Page 227 of 47772 results (0.434 seconds)

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

17 Aug 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

17 Aug 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/7ba1ba12eeef0aa7113beb16410ef8b7c748e18b • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

17 Aug 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/a79a908fd2b080977b45bf103184b81c9d11ad07 •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

17 Aug 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/fbe639b44a82755d639df1c5d147c93f02ac5a0f •

CVSS: 6.1EPSS: 0%CPEs: 7EXPL: 0

17 Aug 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/9069a3817d82b01b3a55da382c774e3575946130 •

CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0

17 Aug 2024 — The issue is because the connection code in virt_wifi does not check the SSID from user space (it only checks the BSSID), and virt_wifi will call cfg80211_connect_result() with WLAN_STATUS_SUCCESS even if the SSID is different from the one virt_wifi has advertised. The issue is because the connection code in virt_wifi does not check the SSID from user space (it only checks the BSSID), and virt_wifi will call cfg80211_connect_result() with WLAN_STATUS_SUCCESS even if the SSID is different from ... • https://git.kernel.org/stable/c/c7cdba31ed8b87526db978976392802d3f93110c •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

17 Aug 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/8b230ed8ec96c933047dd0625cf95f739e4939a6 •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

17 Aug 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/df133f3f96257ee29696c0ed8bd198ec801dc810 •

CVSS: 6.6EPSS: 0%CPEs: 8EXPL: 0

17 Aug 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/a7e7a3156300a7e1982b03cc9cb8fb0c86434c49 • CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0

17 Aug 2024 — An attacker with access to the VMM could use this to cause a denial of service or possibly execute arbitrary code. • https://git.kernel.org/stable/c/1b043677d4be206c96b51811855502e50057f343 •