Zero-Day Vulnerability Tracker

Real-time CVE monitoring from CISA Known Exploited Vulnerabilities and National Vulnerability Database. Stay protected with instant security alerts and comprehensive threat intelligence.

CISA KEV Vulnerabilities

8

NVD Recent CVEs

6

Total Tracked

14

CISA KEV
Critical

CVE-2025-58360: OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability

OSGeo GeoServer contains an improper restriction of XML external entity reference vulnerability that occurs when the application accepts XML input through a specific endpoint /geoserver/wms operation ...

Affected Product

OSGeo GeoServer

CISA KEV
Critical

CVE-2025-6218: RARLAB WinRAR Path Traversal Vulnerability

RARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.

Affected Product

RARLAB WinRAR

CISA KEV
Critical

CVE-2025-62221: Microsoft Windows Use After Free Vulnerability

Microsoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.

Affected Product

Microsoft Windows

CISA KEV
Critical

CVE-2022-37055: D-Link Routers Buffer Overflow Vulnerability

D-Link Routers contains a buffer overflow vulnerability that has a high impact on confidentiality, integrity, and availability. The impacted products could be end-of-life (EoL) and/or end-of-service (...

Affected Product

D-Link Routers

CISA KEV
Critical

CVE-2025-66644: Array Networks ArrayOS AG OS Command Injection Vulnerability

Array Networks ArrayOS AG contains an OS command injection vulnerability that could allow an attacker to execute arbitrary commands.

Affected Product

Array Networks ArrayOS AG

CISA KEV
Critical

CVE-2025-55182: Meta React Server Components Remote Code Execution Vulnerability

Meta React Server Components contains a remote code execution vulnerability that could allow unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Serv...

Affected Product

Meta React Server Components

CISA KEV
Critical

CVE-2021-26828: OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability

OpenPLC ScadaBR contains an unrestricted upload of file with dangerous type vulnerability that allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.

Affected Product

OpenPLC ScadaBR

CISA KEV
Critical

CVE-2025-48633: Android Framework Information Disclosure Vulnerability

Android Framework contains an unspecified vulnerability that allows for information disclosure.

Affected Product

Android Framework

NVD
Low

CVE-1999-1506: CVE-1999-1506

Vulnerability in SMI Sendmail 4.0 and earlier, on SunOS up to 4.0.3, allows remote attackers to access user bin.

NVD
Low

CVE-1999-1467: CVE-1999-1467

Vulnerability in rcp on SunOS 4.0.x allows remote attackers from trusted hosts to execute arbitrary commands as root, possibly related to the configuration of the nobody user.

NVD
Low

CVE-1999-1122: CVE-1999-1122

Vulnerability in restore in SunOS 4.0.3 and earlier allows local users to gain privileges.

NVD
Low

CVE-1999-1471: CVE-1999-1471

Buffer overflow in passwd in BSD based operating systems 4.3 and earlier allows local users to gain root privileges by specifying a long shell or GECOS field.

NVD
Low

CVE-1999-0082: CVE-1999-0082

CWD ~root command in ftpd allows root access.

NVD
Low

CVE-1999-0095: CVE-1999-0095

The debug command in Sendmail is enabled, allowing attackers to execute commands as root.

Trusted Data Sources

CISA KEV Catalog

Known Exploited Vulnerabilities catalog maintained by the Cybersecurity and Infrastructure Security Agency (CISA). These vulnerabilities are actively being exploited in the wild and require immediate attention from security teams worldwide.

National Vulnerability Database

The NVD provides comprehensive CVE information with CVSS scoring, vulnerability descriptions, and technical details maintained by the National Institute of Standards and Technology (NIST). Essential resource for vulnerability management and security operations.