A vulnerability was found in Kerio Personal Firewall up to 4.1.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to infinite loop.
This vulnerability is known as CVE-2004-1109. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Linux Kernel up to 6.13.1. This vulnerability affects the function th1520_mbox_suspend_noirq of the component mailbox. The manipulation leads to memory corruption.
This vulnerability was named CVE-2024-57983. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. Affected by this vulnerability is the function process_responses. The manipulation of the argument tot_len leads to integer overflow.
This vulnerability is known as CVE-2024-57973. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. It has been declared as critical. Affected by this vulnerability is the function sys_exit in the library lib/kobject.c. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-57979. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.12.12/6.13.1. Affected is the function tps6594_rtc_set_offset. The manipulation of the argument tmp leads to integer overflow.
This vulnerability is traded as CVE-2024-57953. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.15/6.13.3. It has been rated as problematic. Affected by this issue is the function msm_ioctl_gem_submit of the component gem. The manipulation leads to integer overflow.
This vulnerability is handled as CVE-2024-52559. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3 and classified as critical. This vulnerability affects the function bsg_queue of the component scsi. The manipulation leads to use after free.
This vulnerability was named CVE-2024-54458. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.13.3. Affected by this issue is the function mi_enum_attr of the component ntfs3. The manipulation leads to privilege escalation.
This vulnerability is handled as CVE-2024-52560. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.50/5.18.7. This affects the function psock_update_sk_prot of the component sock. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2022-49732. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.10/6.12.1. It has been declared as problematic. This vulnerability affects the function uof_get_name of the component qat_420xx. The manipulation of the argument fw_objs[] leads to off-by-one.
This vulnerability was named CVE-2024-53163. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.12.1. This affects the function mem_ctrl_idx of the component bluefield. The manipulation leads to integer overflow.
This vulnerability is uniquely identified as CVE-2024-53161. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.