CVE Tracker
Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.
1,539
Total CVEs
1,539
CISA KEV
1539
Critical & High
Mar 9, 2026
Last KEV Update
| CVE ID | Severity | Vendor | Description | Published | KEV |
|---|---|---|---|---|---|
| CVE-2021-22054 | High | OmnissaWorkspace One UEM | Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information. | Mar 9, 2026 | KEV |
| CVE-2025-26399 | High | SolarWindsWeb Help Desk | SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine. | Mar 9, 2026 | KEV |
| CVE-2026-1603 | High | Ivanti Endpoint Manager (EPM) | Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data. | Mar 9, 2026 | KEV |
| CVE-2017-7921 | High | HikvisionMultiple Products | Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information. | Mar 5, 2026 | KEV |
| CVE-2021-22681 | High | RockwellMultiple Products | Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controllers are communicating with Rockwell Automation design software. If successfully exploited, this vulnerability could allow an unauthorized application to connect with Logix controllers. To leverage this vulnerability, an unauthorized user would require network access to the controller. | Mar 5, 2026 | KEV |
| CVE-2023-43000 | High | AppleMultiple Products | Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption. | Mar 5, 2026 | KEV |
| CVE-2021-30952 | High | AppleMultiple Products | Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution. | Mar 5, 2026 | KEV |
| CVE-2023-41974 | High | AppleiOS and iPadOS | Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges. | Mar 5, 2026 | KEV |
| CVE-2026-22719 | High | BroadcomVMware Aria Operations | Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration. | Mar 3, 2026 | KEV |
| CVE-2026-21385 | High | QualcommMultiple Chipsets | Multiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation. | Mar 3, 2026 | KEV |
| CVE-2022-20775 | High | CiscoSD-WAN | Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. | Feb 25, 2026 | KEV |
| CVE-2026-20127 | High | CiscoCatalyst SD-WAN Controller and Manager | Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. | Feb 25, 2026 | KEV |
| CVE-2026-25108 | High | Soliton Systems K.KFileZen | Soliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request. | Feb 24, 2026 | KEV |
| CVE-2025-49113 | High | RoundcubeWebmail | RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php. | Feb 20, 2026 | KEV |
| CVE-2025-68461 | High | RoundcubeWebmail | RoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document. | Feb 20, 2026 | KEV |
| CVE-2021-22175 | High | GitLabGitLab | GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled. | Feb 18, 2026 | KEV |
| CVE-2026-22769 | High | DellRecoverPoint for Virtual Machines (RP4VMs) | Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence. | Feb 18, 2026 | KEV |
| CVE-2020-7796 | High | SynacorZimbra Collaboration Suite | Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery vulnerability if WebEx zimlet installed and zimlet JSP is enabled. | Feb 17, 2026 | KEV |
| CVE-2024-7694 | High | TeamT5ThreatSonar Anti-Ransomware | TeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the server. | Feb 17, 2026 | KEV |
| CVE-2008-0015 | High | MicrosoftWindows | Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. | Feb 17, 2026 | KEV |