A vulnerability was found in Formidable PRO2PDF Plugin up to 3.10 on WordPress. It has been rated as critical. This affects the function fpropdf_export_file. The manipulation of the argument fieldmap leads to sql injection.
This vulnerability is listed as CVE-2023-28663. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Waiting One-click Countdowns Plugin up to 0.6.2 on WordPress. Affected by this issue is the function pbc_save_downs. The manipulation of the argument pbc_down[meta][id] results in sql injection.
This vulnerability is known as CVE-2023-28659. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Events Made Easy Plugin up to 2.3.14 on WordPress. It has been classified as critical. Affected by this vulnerability is the function eme_recurrences_list. Performing manipulation of the argument search_name results in sql injection.
This vulnerability is identified as CVE-2023-28660. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in WP Popup Banners Plugin up to 1.2.5 on WordPress. It has been declared as critical. Affected by this issue is the function get_popup_data. Executing manipulation of the argument Value can lead to sql injection.
This vulnerability is tracked as CVE-2023-28661. The attack can be launched remotely. No exploit exists.
A vulnerability categorized as critical has been discovered in CONPROSYS HMI System up to 3.5.2. Affected by this vulnerability is an unknown functionality. The manipulation results in improper access controls.
This vulnerability is identified as CVE-2023-28657. The attack is only possible with local access. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.4.230/5.10.165/5.15.90/6.1.8 and classified as critical. Affected by this vulnerability is the function __nla_validate_parse of the component netlink. Executing manipulation can lead to improper validation of array index.
The identification of this vulnerability is CVE-2023-53000. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.8. This affects the function page_pool_release_retry of the component fec. Performing manipulation results in improper update of reference count.
This vulnerability was named CVE-2023-52998. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 4.19.271/5.4.230/5.10.165/5.15.90/6.1.8. The impacted element is the function net_assign_generic. Performing manipulation results in use after free.
This vulnerability is reported as CVE-2023-52999. The attacker must have access to the local network to execute the attack. No exploit exists.
You should upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 4.19.271/5.4.230/5.10.165/5.15.90/6.1.8. Affected is the function ip_metrics_convert of the component Kernel Memory Handler. Such manipulation leads to improper validation of array index.
This vulnerability is traded as CVE-2023-52997. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.8. This affects the function real_mode_header of the component acpi. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2023-52994. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability classified as critical was found in Linux Kernel up to 5.15.90/6.1.8. Affected by this issue is the function vfs_write of the component kprobe. Such manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2023-52995. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.4.230/5.10.165/5.15.90/6.1.8. This impacts the function fib_metrics_match of the component ipv4. This manipulation causes improper validation of array index.
This vulnerability appears as CVE-2023-52996. The attacker needs to be present on the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.8 and classified as critical. Affected is the function get_irq_regs of the component i8259. Performing manipulation results in null pointer dereference.
This vulnerability was named CVE-2023-52993. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability described as problematic has been identified in Linux Kernel up to 6.1.9. Impacted is the function absolute_pointer of the file arch/s390/kernel/setup.c. Executing manipulation can lead to out-of-bounds read.
This vulnerability appears as CVE-2023-52990. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 5.10.166/5.15.91/6.1.9. It has been declared as critical. This affects the function skb_segment_list of the component net. Executing manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2023-52991. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.4.230/5.10.166/5.15.91/6.1.9. The affected element is the function send_signal_common of the component bpf. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2023-52992. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.10. This issue affects the function release_request of the file drivers/firewire/core-cdev.c of the component FCP Handler. This manipulation causes use after free.
This vulnerability appears as CVE-2023-52989. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.10. This impacts an unknown function of the component imx8mm-verdin. Such manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2023-52985. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability marked as problematic has been reported in Linux Kernel up to 6.1.10. This issue affects the function sof_ipc4_priority_mask_dfs_write of the component ipc4-mtrace. Performing manipulation results in insufficient verification of data authenticity.
This vulnerability is reported as CVE-2023-52987. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.