A vulnerability has been found in Linux Kernel up to 6.12.6 and classified as critical. Affected by this vulnerability is the function copy_user_gigantic_page. The manipulation leads to memory corruption.
This vulnerability is listed as CVE-2024-51729. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.4. This vulnerability affects the function cancel_work_sync of the component mpc52xx. The manipulation results in use after free.
This vulnerability was named CVE-2024-50051. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.12.6. Affected is the function pick_next_entity. Executing a manipulation can lead to privilege escalation.
This vulnerability is tracked as CVE-2024-49573. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.4. This impacts the function blk_mq_freeze_queue_wait. Executing a manipulation can lead to denial of service.
This vulnerability is handled as CVE-2024-49569. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical was found in Linux Kernel up to 6.6.67/6.12.6. This affects an unknown function. Such manipulation of the argument v2_ext_offset/eid_cnt/ism_gid_cnt leads to denial of service.
This vulnerability is referenced as CVE-2024-49568. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.6.65/6.12.4. Affected is the function dev_replace. Performing a manipulation results in improper locking.
This vulnerability was named CVE-2024-48875. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.4. This affects the function stack_depot_save_flags. Performing a manipulation results in deadlock.
This vulnerability is known as CVE-2024-48876. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.4. Affected by this vulnerability is the function cache_set_flush. Executing a manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2024-48881. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.10.230/5.15.173/6.1.119/6.6.65/6.12.4. Affected is the function radix_lock of the component dma-debug. Such manipulation leads to deadlock.
This vulnerability is traded as CVE-2024-47143. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in Linux Kernel up to 6.6.65/6.12.4. The affected element is the function ieee80211_probereq_get of the component rtw89. This manipulation causes unchecked return value.
This vulnerability appears as CVE-2024-48873. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.6.65/6.12.4. Impacted is the function pinctrl_select_state of the component pinmux. The manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2024-47141. The attacker must have access to the local network to execute the attack. No exploit exists.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.121/6.6.67/6.12.6. The affected element is the function memset. The manipulation results in null pointer dereference.
This vulnerability was named CVE-2024-46896. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability labeled as problematic has been found in Inventory Management System 1.0. This affects an unknown function of the component Add Member Section. Such manipulation of the argument Name/Address/Company leads to cross site scripting.
This vulnerability is listed as CVE-2023-39714. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in Inventory Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument Subtotal/Paidbill leads to cross site scripting.
This vulnerability is documented as CVE-2023-39711. The attack can be initiated remotely. There is not any exploit available.
A vulnerability categorized as problematic has been discovered in Inventory Management System 1.0. The impacted element is an unknown function of the component Add New Put Section. The manipulation of the argument Name/Address/Company results in cross site scripting.
This vulnerability was named CVE-2023-39712. The attack may be performed from remote. There is no available exploit.
A vulnerability categorized as critical has been discovered in pymumu SmartDNS up to 47.1. This vulnerability affects the function _dns_decode_rr_head/_dns_decode_SVCB_HTTPS of the file src/dns.c of the component SVBC Record Parser. The manipulation results in stack-based buffer overflow.
This vulnerability is known as CVE-2026-1425. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability was found in PHPGurukul News Portal 1.0. It has been rated as critical. This affects an unknown part of the component Profile Pic Handler. The manipulation leads to unrestricted upload.
This vulnerability is traded as CVE-2026-1424. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.