Filter and search through 392,393 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-23001 | In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (str... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-23000 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash on profile change rollback failure mlx5e_netdev_change_prof... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22999 | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: do not free existing class in qfq_change_class() Fixes qfq_c... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22998 | In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec Commit efa5... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22997 | In the Linux kernel, the following vulnerability has been resolved: net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon recei... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22996 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv mlx5e_priv is an uns... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22995 | In the Linux kernel, the following vulnerability has been resolved: ublk: fix use-after-free in ublk_partition_scan_work A race condition exists bet... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22994 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference count leak in bpf_prog_test_run_xdp() syzbot is reporting ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22993 | In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL ptr issue after soft reset During soft reset, the RSS LUT... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22992 | In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler error from mon_handle_auth_done() Currently any erro... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22991 | In the Linux kernel, the following vulnerability has been resolved: libceph: make free_choose_arg_map() resilient to partial allocation free_choose_... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22990 | In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22989 | In the Linux kernel, the following vulnerability has been resolved: nfsd: check that server is running in unlock_filesystem If we are trying to unlo... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22988 | In the Linux kernel, the following vulnerability has been resolved: arp: do not assume dev_hard_header() does not change skb->head arp_create() is t... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22987 | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy syzbot re... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22986 | In the Linux kernel, the following vulnerability has been resolved: gpiolib: fix race condition for gdev->srcu If two drivers were calling gpiochip_... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22985 | In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations The RSS LUT is ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22984 | In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22983 | In the Linux kernel, the following vulnerability has been resolved: net: do not write to msg_get_inq in callee NULL pointer dereference fix. msg_ge... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22982 | In the Linux kernel, the following vulnerability has been resolved: net: mscc: ocelot: Fix crash when adding interface under a lag Commit 15faa1f67a... | 0.0 | 0 | Neutral | No | Yes |