Логотип exploitDog
bind:"CVE-2023-0590" OR bind:"CVE-2023-4623" OR bind:"CVE-2023-6932" OR bind:"CVE-2023-1206"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-0590" OR bind:"CVE-2023-4623" OR bind:"CVE-2023-6932" OR bind:"CVE-2023-1206"

Количество 158

Количество 158

suse-cvrf логотип

SUSE-SU-2023:0488-1

больше 2 лет назад

Security update for the Linux-RT Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0112-1

больше 1 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0780-1

больше 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4325-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4301-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4279-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4245-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4243-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4165-1

больше 1 года назад

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12149

больше 1 года назад

ELSA-2024-12149: kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2023-1206

почти 2 года назад

A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CVSS3: 5.7
EPSS: Низкий
redhat логотип

CVE-2023-1206

около 2 лет назад

A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CVSS3: 5.7
EPSS: Низкий
nvd логотип

CVE-2023-1206

почти 2 года назад

A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CVSS3: 5.7
EPSS: Низкий
debian логотип

CVE-2023-1206

почти 2 года назад

A hash collision flaw was found in the IPv6 connection lookup table in ...

CVSS3: 5.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2506-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1803-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1801-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2023-6932

больше 1 года назад

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-6932

больше 1 года назад

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2023-6932

больше 1 года назад

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2023:0488-1

Security update for the Linux-RT Kernel

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:0112-1

Security update for the Linux Kernel

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:0780-1

Security update for the Linux Kernel

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4325-1

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4301-1

Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4279-1

Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4245-1

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP2)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4243-1

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP2)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4165-1

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12149

ELSA-2024-12149: kernel security update (IMPORTANT)

больше 1 года назад
ubuntu логотип
CVE-2023-1206

A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CVSS3: 5.7
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-1206

A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CVSS3: 5.7
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-1206

A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CVSS3: 5.7
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-1206

A hash collision flaw was found in the IPv6 connection lookup table in ...

CVSS3: 5.7
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2506-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1803-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1801-1

Security update for the Linux Kernel

около 2 лет назад
ubuntu логотип
CVE-2023-6932

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-6932

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CVSS3: 7
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-6932

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CVSS3: 7.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу