Filter and search through 195,863 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-40018 | In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer ip_vs_ftp unregister during netns cleanup On the netns cleanup path,... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2025-40017 | In the Linux kernel, the following vulnerability has been resolved: media: iris: Fix memory leak by freeing untracked persist buffer One internal bu... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40016 | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID Per UVC 1.1... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40015 | In the Linux kernel, the following vulnerability has been resolved: media: stm32-csi: Fix dereference before NULL check In 'stm32_csi_start', 'cside... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40013 | In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: audioreach: fix potential null pointer dereference It is possible th... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40012 | In the Linux kernel, the following vulnerability has been resolved: net/smc: fix warning in smc_rx_splice() when calling get_page() smc_lo_register_... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40011 | In the Linux kernel, the following vulnerability has been resolved: drm/gma500: Fix null dereference in hdmi teardown pci_set_drvdata sets the value... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40010 | In the Linux kernel, the following vulnerability has been resolved: afs: Fix potential null pointer dereference in afs_put_server afs_put_server() a... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40009 | In the Linux kernel, the following vulnerability has been resolved: fs/proc/task_mmu: check p->vec_buf for NULL When the PAGEMAP_SCAN ioctl is invok... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40008 | In the Linux kernel, the following vulnerability has been resolved: kmsan: fix out-of-bounds access to shadow memory Running sha224_kunit on a KMSAN... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40007 | In the Linux kernel, the following vulnerability has been resolved: netfs: fix reference leak Commit 20d72b00ca81 ("netfs: Fix the request's work it... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40006 | In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix folio is still mapped when deleted Migration may be raced with f... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40005 | In the Linux kernel, the following vulnerability has been resolved: spi: cadence-quadspi: Implement refcount to handle unbind during busy driver sup... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40004 | In the Linux kernel, the following vulnerability has been resolved: net/9p: Fix buffer overflow in USB transport layer A buffer overflow vulnerabili... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40003 | In the Linux kernel, the following vulnerability has been resolved: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work The origin c... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40002 | In the Linux kernel, the following vulnerability has been resolved: thunderbolt: Fix use-after-free in tb_dp_dprx_work The original code relies on c... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40001 | In the Linux kernel, the following vulnerability has been resolved: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue During the detaching of M... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-40000 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() There is a ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-39999 | In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix blk_mq_tags double free while nr_requests grown In the case user tri... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-39998 | In the Linux kernel, the following vulnerability has been resolved: scsi: target: target_core_configfs: Add length check to avoid buffer overflow A ... | 0.0 | 0 | Neutral | No | Yes |