027 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6027

CRITICAL: CVE-2026-6028 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6028

CRITICAL: CVE-2026-6029 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6029

CRITICAL: CVE-2026-6112 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6112

CRITICAL: CVE-2026-6113 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6113

CRITICAL: CVE-2026-6114 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6114

CRITICAL: CVE-2026-6115 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6115

CRITICAL: CVE-2026-6116 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6116

CRITICAL: CVE-2026-6131 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6131

CRITICAL: CVE-2026-6132 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6132

CRITICAL: CVE-2026-6138 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6138

CRITICAL: CVE-2026-6139 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6139

CRITICAL: CVE-2026-6140 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6140

CRITICAL: CVE-2026-6154 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6154

CRITICAL: CVE-2026-6155 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6155

CRITICAL: CVE-2026-6156 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6156

CRITICAL: CVE-2026-0740 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-0740

CRITICAL: CVE-2026-3296 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-3296

CRITICAL: CVE-2026-3535 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-3535

CRITICAL: CVE-2026-4003 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-4003

CRITICAL: CVE-2025-69809 (CVSS 9.8) — p2r3 bareiron

1 min·3 sources·CVE-2025-69809

CRITICAL: CVE-2025-69808 (CVSS 9.1) — p2r3 bareiron

1 min·3 sources·CVE-2025-69808

CRITICAL: CVE-2026-41176 (CVSS 9.8) — rclone rclone

1 min·3 sources·CVE-2026-41176

CRITICAL: CVE-2026-41179 (CVSS 9.8) — rclone rclone

1 min·3 sources·CVE-2026-41179

CRITICAL: CVE-2025-67945 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-67945

CRITICAL: CVE-2025-67944 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2025-67944

CRITICAL: CVE-2025-67928 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-67928

CRITICAL: CVE-2025-67924 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2025-67924

CRITICAL: CVE-2025-67910 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2025-67910

CRITICAL: CVE-2025-66078 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2025-66078

CRITICAL: CVE-2025-66074 (CVSS 9) — multiple products

1 min·3 sources·CVE-2025-66074

CRITICAL: CVE-2025-60062 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-60062

CRITICAL: CVE-2026-5503 (CVSS 9.1) — wolfssl wolfssl

1 min·3 sources·CVE-2026-5503

CRITICAL: CVE-2024-42479 (CVSS 10) — ggml llama.cpp

1 min·3 sources·CVE-2024-42479

CRITICAL: CVE-2018-25270 (CVSS 9.8) — thinkphp thinkphp

1 min·3 sources·CVE-2018-25270

CRITICAL: CVE-2026-7140 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7140

CRITICAL: CVE-2026-7139 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7139

CRITICAL: CVE-2025-52773 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-52773

CRITICAL: CVE-2025-52758 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2025-52758

CRITICAL: CVE-2025-23993 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2025-23993

CRITICAL: CVE-2026-33656 (CVSS 9.1) — espocrm espocrm

1 min·3 sources·CVE-2026-33656

CRITICAL: CVE-2026-32298 (CVSS 9.1) — angeet es3 kvm firmware

1 min·3 sources·CVE-2026-32298

CRITICAL: CVE-2026-38835 (CVSS 9.8) — tenda w30e firmware

1 min·3 sources·CVE-2026-38835

CRITICAL: CVE-2026-7138 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7138

CRITICAL: CVE-2026-7137 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7137

CRITICAL: CVE-2026-7136 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7136

CRITICAL: CVE-2026-41462 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-41462

CRITICAL: CVE-2026-40860 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-40860

CRITICAL: CVE-2026-40453 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-40453

CRITICAL: CVE-2026-33454 (CVSS 9.4) — multiple products

1 min·3 sources·CVE-2026-33454

CRITICAL: CVE-2026-30352 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-30352

CRITICAL: CVE-2025-64231 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2025-64231

CRITICAL: CVE-2026-30269 (CVSS 9.9) — doorman doorman

1 min·3 sources·CVE-2026-30269

CRITICAL: CVE-2026-33453 (CVSS 10) — multiple products

2 min·3 sources·CVE-2026-33453

CRITICAL: CVE-2026-31685 (CVSS 9.4) — multiple products

1 min·3 sources·CVE-2026-31685

CRITICAL: CVE-2026-31682 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-31682

CRITICAL: CVE-2026-31669 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31669

CRITICAL: CVE-2026-31668 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31668

CRITICAL: CVE-2026-31659 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31659

CRITICAL: CVE-2026-31657 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31657

CRITICAL: CVE-2026-31649 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31649

CRITICAL: CVE-2026-31637 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31637

CRITICAL: CVE-2026-31636 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-31636

CRITICAL: CVE-2026-31633 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31633

CRITICAL: CVE-2026-31609 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31609

CRITICAL: CVE-2026-31608 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31608

CRITICAL: CVE-2026-31607 (CVSS 9.8) — multiple products

2 min·3 sources·CVE-2026-31607

CRITICAL: CVE-2026-31589 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31589

CRITICAL: CVE-2026-31536 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31536

CRITICAL: CVE-2026-31533 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31533

CRITICAL: CVE-2026-31501 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31501

CRITICAL: CVE-2026-31478 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31478

CRITICAL: CVE-2025-50002 (CVSS 10) — multiple products

1 min·3 sources·CVE-2025-50002

CRITICAL: CVE-2026-40911 (CVSS 10) — wwbn avideo

1 min·3 sources·CVE-2026-40911

CRITICAL: CVE-2026-33078 (CVSS 9.8) — roxy-wi roxy-wi

1 min·3 sources·CVE-2026-33078

CRITICAL: CVE-2026-41329 (CVSS 9.9) — openclaw openclaw

1 min·3 sources·CVE-2026-41329

CRITICAL: CVE-2026-33076 (CVSS 9.8) — roxy-wi roxy-wi

1 min·3 sources·CVE-2026-33076

CRITICAL: CVE-2026-40884 (CVSS 9.8) — goshs goshs

1 min·3 sources·CVE-2026-40884

CRITICAL: CVE-2026-25660 (CVSS 9.8) — ericsson codechecker

1 min·3 sources·CVE-2026-25660

CRITICAL: CVE-2026-40342 (CVSS 9.9) — firebirdsql firebird

1 min·3 sources·CVE-2026-40342

CRITICAL: CVE-2026-31463 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31463

CRITICAL: CVE-2026-31448 (CVSS 9.4) — multiple products

2 min·3 sources·CVE-2026-31448

CRITICAL: CVE-2026-31444 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31444

CRITICAL: CVE-2026-31436 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31436

CRITICAL: CVE-2026-31414 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31414

CRITICAL: CVE-2026-31405 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31405

CRITICAL: CVE-2026-31402 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31402

CRITICAL: CVE-2026-23455 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-23455

CRITICAL: CVE-2026-23450 (CVSS 9.8) — multiple products

2 min·3 sources·CVE-2026-23450

CRITICAL: CVE-2026-23428 (CVSS 9.8) — linux linux kernel

2 min·3 sources·CVE-2026-23428

CRITICAL: CVE-2026-23427 (CVSS 9.8) — linux linux kernel

2 min·3 sources·CVE-2026-23427

CRITICAL: CVE-2026-22984 (CVSS 9.8) — linux linux kernel

1 min·3 sources·CVE-2026-22984

CRITICAL: CVE-2026-33516 (CVSS 9.1) — neutrinolabs xrdp

1 min·3 sources·CVE-2026-33516

CRITICAL: CVE-2026-33689 (CVSS 9.1) — neutrinolabs xrdp

1 min·3 sources·CVE-2026-33689

CRITICAL: CVE-2026-40572 (CVSS 9) — minecanton209 novumos

1 min·3 sources·CVE-2026-40572

CRITICAL: CVE-2026-40317 (CVSS 9.3) — minecanton209 novumos

1 min·3 sources·CVE-2026-40317

CRITICAL: CVE-2026-30836 (CVSS 10) — smallstep step-ca

1 min·3 sources·CVE-2026-30836

CRITICAL: CVE-2018-25254 (CVSS 9.8) — nico-ftp project nico-ftp

1 min·3 sources·CVE-2018-25254

CRITICAL: CVE-2026-7125 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7125

CRITICAL: CVE-2026-7124 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7124

CRITICAL: CVE-2026-7123 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7123

CRITICAL: CVE-2026-34275 (CVSS 9.8) — oracle advanced inbound telephony

1 min·3 sources·CVE-2026-34275

CRITICAL: CVE-2026-7122 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7122

CRITICAL: CVE-2026-7121 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7121

CRITICAL: CVE-2026-22337 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-22337

CRITICAL: CVE-2026-22336 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-22336

CRITICAL: CVE-2026-41409 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-41409

CRITICAL: CVE-2026-41635 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-41635

CRITICAL: CVE-2026-42363 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-42363

CRITICAL: CVE-2025-35051 (CVSS 9.8) — newforma project center

1 min·3 sources·CVE-2025-35051

CRITICAL: CVE-2026-7037 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-7037

CVE-2024-4577: PHP CGI Windows Character Encoding RCE

3 min·3 sources·cve-2024-4577-php-cgi-windows-character-encoding-rce

CVE-2024-3400: Palo Alto GlobalProtect Perfect-10 Command Injection

3 min·3 sources·cve-2024-3400-palo-alto-globalprotect-command-injection

CVE-2024-1709: ConnectWise ScreenConnect Supply Chain Breach Vector

3 min·3 sources·cve-2024-1709-connectwise-screenconnect-supply-chain-breach

CVE-2026-39987: Marimo Pre-Auth RCE — Root in One Request

3 min·3 sources·cve-2026-39987-marimo-pre-auth-rce-root-in-one-request

CVE-2024-7399: Samsung MagicINFO Path Traversal to SYSTEM-Level RCE

4 min·3 sources·cve-2024-7399-samsung-magicinfo-path-traversal-rce

CVE-2024-23897: Jenkins CLI Arbitrary File Read via args4j @ Expansion

6 min·3 sources·cve-2024-23897-jenkins-cli-arbitrary-file-read-args4j-expansion

CVE-2024-4577: PHP-CGI RCE via Windows Best-Fit Character Conversion

5 min·3 sources·cve-2024-4577-php-cgi-rce-windows-best-fit-character-conversion

CVE-2023-46604: Apache ActiveMQ OpenWire Deserialization RCE

5 min·3 sources·cve-2023-46604-apache-activemq-openwire-deserialization-rce

CRITICAL: CVE-2026-40173 (CVSS 9.4) — dgraph dgraph

1 min·3 sources·CVE-2026-40173

CRITICAL: CVE-2025-59707 (CVSS 9.8) — n2ws n2w

1 min·3 sources·CVE-2025-59707

CRITICAL: CVE-2025-59706 (CVSS 9.8) — n2ws n2w

1 min·3 sources·CVE-2025-59706

CRITICAL: CVE-2026-24467 (CVSS 9) — filigran openaev

2 min·3 sources·CVE-2026-24467

CRITICAL: CVE-2026-6951 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6951

CRITICAL: CVE-2026-41478 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-41478

CRITICAL: CVE-2026-41428 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-41428

CRITICAL: CVE-2026-41328 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-41328

CRITICAL: CVE-2026-41248 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-41248

CRITICAL: CVE-2026-41492 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-41492

CRITICAL: CVE-2026-34415 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-34415

CRITICAL: CVE-2026-29649 (CVSS 9.8) — xiangshan nemu

1 min·3 sources·CVE-2026-29649

CRITICAL: CVE-2026-33432 (CVSS 9.1) — roxy-wi roxy-wi

1 min·3 sources·CVE-2026-33432

CRITICAL: CVE-2026-41327 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-41327

CRITICAL: CVE-2026-41276 (CVSS 9.8) — flowiseai flowise

1 min·3 sources·CVE-2026-41276

CRITICAL: CVE-2025-50229 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2025-50229

CRITICAL: CVE-2026-3300 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-3300

CRITICAL: CVE-2026-4257 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-4257

CRITICAL: CVE-2026-39617 (CVSS 9.6) — multiple products

1 min·3 sources·CVE-2026-39617

CRITICAL: CVE-2026-39619 (CVSS 9.6) — multiple products

1 min·3 sources·CVE-2026-39619

CRITICAL: CVE-2026-39620 (CVSS 9.6) — multiple products

1 min·3 sources·CVE-2026-39620

CRITICAL: CVE-2026-39640 (CVSS 9.6) — multiple products

1 min·3 sources·CVE-2026-39640

CRITICAL: CVE-2026-2942 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-2942

CRITICAL: CVE-2026-1830 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-1830

CRITICAL: CVE-2026-6911 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6911

CRITICAL: CVE-2026-39920 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-39920

CRITICAL: CVE-2026-34078 (CVSS 10) — flatpak flatpak

1 min·3 sources·CVE-2026-34078

CRITICAL: CVE-2006-3601 (CVSS 10) — dnnsoftware DotNetNuke

4 min·3 sources·CVE-2006-3601

CRITICAL: CVE-2015-2794 (CVSS 9.8) — dnnsoftware dotnetnuke

1 min·3 sources·CVE-2015-2794

CRITICAL: CVE-2026-33471 (CVSS 9.6) — nimiq nimiq proof-of-stake

1 min·3 sources·CVE-2026-33471

CRITICAL: CVE-2026-40477 (CVSS 9) — thymeleaf thymeleaf

1 min·3 sources·CVE-2026-40477

CRITICAL: CVE-2026-40478 (CVSS 9) — thymeleaf thymeleaf

1 min·3 sources·CVE-2026-40478

CRITICAL: CVE-2026-34279 (CVSS 9.1) — oracle enterprise manager base platform

1 min·3 sources·CVE-2026-34279

CRITICAL: CVE-2026-6919 (CVSS 9.6) — google chrome

1 min·3 sources·CVE-2026-6919

CRITICAL: CVE-2026-6920 (CVSS 9.6) — google chrome

1 min·3 sources·CVE-2026-6920

CRITICAL: CVE-2026-25377 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-25377

CRITICAL: CVE-2026-25413 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-25413

CRITICAL: CVE-2026-25429 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-25429

CRITICAL: CVE-2026-25447 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-25447

CRITICAL: CVE-2026-27044 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-27044

CRITICAL: CVE-2026-27049 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-27049

CRITICAL: CVE-2026-27051 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-27051

CRITICAL: CVE-2026-27071 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-27071

CRITICAL: CVE-2026-27082 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-27082

CRITICAL: CVE-2026-27083 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-27083

CRITICAL: CVE-2026-27084 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-27084

CRITICAL: CVE-2026-27095 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-27095

CRITICAL: CVE-2026-31920 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-31920

CRITICAL: CVE-2026-32482 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-32482

CRITICAL: CVE-2026-32499 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-32499

CRITICAL: CVE-2026-32502 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-32502

CRITICAL: CVE-2026-32512 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-32512

CRITICAL: CVE-2026-32519 (CVSS 9) — multiple products

1 min·3 sources·CVE-2026-32519

CRITICAL: CVE-2026-32520 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-32520

CRITICAL: CVE-2026-32523 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-32523

CRITICAL: CVE-2026-32524 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-32524

CRITICAL: CVE-2026-32525 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-32525

CRITICAL: CVE-2026-32536 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-32536

CRITICAL: CVE-2026-32539 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-32539

CRITICAL: CVE-2026-32573 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-32573

CRITICAL: CVE-2026-22484 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-22484

CRITICAL: CVE-2026-22500 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-22500

CRITICAL: CVE-2026-22507 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-22507

CRITICAL: CVE-2026-24378 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-24378

CRITICAL: CVE-2026-24968 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-24968

CRITICAL: CVE-2026-24971 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-24971

CRITICAL: CVE-2026-24989 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-24989

CRITICAL: CVE-2026-24993 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-24993

CRITICAL: CVE-2026-25029 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-25029

CRITICAL: CVE-2026-25030 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-25030

CRITICAL: CVE-2026-25031 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-25031

CRITICAL: CVE-2026-25032 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-25032

CRITICAL: CVE-2026-25035 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-25035

CRITICAL: CVE-2026-25340 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-25340

CRITICAL: CVE-2026-25345 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-25345

CRITICAL: CVE-2026-25366 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-25366

CRITICAL: CVE-2026-25371 (CVSS 9.3) — multiple products

1 min·3 sources·CVE-2026-25371

CRITICAL: CVE-2026-4001 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-4001

CRITICAL: CVE-2026-4283 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-4283

CRITICAL: CVE-2026-4585 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-4585

CRITICAL: CVE-2026-6942 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6942

CRITICAL: CVE-2019-25687 (CVSS 9.8) — wisdom pegasus cms

1 min·3 sources·CVE-2019-25687

CRITICAL: CVE-2026-22679 (CVSS 9.8) — weaver e-cology

1 min·3 sources·CVE-2026-22679

CRITICAL: CVE-2026-41264 (CVSS 9.8) — flowiseai flowise

1 min·3 sources·CVE-2026-41264

CRITICAL: CVE-2026-41265 (CVSS 9.8) — flowiseai flowise

1 min·3 sources·CVE-2026-41265

CRITICAL: CVE-2026-41268 (CVSS 9.8) — flowiseai flowise

1 min·3 sources·CVE-2026-41268

CRITICAL: CVE-2026-31175 (CVSS 9.8) — totolink a3300r firmware

1 min·3 sources·CVE-2026-31175

CRITICAL: CVE-2021-4473 (CVSS 9.8) — topsecgroup tianxin internet behavior management system

1 min·3 sources·CVE-2021-4473

CRITICAL: CVE-2026-41304 (CVSS 9.8) — wwbn avideo

1 min·3 sources·CVE-2026-41304

CRITICAL: CVE-2026-41064 (CVSS 9.3) — wwbn avideo

1 min·3 sources·CVE-2026-41064

CRITICAL: CVE-2025-62373 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2025-62373

CRITICAL: CVE-2026-23751 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-23751

CRITICAL: CVE-2026-29198 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-29198

CRITICAL: CVE-2026-41228 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-41228

CRITICAL: CVE-2026-41229 (CVSS 9.1) — multiple products

1 min·3 sources·CVE-2026-41229

CRITICAL: CVE-2026-41460 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-41460

CRITICAL: CVE-2026-41679 (CVSS 10) — multiple products

1 min·3 sources·CVE-2026-41679

CRITICAL: CVE-2026-6885 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6885

CRITICAL: CVE-2026-6886 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6886

CRITICAL: CVE-2026-6887 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-6887

CRITICAL: CVE-2026-31177 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31177

CRITICAL: CVE-2026-31178 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31178

CRITICAL: CVE-2026-31181 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-31181

CRITICAL: CVE-2026-39087 (CVSS 9.8) — multiple products

1 min·3 sources·CVE-2026-39087

CRITICAL: CVE-2026-40470 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-40470

CRITICAL: CVE-2026-40471 (CVSS 9.6) — multiple products

1 min·3 sources·CVE-2026-40471

CRITICAL: CVE-2026-40472 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-40472

CRITICAL: CVE-2026-35431 (CVSS 10) — multiple products

1 min·3 sources·CVE-2026-35431

CRITICAL: CVE-2026-21515 (CVSS 9.9) — multiple products

1 min·3 sources·CVE-2026-21515