Filter and search through 198,350 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-68292 | In the Linux kernel, the following vulnerability has been resolved: mm/memfd: fix information leak in hugetlb folios When allocating hugetlb folios ... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2025-68291 | In the Linux kernel, the following vulnerability has been resolved: mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fast... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68290 | In the Linux kernel, the following vulnerability has been resolved: most: usb: fix double free on late probe failure The MOST subsystem has a non-st... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68289 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_eem: Fix memory leak in eem_unwrap The existing code did not hand... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68288 | In the Linux kernel, the following vulnerability has been resolved: usb: storage: Fix memory leak in USB bulk transport A kernel memory leak was ide... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68287 | In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call path... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68286 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check NULL before accessing [WHAT] IGT kms_cursor_legacy's long... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68285 | In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68284 | In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() The... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68283 | In the Linux kernel, the following vulnerability has been resolved: libceph: replace BUG_ON with bounds check for map->max_osd OSD indexes come from... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68282 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: udc: fix use-after-free in usb_gadget_state_work A race condition d... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68281 | In the Linux kernel, the following vulnerability has been resolved: ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list "struct sdca_control... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68278 | ### Summary ```tinacms``` uses the ```gray-matter``` package in an insecure way allowing attackers that can control the content of the processed markd... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68274 | ### Description A nil pointer dereference vulnerability was discovered in the SIPGO library's `NewResponseFromRequest` function that affects all norm... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68266 | In the Linux kernel, the following vulnerability has been resolved: bfs: Reconstruct file type when loading from disk syzbot is reporting that S_IFM... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68265 | In the Linux kernel, the following vulnerability has been resolved: nvme: fix admin request_queue lifetime The namespaces can access the controller'... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68264 | In the Linux kernel, the following vulnerability has been resolved: ext4: refresh inline data size before write operations The cached ei->i_inline_s... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68263 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: ipc: fix use-after-free in ipc_msg_send_request ipc_msg_send_request() wa... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68262 | In the Linux kernel, the following vulnerability has been resolved: crypto: zstd - fix double-free in per-CPU stream cleanup The crypto/zstd module ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68261 | In the Linux kernel, the following vulnerability has been resolved: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() Fix a race ... | 0.0 | 0 | Neutral | No | Yes |