7.8

CVSS3.1

CVE-2026-22995 - ublk: fix use-after-free in ublk_partition_scan_work

In the Linux kernel, the following vulnerability has been resolved: ublk: fix use-after-free in ublk_partition_scan_work A race condition exists between the async partition scan work and device teardown that can lead to a use-after-free of ub->ub_disk: 1. ublk_ctrl_start_dev() schedules partitio…

πŸ“… Published: Jan. 23, 2026, midnight πŸ”„ Last Modified: April 18, 2026, 3:15 p.m.

3.3

CVSS3.1

CVE-2026-22978 - wifi: avoid kernel-infoleak from struct iw_point

In the Linux kernel, the following vulnerability has been resolved: wifi: avoid kernel-infoleak from struct iw_point struct iw_point has a 32bit hole on 64bit arches. struct iw_point { void __user *pointer; /* Pointer to the data (in user space) */ __u16 length; /* n…

πŸ“… Published: Jan. 23, 2026, midnight πŸ”„ Last Modified: April 18, 2026, 3:15 p.m.

5.5

CVSS3.1

CVE-2026-22994 - bpf: Fix reference count leak in bpf_prog_test_run_xdp()

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference count leak in bpf_prog_test_run_xdp() syzbot is reporting unregister_netdevice: waiting for sit0 to become free. Usage count = 2 problem. A debug printk() patch found that a refcount is obtained at xdp_conv…

πŸ“… Published: Jan. 23, 2026, midnight πŸ”„ Last Modified: April 18, 2026, 7 p.m.

5.5

CVSS3.1

CVE-2026-22982 - net: mscc: ocelot: Fix crash when adding interface under a lag

In the Linux kernel, the following vulnerability has been resolved: net: mscc: ocelot: Fix crash when adding interface under a lag Commit 15faa1f67ab4 ("lan966x: Fix crash when adding interface under a lag") fixed a similar issue in the lan966x driver caused by a NULL pointer dereference. The oce…

πŸ“… Published: Jan. 23, 2026, midnight πŸ”„ Last Modified: April 18, 2026, 7 p.m.

5.5

CVSS3.1

CVE-2025-71160 - netfilter: nf_tables: avoid chain re-validation if possible

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: avoid chain re-validation if possible Hamza Mahfooz reports cpu soft lock-ups in nft_chain_validate(): watchdog: BUG: soft lockup - CPU#1 stuck for 27s! [iptables-nft-re:37547] [..] RIP: 0010:nft_chain_va…

πŸ“… Published: Jan. 23, 2026, midnight πŸ”„ Last Modified: Feb. 26, 2026, 8:19 p.m.

5.3

CVSS3.1

CVE-2025-52023 -

A vulnerability in the PHP backend of gemscms.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API…

πŸ“… Published: Jan. 23, 2026, midnight πŸ”„ Last Modified: Feb. 11, 2026, 7:24 p.m.

9.4

CVSS3.1

CVE-2025-52025 -

An SQL Injection vulnerability exists in the GetServiceByRestaurantID endpoint of the Aptsys gemscms POS Platform backend thru 2025-05-28. The vulnerability arises because user input is directly inserted into a dynamic SQL query syntax without proper sanitization or parameterization. This allows an…

πŸ“… Published: Jan. 23, 2026, midnight πŸ”„ Last Modified: Feb. 11, 2026, 7:24 p.m.

7.8

CVSS3.1

CVE-2026-20613 -

The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using r…

πŸ“… Published: Jan. 22, 2026, 11:58 p.m. πŸ”„ Last Modified: April 18, 2026, 3:30 a.m.

7.7

CVSS4.0

CVE-2026-24132 - Orval Mock Generation Code Injection via const

Orval generates type-safe JS clients (TypeScript) from any valid OpenAPI v3 or Swagger v2 specification. Versions 7.19.0 and below and 8.0.0-rc.0 through 8.0.2 allow untrusted OpenAPI specifications to inject arbitrary TypeScript/JavaScript into generated mock files via the const keyword on schema…

πŸ“… Published: Jan. 22, 2026, 11:47 p.m. πŸ”„ Last Modified: April 18, 2026, 3:30 p.m.

6

CVSS4.0

CVE-2025-9290 - Authentication Weakness on Omada Controllers, Gateways and Access Points

An authentication weakness was identified in Omada Controllers, Gateways and Access Points, controller-device adoption due to improper handling of random values. Exploitation requires advanced network positioning and allows an attacker to intercept adoption traffic and forge valid authentication th…

πŸ“… Published: Jan. 22, 2026, 11:14 p.m. πŸ”„ Last Modified: March 16, 2026, 6:07 p.m.
Total resulsts: 348202
Page 1891 of 34,821
Β« previous page Β» next page
Filters