Latest CVE Feed
-
0.0
NACVE-2025-38095
In the Linux kernel, the following vulnerability has been resolved: dma-buf: insert memory barrier before updating num_fences smp_store_mb() inserts memory barrier after storing operation. It is different with what the comment is originally aiming so Nu... Read more
Affected Products : linux_kernel- Published: Jul. 03, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-37953
In the Linux kernel, the following vulnerability has been resolved: sch_htb: make htb_deactivate() idempotent Alan reported a NULL pointer dereference in htb_next_rb_node() after we made htb_qlen_notify() idempotent. It turns out in the following case ... Read more
Affected Products : linux_kernel- Published: May. 20, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-37932
In the Linux kernel, the following vulnerability has been resolved: sch_htb: make htb_qlen_notify() idempotent htb_qlen_notify() always deactivates the HTB class and in fact could trigger a warning if it is already deactivated. Therefore, it is not idem... Read more
Affected Products : linux_kernel- Published: May. 20, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-37925
In the Linux kernel, the following vulnerability has been resolved: jfs: reject on-disk inodes of an unsupported type Syzbot has reported the following BUG: kernel BUG at fs/inode.c:668! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 3 UID:... Read more
Affected Products : linux_kernel- Published: Apr. 18, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-37798
In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making all ->qlen_notify() callbacks idempotent, now it is safe to remove the check of qlen!=0 from both fq_code... Read more
Affected Products : linux_kernel- Published: May. 02, 2025
- Modified: Aug. 28, 2025
-
0.0
NACVE-2025-37752
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters... Read more
Affected Products : linux_kernel- Published: May. 01, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-21912
In the Linux kernel, the following vulnerability has been resolved: gpio: rcar: Use raw_spinlock to protect register access Use raw_spinlock in order to fix spurious messages about invalid context when spinlock debugging is enabled. The lock is only use... Read more
Affected Products : linux_kernel- Published: Apr. 01, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-21884
In the Linux kernel, the following vulnerability has been resolved: net: better track kernel sockets lifetime While kernel sockets are dismantled during pernet_operations->exit(), their freeing can be delayed by any tx packets still held in qdisc or dev... Read more
Affected Products : linux_kernel- Published: Mar. 27, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2025-1891
A vulnerability was found in shishuocms 1.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public... Read more
- Published: Mar. 04, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Cross-Site Request Forgery
-
5.5
MEDIUMCVE-2024-57996
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check in k... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2024-53237
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix use-after-free in device_for_each_child() Syzbot has reported the following KASAN splat: BUG: KASAN: slab-use-after-free in device_for_each_child+0x18f/0x1a0 Read of siz... Read more
Affected Products : linux_kernel- Published: Dec. 27, 2024
- Modified: Aug. 28, 2025
-
10.0
CRITICALCVE-2024-51555
Default Credentail vulnerabilities allows access to an Aspect device using publicly available default credentials since the system does not require the installer to change default credentials. Affected products: ABB ASPECT - Enterprise v3.07.02; NEXUS... Read more
Affected Products :- Published: Dec. 05, 2024
- Modified: Aug. 28, 2025
-
5.5
MEDIUMCVE-2024-42085
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock When config CONFIG_USB_DWC3_DUAL_ROLE is selected, and trigger system to enter suspend status wit... Read more
Affected Products : linux_kernel- Published: Jul. 29, 2024
- Modified: Aug. 28, 2025
-
7.8
HIGHCVE-2024-26958
In the Linux kernel, the following vulnerability has been resolved: nfs: fix UAF in direct writes In production we have been hitting the following warning consistently ------------[ cut here ]------------ refcount_t: underflow; use-after-free. WARNING:... Read more
- Published: May. 01, 2024
- Modified: Aug. 28, 2025
-
8.6
HIGHCVE-2024-21549
Versions of the package spatie/browsershot before 5.0.3 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method. An attacker can exploit this vulnerability by utilizing view-source:file://, which allows for arb... Read more
Affected Products : browsershot- Published: Dec. 20, 2024
- Modified: Aug. 28, 2025
-
7.8
HIGHCVE-2023-52572
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix UAF in cifs_demultiplex_thread() There is a UAF when xfstests on cifs: BUG: KASAN: use-after-free in smb2_is_network_name_deleted+0x27/0x160 Read of size 4 at addr ffff88... Read more
Affected Products : linux_kernel- Published: Mar. 02, 2024
- Modified: Aug. 28, 2025
-
0.0
NACVE-2022-50070
In the Linux kernel, the following vulnerability has been resolved: mptcp: do not queue data on closed subflows Dipanjan reported a syzbot splat at close time: WARNING: CPU: 1 PID: 10818 at net/ipv4/af_inet.c:153 inet_sock_destruct+0x6d0/0x8e0 net/ipv4... Read more
Affected Products : linux_kernel- Published: Jun. 18, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Race Condition
-
5.5
MEDIUMCVE-2021-47498
In the Linux kernel, the following vulnerability has been resolved: dm rq: don't queue request to blk-mq during DM suspend DM uses blk-mq's quiesce/unquiesce to stop/start device mapper queue. But blk-mq's unquiesce may come from outside events, such a... Read more
Affected Products : linux_kernel- Published: May. 22, 2024
- Modified: Aug. 28, 2025
-
5.5
MEDIUMCVE-2021-47455
In the Linux kernel, the following vulnerability has been resolved: ptp: Fix possible memory leak in ptp_clock_register() I got memory leak as follows when doing fault injection test: unreferenced object 0xffff88800906c618 (size 8): comm "i2c-idt82p3... Read more
Affected Products : linux_kernel- Published: May. 22, 2024
- Modified: Aug. 28, 2025
-
0.0
NACVE-2021-47421
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume In current code, when a PCI error state pci_channel_io_normal is detectd, it will report PCI_ERS_RESULT_CA... Read more
Affected Products : linux_kernel- Published: May. 21, 2024
- Modified: Aug. 28, 2025