| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2023-6915 | Kernel: null pointer dereference vulnerability in ida_free in lib/idr.c | Red Hat | Red Hat Enterprise Linux 8 | Medium | 6.2 | 2024-01-15 09:32:33 | Deep Dive |
| CVE-2023-6683 | Qemu: vnc: null pointer dereference in qemu_clipboard_request() | Red Hat | Red Hat Enterprise Linux 8 | Medium | 6.5 | 2024-01-12 19:01:26 | Deep Dive |
| CVE-2024-0443 | Kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. | - | - | Medium | 5.5 | 2024-01-11 23:30:52 | Deep Dive |
| CVE-2023-5455 | Ipa: invalid csrf protection | Red Hat | Red Hat Enterprise Linux 7 | Medium | 6.5 | 2024-01-10 12:33:00 | Deep Dive |
| CVE-2024-0340 | Kernel: information disclosure in vhost/vhost.c:vhost_new_msg() | - | - | Medium | 4.4 | 2024-01-09 17:36:12 | Deep Dive |
| CVE-2023-6270 | Kernel: aoe: improper reference count leads to use-after-free vulnerability | Red Hat | Red Hat Enterprise Linux 6 | High | 7.0 | 2024-01-04 17:01:51 | Deep Dive |
| CVE-2024-0217 | Packagekitd: use-after-free in idle function callback | - | - | Low | 3.3 | 2024-01-03 17:04:38 | Deep Dive |
| CVE-2023-6004 | Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname | Red Hat | Red Hat Enterprise Linux 8 | Medium | 4.8 | 2024-01-03 17:01:39 | Deep Dive |
| CVE-2023-7192 | Kernel: refcount leak in ctnetlink_create_conntrack() | Red Hat | Red Hat Enterprise Linux 8.2 Advanced Update Support | Medium | 5.5 | 2024-01-02 19:02:45 | Deep Dive |
| CVE-2024-0193 | Kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation | - | - | High | 7.8 | 2024-01-02 18:05:13 | Deep Dive |
| CVE-2023-6693 | Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx() | Red Hat | Red Hat Enterprise Linux 8 | Medium | 4.9 | 2024-01-02 09:15:08 | Deep Dive |
| CVE-2023-47039 | Perl: perl for windows binary hijacking vulnerability | - | - | High | 7.8 | 2024-01-02 05:30:53 | Deep Dive |
| CVE-2023-4641 | Shadow-utils: possible password leak during passwd(1) change | - | - | Medium | 4.7 | 2023-12-27 15:43:23 | Deep Dive |
| CVE-2023-7090 | Sudo: improper handling of ipa_hostname leads to privilege mismanagement | - | sudo | Medium | 6.6 | 2023-12-23 22:33:14 | Deep Dive |
| CVE-2023-7008 | Systemd-resolved: unsigned name response in signed zone is not refused when dnssec=yes | Red Hat | Red Hat Enterprise Linux 8 | Medium | 5.9 | 2023-12-23 13:00:51 | Deep Dive |
| CVE-2023-7042 | Kernel: null pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() | Red Hat | Red Hat Enterprise Linux 6 | Medium | 4.4 | 2023-12-21 20:02:16 | Deep Dive |
| CVE-2023-6546 | Kernel: gsm multiplexing race condition leads to privilege escalation | Red Hat | Red Hat Enterprise Linux 8 | High | 7.0 | 2023-12-21 20:01:03 | Deep Dive |
| CVE-2023-6918 | Libssh: missing checks for return values for digests | Red Hat | Red Hat Enterprise Linux 8 | Low | 3.7 | 2023-12-18 23:27:49 | Deep Dive |
| CVE-2023-6228 | Libtiff: heap-based buffer overflow in cpstriptotile() in tools/tiffcp.c | Red Hat | Red Hat Enterprise Linux 8 | Low | 3.3 | 2023-12-18 13:43:09 | Deep Dive |
| CVE-2023-47038 | Perl: write past buffer end via illegal user-defined unicode property | - | - | High | 7.0 | 2023-12-18 13:43:08 | Deep Dive |