Filter and search through 392,315 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-23011 | In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_gre: make ipgre_header() robust Analog to commit db5b4e39c4e6 ("ip6_gre... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-23010 | In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix use-after-free in inet6_addr_del(). syzbot reported use-after-free of ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23009 | In the Linux kernel, the following vulnerability has been resolved: xhci: sideband: don't dereference freed ring when removing sideband endpoint xhc... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23008 | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix KMS with 3D on HW version 10 HW version 10 does not have GB Surf... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23007 | In the Linux kernel, the following vulnerability has been resolved: block: zero non-PI portion of auto integrity buffer The auto-generated integrity... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23006 | In the Linux kernel, the following vulnerability has been resolved: ASoC: tlv320adcx140: fix null pointer The "snd_soc_component" in "adcx140_priv" ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23005 | In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1 When loading ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23004 | In the Linux kernel, the following vulnerability has been resolved: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() syzbot was ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23003 | In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() Blamed commit did not... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23002 | In the Linux kernel, the following vulnerability has been resolved: lib/buildid: use __kernel_read() for sleepable context Prevent a "BUG: unable to... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23001 | In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (str... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23000 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash on profile change rollback failure mlx5e_netdev_change_prof... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22999 | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: do not free existing class in qfq_change_class() Fixes qfq_c... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22998 | In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec Commit efa5... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22997 | In the Linux kernel, the following vulnerability has been resolved: net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon recei... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22996 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv mlx5e_priv is an uns... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22995 | In the Linux kernel, the following vulnerability has been resolved: ublk: fix use-after-free in ublk_partition_scan_work A race condition exists bet... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22994 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference count leak in bpf_prog_test_run_xdp() syzbot is reporting ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22993 | In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL ptr issue after soft reset During soft reset, the RSS LUT... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22992 | In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler error from mon_handle_auth_done() Currently any erro... | 0.0 | 0 | Neutral | No | Yes |