A vulnerability, which was classified as critical, was found in Fylet Secure Large File Sender 2. This affects an unknown part of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is uniquely identified as CVE-2014-7098. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.9.4 and classified as problematic. Affected by this issue is the function sanity_check_inode of the file fs/f2fs/f2fs.h of the component f2fs. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2024-39467. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.1.93/6.6.33/6.9.4. Affected by this issue is the function btree_iter of the component bcache. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2024-39482. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.4. It has been classified as critical. Affected is the function platform_data of the component lgdt3306a. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2022-48772. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.9.3. This affects an unknown part of the component soundwire. The manipulation leads to improper validation of array index.
This vulnerability is uniquely identified as CVE-2024-38635. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.4. It has been classified as critical. This affects the function savagefb_probe of the component fbdev. The manipulation leads to divide by zero.
This vulnerability is uniquely identified as CVE-2024-39475. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.15.160/6.1.92/6.6.32/6.8.11/6.9.2 on SRQ and classified as critical. Affected by this vulnerability is the function xa_store_irq of the component RDMA. The manipulation leads to deadlock.
This vulnerability is known as CVE-2024-38591. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.9.2. This issue affects the function netpoll_send_skb_on_dev of the component sungem. The manipulation leads to deadlock.
The identification of this vulnerability is CVE-2024-38597. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.218/5.15.160/6.1.92/6.6.32/6.9.3. It has been rated as problematic. Affected by this issue is the function reserve_compress_blocks/release_compress_blocks of the component f2fs. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-34027. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.161/6.1.95/6.6.35/6.9.6. Affected is the function list_for_each_entry_safe of the component dmaengine. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-40956. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.160/6.1.92/6.6.32/6.9.3. This affects an unknown part of the component ntfs3. The manipulation leads to wrap-around error.
This vulnerability is uniquely identified as CVE-2024-38624. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Pocketmags Superbike Magazine. Affected by this issue is some unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is handled as CVE-2014-7093. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as critical was found in Ubooly 4.3.0. Affected by this vulnerability is an unknown functionality of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability is known as CVE-2014-7092. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.9.3. It has been rated as problematic. Affected by this issue is the function uart_handle_cts_change of the file drivers/tty/serial/serial_core.c. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-38634. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.3. It has been rated as critical. This issue affects the function __irq_move_irq of the component cpuhotplug. The manipulation leads to allocation of resources.
The identification of this vulnerability is CVE-2024-31076. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.