6.5 CVE-2022-47015
MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of Service. It is possible for function...

2023-06-10 04:15:00

7.5 CVE-2022-46663
In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences...

2023-06-10 03:15:00

7.8 CVE-2023-21670
Memory Corruption in GPU Subsystem due to arbitrary command execution from GPU in privileged mode.

2023-06-10 02:10:00

7.5 CVE-2023-21669
Information Disclosure in WLAN HOST while sending DPP action frame to peer with an invalid source address....

2023-06-10 02:10:00

7.5 CVE-2023-21661
Transient DOS while parsing WLAN beacon or probe-response frame.

2023-06-10 02:10:00

7.5 CVE-2023-21660
Transient DOS in WLAN Firmware while parsing FT Information Elements.

2023-06-10 02:09:00

7.5 CVE-2023-21659
Transient DOS in WLAN Firmware while processing frames with missing header fields.

2023-06-10 02:09:00

7.5 CVE-2023-21658
Transient DOS in WLAN Firmware while processing the received beacon or probe response frame.

2023-06-10 02:09:00

7.8 CVE-2023-21657
Memoru corruption in Audio when ADSP sends input during record use case.

2023-06-10 02:09:00

7.8 CVE-2023-21656
Memory corruption in WLAN HOST while receiving an WMI event from firmware.

2023-06-10 02:09:00

7.8 CVE-2023-21632
Memory corruption in Automotive GPU while querying a gsl memory node.

2023-06-10 02:09:00

7.8 CVE-2023-21628
Memory corruption in WLAN HAL while processing WMI-UTF command or FTM TLV1 command.

2023-06-10 02:09:00

What is the Sherlock® KB project?

First of all KB for "Knowledge Base". The company ProHacktive is making its database of known vulnerabilities to date available for free. This database combines Nist's CVE database (https://nvd.nist.gov/), the CWE database (https://cwe.mitre.org/) and the CAPEC database (https://capec.mitre.org/).

For what purpose?

ProHacktive's promise is the democratization of the Cybersecurity Audit. For this, it seemed relevant to us to offer our "Knowledge Base" in different languages. Associated with this multilingual database, a clear and concise interface allows you to consult all the CVE ("Common Vulnerabilities and Exposures") present on your network. The Sherlock® service database is updated every hour from the various sources enriching our Sherlock® KB and immediately tested on the devices concerned by the new vulnerability.

Search for vulnerabilities

We also offer a simple search module in the description of each CVE. For the more curious, an advanced search allows you to point precisely to an application, an OS or a hardware. This advanced search is based on the mechanics used in our solution Sherlock®: the permanent Cybersecurity audit accessible financially and technically to all.

Developments?

We will add new languages regularly. A monitoring module will be implemented: you will be able to monitor an application, an OS or a hardware to be alerted of new vulnerabilities concerning it. Subscribe to our mailing list to be alerted when this feature is released (available on search results).