| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2023-52355 | Libtiff: tiffrasterscanlinesize64 produce too-big size and could cause oom | - | - | High | 7.5 | 2024-01-25 20:03:35 | Deep Dive |
| CVE-2023-40547 | Shim: rce in http boot support may lead to secure boot bypass | Red Hat | Red Hat Enterprise Linux 7 | High | 8.3 | 2024-01-25 15:54:23 | Deep Dive |
| CVE-2023-39197 | Kernel: dccp: conntrack out-of-bounds read in nf_conntrack_dccp_packet() | Red Hat | Red Hat Enterprise Linux 6 | Medium | 4.0 | 2024-01-23 03:04:27 | Deep Dive |
| CVE-2024-0775 | Kernel: use-after-free while changing the mount option in __ext4_remount leading | - | - | Medium | 6.7 | 2024-01-22 13:03:10 | Deep Dive |
| CVE-2023-6531 | Kernel: gc's deletion of an skb races with unix_stream_read_generic() leading to uaf | Red Hat | Red Hat Enterprise Linux 9 | High | 7.0 | 2024-01-21 10:01:07 | Deep Dive |
| CVE-2024-0607 | Kernel: nf_tables: pointer math issue in nft_byteorder_eval() | - | - | Medium | 6.6 | 2024-01-18 15:41:14 | Deep Dive |
| CVE-2024-0409 | Xorg-x11-server: selinux context corruption | - | - | High | 7.8 | 2024-01-18 15:40:22 | Deep Dive |
| CVE-2024-0408 | Xorg-x11-server: selinux unlabeled glx pbuffer | - | - | Medium | 5.5 | 2024-01-18 15:40:07 | Deep Dive |
| CVE-2023-6816 | Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer | Red Hat | Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION | Critical | 9.8 | 2024-01-18 04:31:08 | Deep Dive |
| CVE-2024-0646 | Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | - | - | High | 7.0 | 2024-01-17 15:16:45 | Deep Dive |
| CVE-2024-0641 | Kernel: deadlock leading to denial of service in tipc_crypto_key_revoke | - | - | Medium | 5.5 | 2024-01-17 15:15:45 | Deep Dive |
| CVE-2024-0639 | Kernel: potential deadlock on &net->sctp.addr_wq_lock leading to dos | - | - | Medium | 5.5 | 2024-01-17 15:14:47 | Deep Dive |
| CVE-2024-0582 | Kernel: io_uring: page use-after-free vulnerability via buffer ring mmap | - | - | High | 7.8 | 2024-01-16 14:33:45 | Deep Dive |
| CVE-2023-6395 | Mock: privilege escalation for users that can access mock configuration | - | mock | Medium | 6.7 | 2024-01-16 14:33:02 | Deep Dive |
| CVE-2024-0232 | Sqlite: use-after-free bug in jsonparseaddnodearray | - | - | Medium | 4.7 | 2024-01-16 14:01:59 | Deep Dive |
| CVE-2024-0567 | Gnutls: rejects certificate chain with distributed trust | - | - | High | 7.5 | 2024-01-16 14:01:59 | Deep Dive |
| CVE-2024-0553 | Gnutls: incomplete fix for cve-2023-5981 | - | - | High | 7.5 | 2024-01-16 11:40:51 | Deep Dive |
| CVE-2024-0565 | Kernel: cifs filesystem decryption improper input validation remote code execution vulnerability in function receive_encrypted_standard of client | - | - | Medium | 6.8 | 2024-01-15 20:02:03 | Deep Dive |
| CVE-2024-0562 | Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c | - | - | High | 7.8 | 2024-01-15 19:01:37 | Deep Dive |
| CVE-2023-4001 | Grub2: bypass the grub password protection feature | Red Hat | Red Hat Enterprise Linux 9 | Medium | 6.8 | 2024-01-15 11:10:20 | Deep Dive |