| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-0562 | Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c | - | - | High | 7.8 | 2024-01-15 19:01:37 | Deep Dive |
| CVE-2023-4001 | Grub2: bypass the grub password protection feature | Red Hat | Red Hat Enterprise Linux 9 | Medium | 6.8 | 2024-01-15 11:10:20 | Deep Dive |
| CVE-2023-6915 | Kernel: null pointer dereference vulnerability in ida_free in lib/idr.c | Red Hat | Red Hat Enterprise Linux 8 | Medium | 6.2 | 2024-01-15 09:32:33 | Deep Dive |
| CVE-2023-6683 | Qemu: vnc: null pointer dereference in qemu_clipboard_request() | Red Hat | Red Hat Enterprise Linux 8 | Medium | 6.5 | 2024-01-12 19:01:26 | Deep Dive |
| CVE-2024-0443 | Kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. | - | - | Medium | 5.5 | 2024-01-11 23:30:52 | Deep Dive |
| CVE-2023-5455 | Ipa: invalid csrf protection | Red Hat | Red Hat Enterprise Linux 7 | Medium | 6.5 | 2024-01-10 12:33:00 | Deep Dive |
| CVE-2023-6476 | Cri-o: pods are able to break out of resource confinement on cgroupv2 | Red Hat | Red Hat OpenShift Container Platform 4.13 | Medium | 6.5 | 2024-01-09 21:32:03 | Deep Dive |
| CVE-2024-0340 | Kernel: information disclosure in vhost/vhost.c:vhost_new_msg() | - | - | Medium | 4.4 | 2024-01-09 17:36:12 | Deep Dive |
| CVE-2023-6270 | Kernel: aoe: improper reference count leads to use-after-free vulnerability | Red Hat | Red Hat Enterprise Linux 6 | High | 7.0 | 2024-01-04 17:01:51 | Deep Dive |
| CVE-2023-6944 | Rhdh: catalog-import function leaks credentials to frontend | Red Hat | RHDH-1.1-RHEL-9 | Medium | 5.7 | 2024-01-04 10:02:38 | Deep Dive |
| CVE-2023-41784 | Permissions and Access Control Vulnerability in ZTE Red Magic 8 Pro | ZTE | Red Magic 8 Pro | Medium | 6.6 | 2024-01-04 08:05:12 | Deep Dive |
| CVE-2024-0217 | Packagekitd: use-after-free in idle function callback | - | - | Low | 3.3 | 2024-01-03 17:04:38 | Deep Dive |
| CVE-2023-6004 | Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname | Red Hat | Red Hat Enterprise Linux 8 | Medium | 4.8 | 2024-01-03 17:01:39 | Deep Dive |
| CVE-2023-7192 | Kernel: refcount leak in ctnetlink_create_conntrack() | Red Hat | Red Hat Enterprise Linux 8.2 Advanced Update Support | Medium | 5.5 | 2024-01-02 19:02:45 | Deep Dive |
| CVE-2024-0193 | Kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation | - | - | High | 7.8 | 2024-01-02 18:05:13 | Deep Dive |
| CVE-2023-6693 | Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx() | Red Hat | Red Hat Enterprise Linux 8 | Medium | 4.9 | 2024-01-02 09:15:08 | Deep Dive |
| CVE-2023-47039 | Perl: perl for windows binary hijacking vulnerability | - | - | High | 7.8 | 2024-01-02 05:30:53 | Deep Dive |
| CVE-2023-3171 | Eap-7: heap exhaustion via deserialization | Red Hat | EAP 7.4.13 | High | 7.5 | 2023-12-27 15:45:33 | Deep Dive |
| CVE-2023-4641 | Shadow-utils: possible password leak during passwd(1) change | - | - | Medium | 4.7 | 2023-12-27 15:43:23 | Deep Dive |
| CVE-2023-7090 | Sudo: improper handling of ipa_hostname leads to privilege mismanagement | - | sudo | Medium | 6.6 | 2023-12-23 22:33:14 | Deep Dive |