Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ring firmware vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2021-47246
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix page reclaim for dead peer hairpin When adding a hairpin flow, a firmware-side send queue is created for the peer net device, which claims some host memory pages for its internal ring buffer. If th...
7.8
CVSSv3
CVE-2023-43513
Memory corruption while processing the event ring, the context read pointer is untrusted to HLOS and when it is passed with arbitrary values, may point to address in the middle of ring element.
Qualcomm 315 5g Iot Modem Firmware -
Qualcomm Apq8017 Firmware -
Qualcomm Aqt1000 Firmware -
Qualcomm Ar8031 Firmware -
Qualcomm Ar8035 Firmware -
Qualcomm C-v2x 9150 Firmware -
Qualcomm Csra6620 Firmware -
Qualcomm Csra6640 Firmware -
Qualcomm Csrb31024 Firmware -
Qualcomm Fastconnect 6200 Firmware -
Qualcomm Fastconnect 6700 Firmware -
Qualcomm Fastconnect 6800 Firmware -
Qualcomm Fastconnect 6900 Firmware -
Qualcomm Fastconnect 7800 Firmware -
Qualcomm Flight Rb5 5g Platform Firmware -
Qualcomm Fsm20055 Firmware -
Qualcomm Fsm20056 Firmware -
Qualcomm Immersive Home 214 Platform Firmware -
Qualcomm Immersive Home 216 Platform Firmware -
Qualcomm Immersive Home 316 Platform Firmware -
Qualcomm Immersive Home 318 Platform Firmware -
Qualcomm Immersive Home 3210 Platform Firmware -
6.7
CVSSv3
CVE-2023-4273
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a si...
Linux Linux Kernel
Linux Linux Kernel 6.5
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Redhat Enterprise Linux 9.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H410s Firmware -
5.5
CVSSv3
CVE-2023-20588
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Amd Epyc 7351p Firmware -
Amd Epyc 7401p Firmware -
Amd Epyc 7551p Firmware -
Amd Epyc 7251 Firmware -
Amd Epyc 7261 Firmware -
Amd Epyc 7281 Firmware -
Amd Epyc 7301 Firmware -
Amd Epyc 7351 Firmware -
Amd Epyc 7371 Firmware -
Amd Epyc 7401 Firmware -
Amd Epyc 7451 Firmware -
Amd Epyc 7501 Firmware -
Amd Epyc 7551 Firmware -
Amd Epyc 7571 Firmware -
Amd Epyc 7601 Firmware -
Amd Ryzen 5 Pro 3400g Firmware -
Amd Ryzen 5 3400g Firmware -
Amd Ryzen 5 Pro 3400ge Firmware -
Amd Ryzen 5 Pro 3350g Firmware -
1 Article
4.7
CVSSv3
CVE-2023-2898
There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.
Linux Linux Kernel -
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Debian Debian Linux 12.0
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H410s Firmware -
Netapp H410c Firmware -
7.8
CVSSv3
CVE-2022-30426
There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This a...
Acer Altos T110 F3 Firmware
Acer Ap130 F2 Firmware
Acer Aspire 1600x Firmware
Acer Aspire 1602m Firmware
Acer Aspire 7600u Firmware
Acer Aspire Mc605 Firmware
Acer Aspire Tc-105 Firmware
Acer Aspire Tc-120 Firmware
Acer Aspire U5-620 Firmware
Acer Aspire X1935 Firmware
Acer Aspire X3475 Firmware
Acer Aspire X3995 Firmware
Acer Aspire Xc100 Firmware
Acer Aspire Xc600 Firmware
Acer Aspire Z3-615 Firmware
Acer Veriton B630 49 Firmware
Acer Veriton E430g Firmware
Acer Veriton E430 Firmware
Acer Veriton M2110g Firmware
Acer Veriton M2120g Firmware
Acer Veriton M2611g Firmware
Acer Veriton M2611 Firmware
8.8
CVSSv3
CVE-2022-40250
An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypass...
Intel Nuc M15 Laptop Kit Lapbc510 Firmware Bc0074
Intel Nuc M15 Laptop Kit Lapbc710 Firmware Bc0074
Ami Aptio V 5.0
8.2
CVSSv3
CVE-2022-40261
An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypass...
Intel Nuc M15 Laptop Kit Lapbc510 Firmware -
Intel Nuc M15 Laptop Kit Lapbc710 Firmware -
Ami Aptio V 5.0
7
CVSSv3
CVE-2022-1729
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
Linux Linux Kernel
Netapp Hci Baseboard Management Controller H300s
Netapp Hci Baseboard Management Controller H500s
Netapp Hci Baseboard Management Controller H700s
Netapp Hci Baseboard Management Controller H410s
5.5
CVSSv3
CVE-2022-1016
A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged atta...
Linux Linux Kernel
Linux Linux Kernel 3.13
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
2 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »