Aggregator
CVE-2024-47700 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 ext4 __ext4_fill_super Privilege Escalation
1 year 5 months ago
A vulnerability was found in Linux Kernel up to 6.6.53/6.10.12/6.11.1 and classified as problematic. Affected by this issue is the function __ext4_fill_super of the component ext4. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-47700. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-49861 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 bpf check_func_arg uninitialized pointer
1 year 5 months ago
A vulnerability has been found in Linux Kernel up to 6.6.53/6.10.12/6.11.1 and classified as problematic. Affected by this vulnerability is the function check_func_arg of the component bpf. The manipulation leads to uninitialized pointer.
This vulnerability is known as CVE-2024-49861. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-49860 | Linux Kernel up to 6.11.1 ACPI description_show return value
1 year 5 months ago
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.11.1. Affected is the function description_show of the component ACPI. The manipulation leads to unchecked return value.
This vulnerability is traded as CVE-2024-49860. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-49859 | Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1 f2fs_ioc_set_pin_file Privilege Escalation
1 year 5 months ago
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1. This issue affects the function f2fs_ioc_set_pin_file. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2024-49859. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-49858 | Linux Kernel up to 6.11.1 GetEventLog denial of service
1 year 5 months ago
A vulnerability classified as critical was found in Linux Kernel up to 6.11.1. This vulnerability affects the function GetEventLog. The manipulation leads to denial of service.
This vulnerability was named CVE-2024-49858. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-49857 | Linux Kernel up to 6.11.1 mvm null pointer dereference (b3322a6d6aa9/a949075d4bbf)
1 year 5 months ago
A vulnerability classified as critical has been found in Linux Kernel up to 6.11.1. This affects an unknown part of the component mvm. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-49857. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-49855 | Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1 nbd_requeue_cmd use after free
1 year 5 months ago
A vulnerability was found in Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1. It has been rated as critical. Affected by this issue is the function nbd_requeue_cmd. The manipulation leads to use after free.
This vulnerability is handled as CVE-2024-49855. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-49853 | Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1 arm_scmi double free
1 year 5 months ago
A vulnerability was found in Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component arm_scmi. The manipulation leads to double free.
This vulnerability is known as CVE-2024-49853. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Graylog enables organizations to make more informed decisions about their security posture
1 year 5 months ago
Graylog unveiled significant security advancements to drive smarter, faster, and more cost-efficient security operations. The company’s latest capabilities include advanced data routing, asset-based risk scoring, and AI-generated investigation reports. These enhancements, and many others in the Fall 2024 release, help organizations realign their time and financial investment with security objectives, empowering security teams to confidently reduce risk. With a detailed understanding of the threat landscape at both user and system levels, Graylog enables organizations to … More →
The post Graylog enables organizations to make more informed decisions about their security posture appeared first on Help Net Security.
Industry News
Netskope Reports Possible Bumblebee Loader Resurgence
1 year 5 months ago
The malware loader taken down by Europol in May 2024 could be back with a vengeance
Why I'm Excited About the Future of Application Security
1 year 5 months ago
The future of application security is no longer about reacting to the inevitable — it's about anticipating and preventing attacks before they can cause damage.
Bradley Schaufenbuel
云时代下,如何落地有效的云安全防御体系
1 year 5 months ago
10月22日(本周二)15:00不见不散~
安全动态回顾|9项网络安全国家标准获批发布 Google Play上超过200个恶意应用下载了数百万次
1 year 5 months ago
快速浏览!2024.10.14—10.20安全动态周回顾。
窃取加密货币的恶意软件攻击感染近3万人
1 year 5 months ago
为避免意外的经济损失,请用户仅从该项目的官方网站下载软件,并阻止或跳过 Google 搜索上的推广结果。
强网拟态初赛 2024 By W&M
1 year 5 months ago
CVE-2024-49852 | Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1 efc_nport_vport_del use after free
1 year 5 months ago
A vulnerability was found in Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1. It has been classified as critical. Affected is the function efc_nport_vport_del. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-49852. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-47754 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 vdec_h264_req_multi_if.c null pointer dereference
1 year 5 months ago
A vulnerability was found in Linux Kernel up to 6.6.53/6.10.12/6.11.1 and classified as critical. This issue affects some unknown processing of the file vdec_h264_req_multi_if.c. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2024-47754. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-47753 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 vdec_vp8_req_if.c null pointer dereference
1 year 5 months ago
A vulnerability has been found in Linux Kernel up to 6.6.53/6.10.12/6.11.1 and classified as critical. This vulnerability affects unknown code of the file vdec_vp8_req_if.c. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-47753. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-47752 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 vcodec vdec_h264_req_if.c null pointer dereference
1 year 5 months ago
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.53/6.10.12/6.11.1. This affects an unknown part of the file vdec_h264_req_if.c of the component vcodec. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-47752. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com