A vulnerability was found in Linux Kernel up to 6.1.10. It has been declared as problematic. Affected is the function ublk_get_queue in the library ublk_cmd.h of the component Ublk. Executing manipulation can lead to out-of-bounds read.
This vulnerability is tracked as CVE-2023-52980. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.10. It has been rated as critical. This affects the function __guc_reset_context of the component i915. The manipulation leads to improper update of reference count.
This vulnerability is documented as CVE-2023-52981. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.15.92/6.1.10. This affects an unknown function of the component kprobe. Executing manipulation can lead to denial of service.
This vulnerability appears as CVE-2023-52978. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in GLPI up to 9.5.12/10.0.6. This affects an unknown function. The manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2023-28639. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in Org Mode up to 9.6.1 on Emacs and classified as critical. Affected by this vulnerability is an unknown functionality. Such manipulation leads to os command injection.
This vulnerability is listed as CVE-2023-28617. The attack must be carried out locally. There is no available exploit.
It is advisable to implement a patch to correct this issue.
A vulnerability was found in OMICRON StationScout up to 2.20. It has been declared as very critical. Affected is an unknown function of the component Firmware Update Handler. Executing manipulation can lead to privilege escalation.
The identification of this vulnerability is CVE-2023-28610. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in OMICRON StationGuard and StationScout and classified as critical. The impacted element is an unknown function. Executing manipulation can lead to improper access controls.
This vulnerability is registered as CVE-2023-28611. The attack requires access to the local network. No exploit is available.
A vulnerability classified as critical has been found in Samsung Exynos 1280, Exynos 2200 and Exynos Modem 5300. This impacts an unknown function of the component IPv4 Fragmentation Handler. Performing manipulation results in integer overflow.
This vulnerability is reported as CVE-2023-28613. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability marked as critical has been reported in Freewill IFIS 20.01.01.04. Affected by this issue is some unknown functionality of the component Report Page. This manipulation causes os command injection.
This vulnerability is registered as CVE-2023-28614. The attack requires access to the local network. No exploit is available.
A vulnerability marked as problematic has been reported in MISP. The impacted element is an unknown function of the file js/event-graph.js of the component Event-Graph Relationship Tooltip Handler. Performing manipulation results in cross site scripting.
This vulnerability is known as CVE-2023-28607. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in MISP. The affected element is an unknown function of the file js/event-graph.js of the component Event-Graph Node Tooltip Handler. Such manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2023-28606. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in UTT 进取 520W 1.7.7-180627. The affected element is the function strcpy of the file /goform/websHostFilter. Performing manipulation of the argument addHostFilter results in buffer overflow.
This vulnerability is reported as CVE-2025-14140. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.10. Affected by this issue is the function ovs_flow_cmd_new in the library include/linux/slab.h. The manipulation results in memory leak.
This vulnerability is cataloged as CVE-2023-52977. The attack must originate from the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.4.231/5.10.167/5.15.92/6.1.10. This affects the function efi_mem_reserve_persistent. This manipulation causes null pointer dereference.
This vulnerability is handled as CVE-2023-52976. The attack can only be done within the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.10. It has been classified as critical. The affected element is the function vcs_read of the file drivers/tty/vt/vc_screen.c. This manipulation causes use after free.
This vulnerability is tracked as CVE-2023-52973. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability has been found in Linux Kernel up to 6.1.10 and classified as problematic. The impacted element is the function update_parent_subparts_cpumask. This manipulation causes state issue.
The identification of this vulnerability is CVE-2023-52942. The attack needs to be done within the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.10. The affected element is the function iscsi_sw_tcp_session_create. Such manipulation leads to use after free.
This vulnerability is documented as CVE-2023-52974. The attack requires being on the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.10. It has been declared as critical. This issue affects the function mem_cgroup_track_foreign_dirty_slowpath of the component LRU Page Handler. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2023-52939. The attack must originate from the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.10. Affected by this vulnerability is the function panic_on_warn of the component isotp. This manipulation causes state issue.
This vulnerability is handled as CVE-2023-52941. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.