Filter and search through 199,567 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-23526 | CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.0.0 through 2.54.0, users that have the staff st... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2026-23518 | ### Summary A vulnerability in Fleet’s Windows MDM enrollment flow could allow an attacker to submit forged authentication tokens that are not proper... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23517 | ### Summary A broken access control issue in Fleet allowed authenticated users to access debug and profiling endpoints regardless of role. As a resul... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23516 | CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.2.0 through 2.54.0, an attacker is able to execu... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23499 | Saleor is an e-commerce platform. Starting in version 3.0.0 and prior to versions 3.20.108, 3.21.43, and 3.22.27, Saleor allowed authenticated staff u... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23478 | Cal.com is open-source scheduling software. From 3.1.6 to before 6.0.7, there is a vulnerability in a custom NextAuth JWT callback that allows attacke... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-23014 | In the Linux kernel, the following vulnerability has been resolved: perf: Ensure swevent hrtimer is properly destroyed With the change to hrtimer_tr... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23013 | In the Linux kernel, the following vulnerability has been resolved: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback octep_vf_request... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23012 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: remove call_control in inactive contexts If damon_call() is execu... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23011 | In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_gre: make ipgre_header() robust Analog to commit db5b4e39c4e6 ("ip6_gre... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23010 | In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix use-after-free in inet6_addr_del(). syzbot reported use-after-free of ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23009 | In the Linux kernel, the following vulnerability has been resolved: xhci: sideband: don't dereference freed ring when removing sideband endpoint xhc... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23008 | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix KMS with 3D on HW version 10 HW version 10 does not have GB Surf... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23007 | In the Linux kernel, the following vulnerability has been resolved: block: zero non-PI portion of auto integrity buffer The auto-generated integrity... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23006 | In the Linux kernel, the following vulnerability has been resolved: ASoC: tlv320adcx140: fix null pointer The "snd_soc_component" in "adcx140_priv" ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23005 | In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1 When loading ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23004 | In the Linux kernel, the following vulnerability has been resolved: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() syzbot was ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23003 | In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() Blamed commit did not... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23002 | In the Linux kernel, the following vulnerability has been resolved: lib/buildid: use __kernel_read() for sleepable context Prevent a "BUG: unable to... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23001 | In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (str... | 0.0 | 0 | Neutral | No | Yes |