Zero-Day Vulnerability Tracker

Real-time CVE monitoring from CISA Known Exploited Vulnerabilities and National Vulnerability Database. Stay protected with instant security alerts and comprehensive threat intelligence.

CISA KEV Vulnerabilities

8

NVD Recent CVEs

6

Total Tracked

14

CISA KEV
Critical

CVE-2021-22175: GitLab Server-Side Request Forgery (SSRF) Vulnerability

GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.

Affected Product

GitLab GitLab

CISA KEV
Critical

CVE-2026-22769: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability

Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlyin...

Affected Product

Dell RecoverPoint for Virtual Machines (RP4VMs)

CISA KEV
Critical

CVE-2020-7796: Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability

Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery vulnerability if WebEx zimlet installed and zimlet JSP is enabled.

Affected Product

Synacor Zimbra Collaboration Suite

CISA KEV
Critical

CVE-2024-7694: TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability

TeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remo...

Affected Product

TeamT5 ThreatSonar Anti-Ransomware

CISA KEV
Critical

CVE-2008-0015: Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability

Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the ...

Affected Product

Microsoft Windows

CISA KEV
Critical

CVE-2026-2441: Google Chromium CSS Use-After-Free Vulnerability

Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple ...

Affected Product

Google Chromium

CISA KEV
Critical

CVE-2026-1731: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability

BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute opera...

Affected Product

BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)

CISA KEV
Critical

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability

Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capabi...

Affected Product

Apple Multiple Products

NVD
Low

CVE-1999-1506: CVE-1999-1506

Vulnerability in SMI Sendmail 4.0 and earlier, on SunOS up to 4.0.3, allows remote attackers to access user bin.

NVD
Low

CVE-1999-1467: CVE-1999-1467

Vulnerability in rcp on SunOS 4.0.x allows remote attackers from trusted hosts to execute arbitrary commands as root, possibly related to the configuration of the nobody user.

NVD
Low

CVE-1999-1122: CVE-1999-1122

Vulnerability in restore in SunOS 4.0.3 and earlier allows local users to gain privileges.

NVD
Low

CVE-1999-1471: CVE-1999-1471

Buffer overflow in passwd in BSD based operating systems 4.3 and earlier allows local users to gain root privileges by specifying a long shell or GECOS field.

NVD
Low

CVE-1999-0082: CVE-1999-0082

CWD ~root command in ftpd allows root access.

NVD
Low

CVE-1999-0095: CVE-1999-0095

The debug command in Sendmail is enabled, allowing attackers to execute commands as root.

Trusted Data Sources

CISA KEV Catalog

Known Exploited Vulnerabilities catalog maintained by the Cybersecurity and Infrastructure Security Agency (CISA). These vulnerabilities are actively being exploited in the wild and require immediate attention from security teams worldwide.

National Vulnerability Database

The NVD provides comprehensive CVE information with CVSS scoring, vulnerability descriptions, and technical details maintained by the National Institute of Standards and Technology (NIST). Essential resource for vulnerability management and security operations.