A vulnerability was found in SourceCodester Online Railway Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_details.php. The manipulation of the argument id leads to improper access controls.
The identification of this vulnerability is CVE-2024-9321. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.9.3. This affects the function dctcp_update_alpha of the component tcp. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2024-37356. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.8.5. Affected is the function dg_dispatch_as_host of the file drivers/misc/vmw_vmci/vmci_datagram.c of the component VMCI. The manipulation leads to Privilege Escalation.
This vulnerability is traded as CVE-2024-35944. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.8.9. This vulnerability affects the function rpc_proc_register of the file /proc/net/sunrpc/nfs of the component Net Namespace Handler. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2024-36939. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.9.8. Affected by this vulnerability is an unknown functionality. The manipulation of the argument NL80211_ATTR_TXQ_QUANTUM leads to state issue.
This vulnerability is known as CVE-2024-42114. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.163/6.1.100/6.6.41/6.9.10. Affected is an unknown function of the component radeon. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2024-41060. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.161/6.1.94/6.6.34/6.9.5. It has been classified as critical. Affected is the function rdev_get_station of the component cfg80211. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2024-40911. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.95/6.6.35/6.9.6. It has been rated as critical. Affected by this issue is the function reset_work of the component mt7921s. The manipulation leads to deadlock.
This vulnerability is handled as CVE-2024-40977. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.10.220/5.15.161/6.1.94/6.6.34/6.9.5. This affects the function n_ssids of the component iwlwifi. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2024-40929. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was suspected in Linux Kernel up to 6.1.97/6.1.98/6.6.38/6.6.39/6.9.8. This issue was flagged as a false-positive. Please consult the sources mentioned and consider not using this entry at all.
A vulnerability classified as critical was found in Linux Kernel up to 6.5.7 on USB. This vulnerability affects the function hidpp_connect_event of the component logitech-hidpp. The manipulation leads to denial of service.
This vulnerability was named CVE-2023-52478. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.4.168/5.10.88/5.15.11. This issue affects the function elantech_change_report_id of the component Input. The manipulation of the argument param[] leads to out-of-bounds read.
The identification of this vulnerability is CVE-2021-47097. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.10. Affected is the function do_proc_control of the file /proc/sys/kernel/hung_task_timeout_secs of the component USB Core. The manipulation leads to missing initialization of a variable.
This vulnerability is traded as CVE-2021-47582. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.14/6.7.2. It has been declared as critical. Affected by this vulnerability is the function amdgpu_ucode_request. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-26649. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.14/6.7.2. It has been rated as critical. Affected by this issue is the function amdgpu_ucode_request. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-26649. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.