A vulnerability was found in Linux Kernel up to 6.10.6. It has been classified as critical. This affects an unknown part of the file drivers/ata/pata_macio.c of the component DMA Table Handler. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2024-44976. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.6 and classified as critical. Affected by this issue is the function partcmd_update. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2024-44975. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.10.6 and classified as critical. Affected by this vulnerability is the function xe_exec_queue_put of the component DRM. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-44978. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in OpenStack Ironic and Ironic-python-agent. Affected is an unknown function of the component qemu-img. The manipulation leads to Remote Code Execution.
This vulnerability is traded as CVE-2024-44082. The attack can only be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in Bit File Manager Plugin 6.0/6.5.5 on WordPress. This issue affects some unknown processing. The manipulation leads to race condition.
The identification of this vulnerability is CVE-2024-7627. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Ivory Search Plugin up to 5.5.6 on WordPress. This vulnerability affects unknown code of the component AJAX Search Form. The manipulation leads to information disclosure.
This vulnerability was named CVE-2024-6835. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability classified as critical has been found in Google Go. This affects an unknown part of the component x-net. The manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2024-8421. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in za-internet C-MOR Video Surveillance 5.2401/6.00PL01. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2024-45172. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in za-internet C-MOR Video Surveillance 5.2401/6.00PL01. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-45177. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Micron Crucial MX500 Series Solid State Drives M3CR046. It has been classified as critical. Affected is an unknown function of the component ATA Packet Handler. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2024-42642. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in za-internet C-MOR Video Surveillance 5.2401/6.00PL01 and classified as critical. This issue affects some unknown processing of the component Web Interface. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2024-45174. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in za-internet C-MOR Video Surveillance 5.2401 and classified as critical. This vulnerability affects unknown code of the component Setting Handler. The manipulation leads to improper access controls.
This vulnerability was named CVE-2024-45170. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.10.4. This affects the function uevent_show. The manipulation leads to deadlock.
This vulnerability is uniquely identified as CVE-2024-44952. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Cisco Duo Authentication for Epic up to 1.2.0.95. Affected by this issue is some unknown functionality of the component Registry Key Handler. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-20503. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.