| CVE-2023-4147 |
Linuxkernel的Netfilter模块当通过NFTA_RULE_CHAIN_ID添加rule时触发uaf,可导致提权,影响5.9<版本6.5-rc4,包含5.10 |
Important |
kernel |
是 |
完成修复 |
2023-08-06 |
2025-12-09 |
| CVE-2023-38611 |
该问题已通过改进内存处理得到解决。此问题已在iOS16.6和iPadOS16.6、tvOS16.6、macOSVentura13.5、Safari16.6、watchOS9.6中修复。处理网页内容可能会导致任意代码执行。 |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-08-06 |
2026-01-04 |
| CVE-2023-38600 |
该问题已通过改进检查得到解决。此问题已在iOS16.6和iPadOS16.6、tvOS16.6、macOSVentura13.5、Safari16.6、watchOS9.6中修复。处理网页内容可能会导致任意代码执行。 |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-08-06 |
2026-01-04 |
| CVE-2023-38597 |
该问题已通过改进检查得到解决。此问题已在iOS15.7.8和iPadOS15.7.8、iOS16.6和iPadOS16.6、macOSVentura13.5、Safari16.6中修复。处理网页内容可能会导致任意代码执行。 |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-08-06 |
2026-01-04 |
| CVE-2023-38595 |
该问题已通过改进检查得到解决。此问题已在iOS16.6和iPadOS16.6、tvOS16.6、macOSVentura13.5、Safari16.6、watchOS9.6中修复。处理网页内容可能会导致任意代码执行。 |
Important |
|
否 |
完成修复 |
2023-08-06 |
2026-01-04 |
| CVE-2023-38594 |
该问题已通过改进检查得到解决。此问题已在iOS15.7.8和iPadOS15.7.8、iOS16.6和iPadOS16.6、tvOS16.6、macOSVentura13.5、Safari16.6、watchOS9.6中修复。处理网页内容可能会导致任意代码执行。 |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-08-06 |
2026-01-04 |
| CVE-2023-38592 |
通过改进限制解决了逻辑问题。此问题已在iOS16.6和iPadOS16.6、watchOS9.6、tvOS16.6、macOSVentura13.5中修复。处理网页内容可能会导致任意代码执行。 |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-08-06 |
2026-01-04 |
| CVE-2023-29409 |
证书链中非常大的RSA密钥可能会导致客户端/服务器花费大量CPU时间来验证签名。通过修复,握手期间传输的RSA密钥的大小被限制为<=8192位。根据对公众信任的RSA密钥的调查,目前流通中的证书只有三个,其密钥大于此,并且这三个证书似乎都是未积极部署的测试证书。私有PKI中可能使用更大的密钥,但我们的目标是WebPKI,因此为了提高crypto/tls用户的默认安全性而造成破坏似乎是合理的。 |
Moderate |
golang, container-tools:an8 |
是 |
完成修复 |
2023-08-06 |
2025-12-11 |
| CVE-2023-38408 |
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. |
Important |
openssh |
否 |
完成修复 |
2023-08-04 |
2026-01-09 |
| CVE-2023-33170 |
ASP.NET and Visual Studio Security Feature Bypass Vulnerability |
Important |
dotnet6.0, dotnet |
否 |
完成修复 |
2023-08-04 |
2025-12-05 |
| CVE-2023-33128 |
.NET and Visual Studio Remote Code Execution Vulnerability |
Important |
dotnet6.0 |
否 |
完成修复 |
2023-08-04 |
2025-12-05 |
| CVE-2023-29337 |
NuGet Client Remote Code Execution Vulnerability |
Important |
dotnet6.0 |
否 |
完成修复 |
2023-08-04 |
2025-12-05 |
| CVE-2023-29331 |
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability |
Important |
dotnet6.0 |
否 |
完成修复 |
2023-08-04 |
2025-12-05 |
| CVE-2023-24936 |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability |
Important |
dotnet6.0 |
否 |
完成修复 |
2023-08-04 |
2025-12-05 |
| CVE-2023-4135 |
QEMU中的虚拟nvme设备中发现堆越界内存读取缺陷。在计算主机堆指针(用于将数据复制回客户机)之前,QEMU进程不会验证客户机提供的偏移量。可以公开与分配的缓冲区相关的任意堆存储器。 |
Moderate |
qemu |
否 |
完成修复 |
2023-08-03 |
2025-12-18 |
| CVE-2023-4132 |
A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition. |
Moderate |
kernel |
否 |
完成修复 |
2023-08-03 |
2026-01-07 |
| CVE-2023-4058 |
Memory safety bugs present in Firefox 115. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 116. |
Moderate |
firefox |
否 |
完成修复 |
2023-08-02 |
2026-01-24 |
| CVE-2022-40609 |
IBM SDK, Java Technology Edition 7.1.5.18 and 8.0.8.0 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236069. |
Important |
java-1.8.0-openjdk |
否 |
完成修复 |
2023-08-02 |
2025-12-05 |
| CVE-2023-4057 |
Firefox115、FirefoxESR115.0和Thunderbird115.0中存在内存安全错误。其中一些错误显示了内存损坏的证据,我们推测,只要付出足够的努力,其中一些错误可能会被利用来运行任意代码。此漏洞影响Firefox<116、FirefoxESR<115.1和Thunderbird<115.1。 |
Important |
firefox, thunderbird, xulrunner |
否 |
完成修复 |
2023-08-01 |
2026-01-07 |
| CVE-2023-4056 |
Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR 102.13, Thunderbird 115.0, and Thunderbird 102.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-08-01 |
2025-12-30 |
| CVE-2023-4055 |
当document.cookie中每个域的cookie数量超出时,发送到主机的实际cookiejar不再与预期的cookiejar状态一致。这可能导致发送的请求中缺少一些cookie。此漏洞影响Firefox<116、FirefoxESR<102.14和FirefoxESR<115.1。 |
Low |
firefox, thunderbird |
否 |
完成修复 |
2023-08-01 |
2026-01-24 |
| CVE-2023-4054 |
When opening appref-ms files, Firefox did not warn the user that these files may contain malicious code. \n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 116, Firefox ESR < 102.14, Firefox ESR < 115.1, Thunderbird < 102.14, and Thunderbird < 115.1. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-08-01 |
2026-01-24 |
| CVE-2023-4053 |
网站可能通过使用具有由外部程序处理的方案(例如mailtoURL)的URL来遮挡全屏通知。这可能会导致用户困惑并可能导致欺骗攻击。此漏洞影响Firefox<116、FirefoxESR<115.2和Thunderbird<115.2。 |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-08-01 |
2026-01-24 |
| CVE-2023-4052 |
Firefox更新程序创建了一个非特权用户可写的目录。卸载Firefox时,该目录中的任何文件都会以卸载用户帐户的权限递归删除。这可以与创建连接(符号链接的一种形式)相结合,以允许非特权用户控制任意文件删除。\n*此错误仅影响Windows上的Firefox。其他操作系统不受影响。*此漏洞影响Firefox<116、FirefoxESR<115.1和Thunderbird<115.1。 |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-08-01 |
2026-01-24 |
| CVE-2023-4051 |
网站可能通过使用文件打开对话框来遮挡全屏通知。这可能会导致用户困惑并可能导致欺骗攻击。此漏洞影响Firefox<116、FirefoxESR<115.2和Thunderbird<115.2。 |
Moderate |
thunderbird, firefox |
否 |
完成修复 |
2023-08-01 |
2026-01-24 |
| CVE-2023-4050 |
In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1. |
Important |
thunderbird, firefox |
否 |
完成修复 |
2023-08-01 |
2026-01-04 |
| CVE-2023-4048 |
An out-of-bounds read could have led to an exploitable crash when parsing HTML with DOMParser in low memory situations. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-08-01 |
2025-12-30 |
| CVE-2023-4047 |
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-08-01 |
2025-12-30 |
| CVE-2023-4045 |
Offscreen Canvas did not properly track cross-origin tainting, which could have been used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-08-01 |
2025-12-30 |
| CVE-2023-4010 |
A flaw was found in the USB Host Controller Driver framework in the Linux kernel. The usb_giveback_urb function has a logic loophole in its implementation. Due to the inappropriate judgment condition of the goto statement, the function cannot return under the input of a specific malformed descriptor file, so it falls into an endless loop, resulting in a denial of service. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10, kernel |
否 |
完成修复 |
2023-07-31 |
2026-01-07 |
| CVE-2023-4004 |
netfilter的nft_pipapo_remove函数存在uaf漏洞,这个漏洞目前只能造成dos,真正实现提权的可能比较低,所以按s2处理,参考链接里的github修复信息里有贴fix,是引入漏洞commit链接,主要是nft_set_pipapo.o引入的时间,影响5.6-rc1<版本<6.5-rc3,包含5.10 |
Moderate |
kernel |
否 |
完成修复 |
2023-07-31 |
2026-01-21 |
| CVE-2023-3301 |
QEMU中发现一个缺陷。热拔出的异步特性会导致出现竞争场景,其中网络设备后端在virtio-netpci前端被拔出之前被清除。恶意访客可以利用此时间窗口触发断言并导致拒绝服务。 |
Moderate |
qemu, virt:an, qemu-kvm |
否 |
完成修复 |
2023-07-31 |
2025-12-19 |
| CVE-2023-4128 |
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue. |
Important |
kernel |
是 |
完成修复 |
2023-07-29 |
2025-12-19 |
| CVE-2023-22049 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). |
Low |
java-11-openjdk, java-1.8.0-openjdk, java-17-openjdk |
否 |
完成修复 |
2023-07-28 |
2025-12-05 |
| CVE-2023-22041 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK executes to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). |
Moderate |
java-11-openjdk, java-17-openjdk |
否 |
完成修复 |
2023-07-28 |
2025-12-05 |
| CVE-2023-22036 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Utility). Supported versions that are affected are Oracle Java SE: 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). |
Low |
java-11-openjdk, java-17-openjdk |
否 |
完成修复 |
2023-07-28 |
2025-12-05 |
| CVE-2023-22006 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N). |
Low |
java-11-openjdk, java-17-openjdk |
否 |
完成修复 |
2023-07-28 |
2025-12-05 |
| CVE-2022-3606 |
A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability. |
Moderate |
kernel:5.10, kernel:4.19, kernel(ANCK)5.10, kernel:6.6 |
否 |
完成修复 |
2023-07-28 |
2026-01-07 |
| CVE-2021-32256 |
GNUlibiberty中发现了一个问题,分布在GNUBinutils2.36中。这是rust-demangle.c中demangle_type的堆栈溢出问题。 |
Moderate |
binutils |
否 |
完成修复 |
2023-07-27 |
2025-12-11 |
| CVE-2023-32393 |
The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing web content may lead to arbitrary code execution. |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-07-26 |
2026-01-04 |
| CVE-2023-39130 |
GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap buffer overflow via the function pe_as16() at /gdb/coff-pe-read.c. |
Moderate |
gdb |
否 |
完成修复 |
2023-07-25 |
2025-12-09 |
| CVE-2023-39129 |
GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c. |
Moderate |
gdb |
否 |
完成修复 |
2023-07-25 |
2025-12-09 |
| CVE-2023-39128 |
GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c. |
Moderate |
gdb |
否 |
完成修复 |
2023-07-25 |
2025-12-09 |
| CVE-2023-37460 |
Plexis Archiver is a collection of Plexus components to create archives or extract archives to a directory with a unified `Archiver`/`UnArchiver` API. Prior to version 4.8.0, using AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly remote code execution. When extracting an archive with an entry that already exists in the destination directory as a symbolic link whose target does not exist - the `resolveFile()` function will return the symlink's source instead of its target, which will pass the verification that ensures the file will not be extracted outside of the destination directory. Later `Files.newOutputStream()`, that follows symlinks by default, will actually write the entry's content to the symlink's target. Whoever uses plexus archiver to extract an untrusted archive is vulnerable to an arbitrary file creation and possibly remote code execution. Version 4.8.0 contains a patch for this issue. |
Important |
plexus-archiver |
否 |
完成修复 |
2023-07-25 |
2025-12-30 |
| CVE-2023-32629 |
Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels |
Important |
kernel |
否 |
完成修复 |
2023-07-25 |
2025-12-09 |
| CVE-2023-2640 |
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks. |
Important |
kernel |
否 |
完成修复 |
2023-07-25 |
2025-12-09 |
| CVE-2023-20593 |
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. |
Moderate |
linux-firmware, kernel |
否 |
完成修复 |
2023-07-25 |
2026-01-07 |
| CVE-2023-3772 |
linux内核的XFRM模块存在空指针解引用,可导致dos,patch未合并到主分支,影响版本2.6.39-rc1<版本,影响4.19和5.10 |
Moderate |
kernel |
否 |
完成修复 |
2023-07-24 |
2026-01-07 |
| CVE-2023-3750 |
A flaw was found in libvirt. The virStoragePoolObjListSearch function does not return a locked pool as expected, resulting in a race condition and denial of service when attempting to lock the same object from another thread. This issue could allow clients connecting to the read-only socket to crash the libvirt daemon. |
Moderate |
libvirt, virt:an |
否 |
完成修复 |
2023-07-24 |
2025-12-18 |
| CVE-2023-3611 |
linux内核的sch_qfq模块存在越界写漏洞,lmax变量如果比数据包的长度小的话,会直接被赋值为数据包长度,中间不检查,并且数据包的长度可以被攻击者伪造,最终可以触发越界读写,导致提权,影响版本6.5-rc2<版本<3.8-rc1包含4.19和5.10 |
Important |
kernel |
否 |
完成修复 |
2023-07-24 |
2025-12-06 |
| CVE-2023-3609 |
linux内核中的cls_u32模块存在doublefree漏洞,u32_set_parms函数中因为错误的执行流,当tcf_change_indev函数发生错误时会直接返回,最终可导致提权,影响版本4.14-rc1<版本<6.4-rc7包含4.19和5.10 |
Important |
kernel |
否 |
完成修复 |
2023-07-24 |
2025-12-06 |
| CVE-2023-33952 |
A double-free vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of vmw_buffer_object objects. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. This flaw allows a local privileged user to escalate privileges and execute code in the context of the kernel. |
Moderate |
kernel |
否 |
完成修复 |
2023-07-24 |
2026-01-07 |
| CVE-2023-33951 |
A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel. |
Moderate |
kernel |
否 |
完成修复 |
2023-07-24 |
2026-01-07 |
| CVE-2023-32258 |
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_LOGOFF and SMB2_CLOSE commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel. |
Important |
kernel |
否 |
完成修复 |
2023-07-24 |
2025-12-06 |
| CVE-2023-32257 |
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel. |
Important |
kernel |
否 |
完成修复 |
2023-07-24 |
2025-12-06 |
| CVE-2023-32252 |
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. |
Important |
kernel |
否 |
完成修复 |
2023-07-24 |
2025-12-06 |
| CVE-2023-32248 |
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_TREE_CONNECT and SMB2_QUERY_INFO commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. |
Important |
kernel |
是 |
完成修复 |
2023-07-24 |
2025-12-09 |
| CVE-2023-32247 |
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. |
Important |
kernel |
是 |
完成修复 |
2023-07-24 |
2025-12-09 |
| CVE-2023-3019 |
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. |
Moderate |
qemu, virt:an |
否 |
完成修复 |
2023-07-24 |
2025-12-19 |
| CVE-2023-3773 |
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace. |
Moderate |
kernel |
否 |
完成修复 |
2023-07-23 |
2026-01-07 |
| CVE-2023-37450 |
A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution. |
Important |
webkit2gtk3 |
否 |
完成修复 |
2023-07-22 |
2026-01-04 |
| CVE-2023-32439 |
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, Safari 16.5.1, macOS Ventura 13.4.1, iOS 15.7.7 and iPadOS 15.7.7. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-07-22 |
2026-01-04 |
| CVE-2023-32435 |
A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 16.4, iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. |
Important |
webkit2gtk3 |
否 |
完成修复 |
2023-07-22 |
2026-01-04 |
| CVE-2023-3776 |
linux内核中的cls_fw模块存在uaf漏洞,fw_set_parms函数中因为错误的执行流,当tcf_change_indev函数发生错误时会直接返回,影响版本2.6.12-rc2<版本<6.5-rc2,包含4.19和5.10 |
Moderate |
kernel |
否 |
完成修复 |
2023-07-20 |
2026-01-07 |
| CVE-2023-37650 |
A Cross-Site Request Forgery (CSRF) in the Admin portal of Cockpit CMS v2.5.2 allows attackers to execute arbitrary Administrator commands. |
Important |
cockpit |
否 |
完成修复 |
2023-07-20 |
2026-01-04 |
| CVE-2023-37649 |
Incorrect access control in the component /models/Content of Cockpit CMS v2.5.2 allows unauthorized attackers to access sensitive data. |
Important |
cockpit |
否 |
完成修复 |
2023-07-20 |
2026-01-08 |
| CVE-2023-3812 |
linux内核的YUN/TAP驱动存在越界,缺乏对数据包的长度做检查导致当数据包过大时,比如大于ETH_MAX_MTU,之后在获取其中的header偏移时,因为存储偏移的变量为u16,导致溢出,因为这个漏洞仅是有潜在的提权可能,且是一年前提交到现在没有真的提权,定级s2,影响版本4.15-rc1<版本<6.1-rc4,包含4.19和5.10 |
Moderate |
kernel |
否 |
完成修复 |
2023-07-19 |
2026-01-07 |
| CVE-2023-34966 |
Spotlight的SambamdssvcRPC服务中发现无限循环漏洞。解析客户端发送的SpotlightmdssvcRPC数据包时,核心解组函数sl_unpack_loop()未验证网络数据包中包含类似数组结构中的元素计数的字段。通过传递0作为计数值,被攻击的函数将无限循环运行,消耗100%CPU。此缺陷允许攻击者发出格式错误的RPC请求,触发无限循环,从而导致拒绝服务情况。 |
Important |
openchange, evolution-mapi, samba |
否 |
完成修复 |
2023-07-19 |
2026-01-10 |
| CVE-2023-2828 |
Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1. |
Important |
bind9.16, bind |
否 |
完成修复 |
2023-07-19 |
2026-01-06 |
| CVE-2023-38432 |
An issue was discovered in the Linux kernel before 6.3.10. fs/smb/server/smb2misc.c in ksmbd does not validate the relationship between the command payload size and the RFC1002 length specification, leading to an out-of-bounds read. |
Important |
kernel |
否 |
完成修复 |
2023-07-18 |
2025-12-05 |
| CVE-2023-38431 |
An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read. |
Critical |
kernel |
否 |
完成修复 |
2023-07-18 |
2025-12-05 |
| CVE-2023-38430 |
An issue was discovered in the Linux kernel before 6.3.9. ksmbd does not validate the SMB request protocol ID, leading to an out-of-bounds read. |
Critical |
kernel |
否 |
完成修复 |
2023-07-18 |
2025-12-06 |
| CVE-2023-38429 |
An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access. |
Critical |
kernel |
否 |
完成修复 |
2023-07-18 |
2025-12-06 |
| CVE-2023-38428 |
An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read. |
Critical |
kernel |
否 |
完成修复 |
2023-07-18 |
2025-12-06 |
| CVE-2023-38427 |
An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts. |
Important |
kernel |
否 |
完成修复 |
2023-07-18 |
2025-12-06 |
| CVE-2023-38426 |
An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length. |
Critical |
kernel |
否 |
完成修复 |
2023-07-18 |
2025-12-06 |
| CVE-2023-35898 |
IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information due to an insecure security configuration in InfoSphere Data Flow Designer. IBM X-Force ID: 259352. |
Moderate |
kernel |
否 |
完成修复 |
2023-07-18 |
2026-01-07 |
| CVE-2023-29260 |
IBM Sterling Connect:Express for UNIX 1.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 252135. |
Moderate |
kernel |
否 |
完成修复 |
2023-07-18 |
2026-01-07 |
| CVE-2023-29259 |
IBM Sterling Connect:Express for UNIX 1.5 browser UI is vulnerable to attacks that rely on the use of cookies without the SameSite attribute. IBM X-Force ID: 252055. |
Moderate |
kernel |
否 |
完成修复 |
2023-07-18 |
2026-01-07 |
| CVE-2023-22045 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). |
Low |
java-17-openjdk, java-1.8.0-openjdk, java-11-openjdk-portable, java-11-openjdk, java-17-openjdk-portable, java-1.8.0-openjdk-portable |
否 |
完成修复 |
2023-07-18 |
2025-12-05 |
| CVE-2022-47085 |
An issue was discovered in ostree before 2022.7 allows attackers to cause a denial of service or other unspecified impacts via the print_panic function in repo_checkout_filter.rs. |
Moderate |
ostree |
否 |
完成修复 |
2023-07-18 |
2026-01-22 |
| CVE-2022-43908 |
IBM Security Guardium 11.3 could allow an authenticated user to cause a denial of service due to improper input validation. IBM X-Force ID: 240903. |
Moderate |
kernel |
否 |
完成修复 |
2023-07-18 |
2026-01-07 |
| CVE-2022-41409 |
Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input. |
Important |
pcre2 |
否 |
完成修复 |
2023-07-18 |
2026-01-09 |
| CVE-2022-33064 |
An off-by-one error in function wav_read_header in src/wav.c in Libsndfile 1.1.0, results in a write out of bound, which allows an attacker to execute arbitrary code, Denial of Service or other unspecified impacts. |
Important |
libsndfile |
否 |
完成修复 |
2023-07-18 |
2026-01-08 |
| CVE-2021-38933 |
IBM Sterling Connect:Direct for UNIX 1.5 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210574. |
Important |
kernel |
否 |
完成修复 |
2023-07-18 |
2025-12-05 |
| CVE-2023-38409 |
An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info). |
Moderate |
kernel |
否 |
完成修复 |
2023-07-17 |
2026-01-07 |
| CVE-2023-37211 |
Memory safety bugs present in Firefox 114, Firefox ESR 102.12, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-07-17 |
2025-12-30 |
| CVE-2023-37208 |
When opening Diagcab files, Firefox did not warn the user that these files may contain malicious code. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-07-17 |
2026-01-24 |
| CVE-2023-37207 |
A website could have obscured the fullscreen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-07-17 |
2026-01-24 |
| CVE-2023-37202 |
Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-07-17 |
2025-12-30 |
| CVE-2023-37201 |
An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-07-17 |
2025-12-30 |
| CVE-2021-31294 |
Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server by sending a non-administrative command (specifically, a SET command). NOTE: this was fixed for Redis 6.2.x and 7.x in 2021. Versions before 6.2 were not intended to have safety guarantees related to this. |
Moderate |
redis |
否 |
完成修复 |
2023-07-15 |
2026-01-22 |
| CVE-2023-38325 |
Python41.0.2之前的加密包会错误地处理具有关键选项的SSH证书。 |
Important |
python-cryptography |
否 |
完成修复 |
2023-07-14 |
2025-12-30 |
| CVE-2023-3649 |
iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-07-13 |
2026-01-22 |
| CVE-2023-3648 |
Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-07-13 |
2026-01-22 |
| CVE-2023-3610 |
linux内核的netfilter模块存在uaf漏洞,原因在于nft_data_hole和nft_data_release中对于chain的绑定处理有问题,漏洞触发需要创建user和net的namespace的权限,有缓解措施见参考链接。影响版本5.9-rc1<版本<6.4,包含5.10 |
Important |
kernel |
否 |
完成修复 |
2023-07-12 |
2025-12-05 |
| CVE-2023-3106 |
A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely. |
Moderate |
kernel |
否 |
完成修复 |
2023-07-12 |
2026-01-07 |
| CVE-2023-21400 |
In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation. |
Moderate |
kernel |
否 |
完成修复 |
2023-07-12 |
2026-01-07 |
| CVE-2023-21255 |
In multiple functions of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
Important |
kernel |
否 |
完成修复 |
2023-07-12 |
2025-12-05 |