[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7597 Download | Alert*

atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).

A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.

A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asu ...

A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

A use-after-free flaw was found in the Linux kernel���s Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 ("ovl: fix use after free in struct ovl_aio_req") not applied yet, the kernel could be affected.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Thread Pooling. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Client: mysqldump. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Group Replication Plugin. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DDL. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect availability.


Pages:      Start    718    719    720    721    722    723    724    725    726    727    728    729    730    731    ..   759

© SecPod Technologies