7.8
CVE-2024-56772 - kunit: string-stream: Fix a UAF bug in kunit_init_suite()
In the Linux kernel, the following vulnerability has been resolved: kunit: string-stream: Fix a UAF bug in kunit_init_suite() In kunit_debugfs_create_suite(), if alloc_string_stream() fails in the kunit_suite_for_each_test_case() loop, the "suite->log = stream" has assigned before, and the error โฆ
8.8
CVE-2024-51442 -
Command Injection in Minidlna version v1.3.3 and before allows an attacker to execute arbitrary OS commands via a specially crafted minidlna.conf configuration file.
8.8
CVE-2024-54818 -
SourceCodester Computer Laboratory Management System 1.0 is vulnerable to Incorrect Access Control. via /php-lms/admin/?page=user/list.
5.5
CVE-2024-56781 - powerpc/prom_init: Fixup missing powermac #size-cells
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
4.4
CVE-2024-56786 - kernel: bpf: put bpf_link's program when link is safe to be deallocated
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
5.5
CVE-2024-56785 - MIPS: Loongson64: DTS: Really fix PCIe port nodes for ls7a
In the Linux kernel, the following vulnerability has been resolved: MIPS: Loongson64: DTS: Really fix PCIe port nodes for ls7a Fix the dtc warnings: arch/mips/boot/dts/loongson/ls7a-pch.dtsi:68.16-416.5: Warning (interrupt_provider): /bus@10000000/pci@1a000000: '#interrupt-cells' found, but โฆ
6.5
CVE-2024-55459 - keras: arbitrary file write via get_file function
An issue in keras 3.7.0 allows attackers to write arbitrary files to the user's machine via downloading a crafted tar file through the get_file function.
7.8
CVE-2024-56784 - drm/amd/display: Adding array index check to prevent memory corruption
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adding array index check to prevent memory corruption [Why & How] Array indices out of bound caused memory corruption. Adding checks to ensure that array index stays in bound.
5.5
CVE-2024-56777 - drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check
In the Linux kernel, the following vulnerability has been resolved: drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check The return value of drm_atomic_get_crtc_state() needs to be checked. To avoid use of error pointer 'crtc_state' in case of the failure.
4
CVE-2024-54731 -
cpdf through 2.8 allows stack consumption via a crafted PDF document.