Aggregator
GITEX GLOBAL 2025
1 week hence
原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
1 hour 53 minutes ago
原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
CVE-2024-47697 | Linux Kernel up to 6.11.1 rtl2830_pid_filter out-of-bounds write (Nessus ID 212567 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.11.1. Affected is the function rtl2830_pid_filter. The manipulation leads to out-of-bounds write.
This vulnerability is listed as CVE-2024-47697. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2024-47698 | Linux Kernel up to 6.11.1 rtl2832_pid_filter out-of-bounds write (Nessus ID 212612 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.11.1. Affected by this vulnerability is the function rtl2832_pid_filter. The manipulation results in out-of-bounds write.
This vulnerability is cataloged as CVE-2024-47698. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2024-47694 | Linux Kernel up to 6.11.1 mlx5r_umr_resource_cleanup null pointer dereference (99e2de5942b0/112e6e83a894 / Nessus ID 216493)
4 hours 23 minutes ago
A vulnerability labeled as critical has been found in Linux Kernel up to 6.11.1. This affects the function mlx5r_umr_resource_cleanup. Executing manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2024-47694. The attack needs to be done within the local network. There is no exploit available.
The affected component should be upgraded.
vuldb.com
CVE-2024-47695 | Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1 RDMA init_conns out-of-bounds (Nessus ID 212920 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability classified as problematic was found in Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1. This impacts the function init_conns of the component RDMA. Executing manipulation can lead to out-of-bounds read.
This vulnerability is tracked as CVE-2024-47695. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.
vuldb.com
CVE-2024-47696 | Linux Kernel up to 6.11.1 RDMA flush_workqueue use after free (Nessus ID 212864 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability marked as critical has been reported in Linux Kernel up to 6.11.1. This vulnerability affects the function flush_workqueue of the component RDMA. The manipulation leads to use after free.
This vulnerability is referenced as CVE-2024-47696. The attack needs to be initiated within the local network. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2024-47691 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 lib/dump_stack.c f2fs_stop_gc_thread use after free (Nessus ID 216493 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability identified as critical has been detected in Linux Kernel up to 6.6.53/6.10.12/6.11.1. The affected element is the function f2fs_stop_gc_thread in the library lib/dump_stack.c. The manipulation leads to use after free.
This vulnerability is referenced as CVE-2024-47691. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2024-47693 | Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1 ib_cache_setup_one cleanup (Nessus ID 212904 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1. This affects the function ib_cache_setup_one. The manipulation results in incomplete cleanup.
This vulnerability is reported as CVE-2024-47693. The attacker must have access to the local network to execute the attack. No exploit exists.
You should upgrade the affected component.
vuldb.com
CVE-2024-47692 | Linux Kernel up to 6.11.1 /var/lib/nfs/nfsdcld/ memdup_user null pointer dereference (Nessus ID 210933 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.11.1. Affected by this issue is the function memdup_user in the library /var/lib/nfs/nfsdcld/. The manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2024-47692. The attack requires being on the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2024-47689 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 kernel/rcu/sync.c f2fs_handle_critical_error race condition (Nessus ID 216493 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability was found in Linux Kernel up to 6.6.53/6.10.12/6.11.1. It has been classified as problematic. This affects the function f2fs_handle_critical_error of the file kernel/rcu/sync.c. This manipulation causes race condition.
This vulnerability is handled as CVE-2024-47689. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2024-47690 | Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1 fs/f2fs/inode.c f2fs_lookup state issue (Nessus ID 212823 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability classified as problematic was found in Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1. Affected by this vulnerability is the function f2fs_lookup of the file fs/f2fs/inode.c. Executing manipulation can lead to state issue.
This vulnerability is registered as CVE-2024-47690. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is advised.
vuldb.com
CVE-2024-47688 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 Driver Core module_add_driver null pointer dereference (Nessus ID 216493 / WID-SEC-2024-3251)
4 hours 23 minutes ago
A vulnerability was found in Linux Kernel up to 6.6.53/6.10.12/6.11.1. It has been rated as critical. This issue affects the function module_add_driver of the component Driver Core. Performing manipulation results in null pointer dereference.
This vulnerability was named CVE-2024-47688. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is advised.
vuldb.com
CVE-2024-47687 | Linux Kernel up to 6.10.12/6.11.1 mlx5_vdpa_dev_add null pointer dereference (b6fbb1c7801f/5fe351def237/dc12502905b7 / Nessus ID 210940)
4 hours 23 minutes ago
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.10.12/6.11.1. This affects the function mlx5_vdpa_dev_add. The manipulation results in null pointer dereference.
This vulnerability was named CVE-2024-47687. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2025-11293 | Belkin F9K1015 1.00.10 formConnectionSetting max_Conn buffer overflow
4 hours 30 minutes ago
A vulnerability was found in Belkin F9K1015 1.00.10. It has been rated as critical. Affected by this vulnerability is an unknown functionality of the file /goform/formConnectionSetting. The manipulation of the argument max_Conn leads to buffer overflow.
This vulnerability is listed as CVE-2025-11293. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-11294 | Belkin F9K1015 1.00.10 /goform/formL2TPSetup L2TPUserName buffer overflow
4 hours 30 minutes ago
A vulnerability categorized as critical has been discovered in Belkin F9K1015 1.00.10. Affected by this issue is some unknown functionality of the file /goform/formL2TPSetup. The manipulation of the argument L2TPUserName results in buffer overflow.
This vulnerability is cataloged as CVE-2025-11294. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-47686 | Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1 ep93xx_div_recalc_rate out-of-bounds (Nessus ID 213470 / WID-SEC-2024-3251)
4 hours 48 minutes ago
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1. Affected is the function ep93xx_div_recalc_rate. Performing manipulation results in out-of-bounds read.
This vulnerability is cataloged as CVE-2024-47686. The attack must originate from the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-47685 | Linux Kernel up to 6.11.1 netfilter nf_reject_ip6_tcphdr_put uninitialized resource (Nessus ID 210933 / WID-SEC-2024-3251)
4 hours 48 minutes ago
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.11.1. This impacts the function nf_reject_ip6_tcphdr_put of the component netfilter. This manipulation causes uninitialized resource.
The identification of this vulnerability is CVE-2024-47685. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2024-47684 | Linux Kernel up to 6.11.1 tcp_rto_delta_us null pointer dereference (Nessus ID 210933 / WID-SEC-2024-3251)
4 hours 48 minutes ago
A vulnerability was found in Linux Kernel up to 6.11.1 and classified as critical. Affected by this issue is the function tcp_rto_delta_us. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2024-47684. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com