Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 5.15 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-4128
Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 ...
5.5
CVSSv3
CVE-2023-20588
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Amd Epyc 7351p Firmware -
Amd Epyc 7401p Firmware -
Amd Epyc 7551p Firmware -
Amd Epyc 7251 Firmware -
Amd Epyc 7261 Firmware -
Amd Epyc 7281 Firmware -
Amd Epyc 7301 Firmware -
Amd Epyc 7351 Firmware -
Amd Epyc 7371 Firmware -
Amd Epyc 7401 Firmware -
Amd Epyc 7451 Firmware -
Amd Epyc 7501 Firmware -
Amd Epyc 7551 Firmware -
Amd Epyc 7571 Firmware -
Amd Epyc 7601 Firmware -
Amd Ryzen 5 Pro 3400g Firmware -
Amd Ryzen 5 3400g Firmware -
Amd Ryzen 5 Pro 3400ge Firmware -
Amd Ryzen 5 Pro 3350g Firmware -
1 Article
7.8
CVSSv3
CVE-2023-4147
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
Linux Linux Kernel 6.5
Linux Linux Kernel
Fedoraproject Fedora 38
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux For Real Time For Nfv 9.0
Redhat Enterprise Linux For Real Time 9.0
Redhat Enterprise Linux Server Aus 9.2
Redhat Enterprise Linux Eus 9.2
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
7.8
CVSSv3
CVE-2023-4004
A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the ...
Linux Linux Kernel
Fedoraproject Fedora 38
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Netapp H300s -
Netapp H500s -
Netapp H700s -
Netapp H410s -
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
5.5
CVSSv3
CVE-2023-20593
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an malicious user to potentially access sensitive information.
Xen Xen 4.15.0
Xen Xen 4.17.0
Xen Xen 4.16.0
Xen Xen 4.14.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Amd Ryzen 3 3100 Firmware -
Amd Ryzen 3 3300x Firmware -
Amd Ryzen 5 3500 Firmware -
Amd Ryzen 5 3500x Firmware -
Amd Ryzen 5 3600 Firmware -
Amd Ryzen 5 3600x Firmware -
Amd Ryzen 5 3600xt Firmware -
Amd Ryzen 7 3700x Firmware -
Amd Ryzen 7 3800x Firmware -
Amd Ryzen 7 3800xt Firmware -
Amd Ryzen 9 3900 Firmware -
Amd Ryzen 9 3900x Firmware -
Amd Ryzen 9 3900xt Firmware -
Amd Ryzen 9 3950x Firmware -
Amd Ryzen 9 Pro 3900 Firmware -
2 Github repositories
1 Article
7.8
CVSSv3
CVE-2023-3611
An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet size...
Linux Linux Kernel 6.5
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
7.8
CVSSv3
CVE-2023-3776
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in t...
Linux Linux Kernel 6.5
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
2 Github repositories
7.8
CVSSv3
CVE-2023-35001
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace
Linux Linux Kernel
Debian Debian Linux 11.0
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Netapp H300s -
Netapp H500s -
Netapp H700s -
Netapp H410s -
Netapp H410c -
2 Github repositories
7.8
CVSSv3
CVE-2023-31248
Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace
Linux Linux Kernel
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Debian Debian Linux 11.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 22.04
NA
CVE-2023-3117
Rejected reason: Duplicate of CVE-2023-3390.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »