Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
andy nguyen vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-12351
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Linux Linux Kernel 5.9.0
Linux Linux Kernel
Linux Linux Kernel 5.9.1
1 Github repository
8.1
CVSSv3
CVE-2020-7457
In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application...
Freebsd Freebsd 11.3
Freebsd Freebsd 11.4
Freebsd Freebsd 12.1
7.8
CVSSv3
CVE-2023-23583
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Intel Core I3-10100y Firmware -
Intel Core I3-10110u Firmware -
Intel Core I3-10110y Firmware -
Intel Core I3-1005g1 Firmware -
Intel Core I5-10500h Firmware -
Intel Core I5-10200h Firmware -
Intel Core I5-10310u Firmware -
Intel Core I5-10300h Firmware -
Intel Core I5-10400h Firmware -
Intel Core I5-10210u Firmware -
Intel Core I5-10210y Firmware -
Intel Core I5-10310y Firmware -
Intel Core I5-1035g1 Firmware -
Intel Core I5-1035g4 Firmware -
Intel Core I5-1035g7 Firmware -
Intel Core I7-10870h Firmware -
Intel Core I7-10610u Firmware -
Intel Core I7-10810u Firmware -
Intel Core I7-10750h Firmware -
Intel Core I7-10850h Firmware -
Intel Core I7-10875h Firmware -
Intel Core I7-10510u Firmware -
2 Github repositories
1 Article
7.8
CVSSv3
CVE-2023-34319
The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet bei...
Xen Xen
Debian Debian Linux 10.0
7.8
CVSSv3
CVE-2023-4015
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. On an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chai...
Linux Linux Kernel
Debian Debian Linux 12.0
7.8
CVSSv3
CVE-2023-4206
A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter....
Linux Linux Kernel
Debian Debian Linux 12.0
7.8
CVSSv3
CVE-2023-4207
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This c...
Linux Linux Kernel
Debian Debian Linux 12.0
7.8
CVSSv3
CVE-2023-4208
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This...
Linux Linux Kernel
Debian Debian Linux 12.0
7.8
CVSSv3
CVE-2023-3777
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also...
Linux Linux Kernel
Debian Debian Linux 12.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 22.04
1 Github repository
7.8
CVSSv3
CVE-2023-40283
An issue exists in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel prior to 6.4.10. There is a use-after-free because the children of an sk are mishandled.
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 22.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »