Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-32233

EPSS 0.66% · P71
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-32233

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于匿名集处理不当,处理批请求时 Netfilter nf_tables 中存在释放后重用问题,可以被滥用对内核内存执行任意读写操作。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-32233

#POC DescriptionSource LinkShenlong Link
1自用,poc作者为Piotr Krysiuk,在使用前请先阅读README.mdhttps://github.com/PIDAN-HEIDASHUAI/CVE-2023-32233POC Details
2CVE-2023-32233: Linux内核中的安全漏洞https://github.com/Liuk3r/CVE-2023-32233POC Details
3Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233https://github.com/oferchen/POC-CVE-2023-32233POC Details
4CVE-2023-32233https://github.com/RogelioPumajulca/TEST-CVE-2023-32233POC Details
5Nonehttps://github.com/void0red/CVE-2023-32233POC Details
6Nonehttps://github.com/rootkalilocalhost/CVE-2023-32233POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-32233

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-05-08 · 30 CVEs total

CVE-2020-22334BEESCMS 跨站请求伪造漏洞
CVE-2023-1031MonicaHQ 安全漏洞
CVE-2023-1094MonicaHQ 安全漏洞
CVE-2023-30787MonicaHQ 跨站脚本漏洞
CVE-2023-30788MonicaHQ 跨站脚本漏洞
CVE-2023-30789MonicaHQ 跨站脚本漏洞
CVE-2023-30790MonicaHQ 跨站脚本漏洞
CVE-2023-2513Linux kernel 资源管理错误漏洞
CVE-2023-2582Strikingly CMS 安全漏洞
CVE-2023-30334AsmBB 安全漏洞
CVE-2020-18131Clan Scripts 跨站请求伪造漏洞
CVE-2020-18132MIPCMS 跨站脚本漏洞
CVE-2020-18282NoneCMS 跨站脚本漏洞
CVE-2020-19660Editor.md 跨站脚本漏洞
CVE-2020-21038typecho 输入验证错误漏洞
CVE-2023-30018Judging Management System SQL注入漏洞
CVE-2020-22755MingSoft MCMS 代码问题漏洞
CVE-2020-23966Victor CMS SQL注入漏洞
CVE-2020-36065sunkaifei FlyCms 跨站请求伪造漏洞
CVE-2021-27280mblog 代码问题漏洞

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-32233

No comments yet


Leave a comment