A vulnerability was found in Linux Kernel up to 6.1.103/6.6.44/6.10.3. It has been rated as problematic. Affected by this issue is the function do_dup2 of the component Speculative Execution. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-42265. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in thiagosf Skitter Slideshow Plugin up to 2.5.2 on WordPress. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /image.php. The manipulation leads to server-side request forgery.
This vulnerability is known as CVE-2022-1751. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.1.102/6.6.43/6.10.2. It has been classified as critical. Affected is the function virtio_net_hdr_to_skb of the file net/core/dev.c. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2024-43817. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.102/6.6.43/6.10.2 and classified as critical. This issue affects the function __skb_get_hash of the file net/core/flow_dissector.c of the component flow_dissector. The manipulation leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2024-42321. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.103/6.6.44/6.10.2 and classified as problematic. This vulnerability affects the function set_ownership of the component sysctl. The manipulation of the argument i_uid/i_gid leads to improper initialization.
This vulnerability was named CVE-2024-42312. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.102/6.6.43/6.10.2. This affects the function plane_state of the component AMD Display. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-42308. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.102/6.6.43/6.10.2. Affected by this issue is the function do_split of the component ext4. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2024-42305. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.1.102/6.6.43/6.10.2. Affected by this vulnerability is the function sync_filesystem of the file fs/f2fs/inode.c of the component f2fs. The manipulation leads to denial of service.
This vulnerability is known as CVE-2024-42297. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.102/6.6.43/6.10.2. Affected is the function f2fs_convert_inline_inode. The manipulation leads to unchecked return value.
This vulnerability is traded as CVE-2024-42296. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.43/6.10.2. It has been rated as critical. This issue affects the function rx_len of the component microchip-core. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2024-42279. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.43/6.10.2. It has been declared as problematic. This vulnerability affects the function bwmon_remove of the file drivers/opp/core.c of the component icc-bwmon. The manipulation leads to improper update of reference count.
This vulnerability was named CVE-2024-43850. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.102/6.6.43/6.10.2. It has been classified as problematic. This affects the function mlxsw_core of the component objagg. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-43846. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.2 and classified as problematic. Affected by this issue is the function __bpf_tramp_enter. The manipulation leads to allocation of resources.
This vulnerability is handled as CVE-2024-43840. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.10.2 and classified as problematic. Affected by this vulnerability is the function virtnet_poll_tx of the file net/core/skbuff.c. The manipulation leads to Privilege Escalation.
This vulnerability is known as CVE-2024-43835. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.102/6.6.43/6.10.2. Affected is the function deactivate of the component trigger. The manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2024-43830. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.102/6.6.43/6.10.2. This issue affects the function ext4_ext_determine_insert_hole. The manipulation leads to integer overflow.
The identification of this vulnerability is CVE-2024-43828. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.102/6.6.43/6.10.2. This vulnerability affects the function imx_rproc_addr_init of the component remoteproc. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-43860. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.43/6.10.2. This affects the function f2fs_file_open. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-43859. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1/6.2/6.6.43/6.10.2. It has been rated as critical. Affected by this issue is the function lpfc_xcvr_data_show of the component lpfc. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-43821. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.