4.8

CVSS3.1

CVE-2024-54775 -

Dcat-Admin v2.2.0-beta and v2.2.2-beta contains a Cross-Site Scripting (XSS) vulnerability via /admin/auth/menu and /admin/auth/extensions.

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: April 22, 2025, 3:46 p.m.

7.8

CVSS3.1

CVE-2024-53206 - tcp: Fix use-after-free of nreq in reqsk_timer_handler().

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix use-after-free of nreq in reqsk_timer_handler(). The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with __inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler(). Then, oreq should be passed to …

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:17 p.m.

9.4

CVSS3.1

CVE-2024-54450 -

An issue was discovered in Kurmi Provisioning Suite 7.9.0.33. If an X-Forwarded-For header is received during authentication, the Kurmi application will record the (possibly forged) IP address mentioned in that header rather than the real IP address that the user logged in from. This fake IP addres…

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: Dec. 28, 2024, 7:15 p.m.

5.5

CVSS3.1

CVE-2024-53236 - xsk: Free skb when TX metadata options are invalid

In the Linux kernel, the following vulnerability has been resolved: xsk: Free skb when TX metadata options are invalid When a new skb is allocated for transmitting an xsk descriptor, i.e., for every non-multibuf descriptor or the first frag of a multibuf descriptor, but the descriptor is later fo…

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: Oct. 8, 2025, 1:47 p.m.

5.5

CVSS3.1

CVE-2024-53180 - ALSA: pcm: Add sanity NULL check for the default mmap fault handler

In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Add sanity NULL check for the default mmap fault handler A driver might allow the mmap access before initializing its runtime->dma_area properly. Add a proper NULL check before passing to virt_to_page() for avoiding a…

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:55 a.m.

7.8

CVSS3.1

CVE-2024-53171 - ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit

In the Linux kernel, the following vulnerability has been resolved: ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit After an insertion in TNC, the tree might split and cause a node to change its `znode->parent`. A further deletion of other nodes in the tree (which also could fre…

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: Nov. 3, 2025, 9:17 p.m.

5.5

CVSS3.1

CVE-2024-56641 - net/smc: initialize close_work early to avoid warning

In the Linux kernel, the following vulnerability has been resolved: net/smc: initialize close_work early to avoid warning We encountered a warning that close_work was canceled before initialization. WARNING: CPU: 7 PID: 111103 at kernel/workqueue.c:3047 __flush_work+0x19e/0x1b0 Workqueue: ev…

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: Oct. 6, 2025, 5:38 p.m.

5.5

CVSS3.1

CVE-2024-56573 - efi/libstub: Free correct pointer on failure

In the Linux kernel, the following vulnerability has been resolved: efi/libstub: Free correct pointer on failure cmdline_ptr is an out parameter, which is not allocated by the function itself, and likely points into the caller's stack. cmdline refers to the pool allocation that should be freed w…

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: Oct. 7, 2025, 6:23 p.m.

5.5

CVSS3.1

CVE-2024-53225 - iommu/tegra241-cmdqv: Fix alignment failure at max_n_shift

In the Linux kernel, the following vulnerability has been resolved: iommu/tegra241-cmdqv: Fix alignment failure at max_n_shift When configuring a kernel with PAGE_SIZE=4KB, depending on its setting of CONFIG_CMA_ALIGNMENT, VCMDQ_LOG2SIZE_MAX=19 could fail the alignment test and trigger a WARN_ON:…

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: Oct. 1, 2025, 9:16 p.m.

5.5

CVSS3.1

CVE-2024-53189 - wifi: nl80211: fix bounds checker error in nl80211_parse_sched_scan

In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix bounds checker error in nl80211_parse_sched_scan The channels array in the cfg80211_scan_request has a __counted_by attribute attached to it, which points to the n_channels variable. This attribute is used in b…

πŸ“… Published: Dec. 27, 2024, midnight πŸ”„ Last Modified: Oct. 8, 2025, 2:06 p.m.
Total resulsts: 343919
Page 6840 of 34,392
Β« previous page Β» next page
Filters