A vulnerability labeled as critical has been found in Squid Web Proxy up to 4.8. This impacts an unknown function of the file cachemgr.cgi. Such manipulation of the argument Hostname as part of Parameter leads to injection.
This vulnerability is uniquely identified as CVE-2019-18860. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in PJSIP up to 2.11.1. The impacted element is an unknown function of the component Dialog Set Handler. Performing manipulation results in use after free.
This vulnerability is cataloged as CVE-2022-23608. It is possible to initiate the attack remotely. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability marked as critical has been reported in BlueZ. Affected by this issue is some unknown functionality of the component bluetoothd. This manipulation causes incorrect authorization.
This vulnerability is tracked as CVE-2021-3658. It is feasible to perform the attack on the physical device. No exploit exists.
To fix this issue, it is recommended to deploy a patch.
A vulnerability marked as critical has been reported in FRRouting up to 8.1.0. This affects an unknown part of the file isisd/isis_tlvs.c of the component Packet Length Handler. Performing manipulation results in memory corruption.
This vulnerability was named CVE-2022-26125. The attack needs to be approached within the local network. There is no available exploit.
A vulnerability described as critical has been identified in FRRouting up to 8.1.0. This vulnerability affects the function strdup of the file isis_nb_notifications.c. Executing manipulation can lead to memory corruption.
The identification of this vulnerability is CVE-2022-26126. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as critical has been found in FRRouting up to 8.1.0. This issue affects the function babel_packet_examin of the file babeld/message.c of the component Packet Length Handler. The manipulation leads to memory corruption.
This vulnerability is referenced as CVE-2022-26127. The attack needs to be initiated within the local network. No exploit is available.
A vulnerability classified as critical was found in FRRouting up to 8.1.0. Impacted is the function babel_packet_examin of the file babeld/message.c of the component Packet Length Handler. The manipulation results in memory corruption.
This vulnerability is identified as CVE-2022-26128. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability, which was classified as critical, has been found in FRRouting up to 8.1.0. The affected element is the function parse_hello_subtlv/parse_ihu_subtlv/parse_update_subtlv of the file babeld/message.c. This manipulation of the argument subtlv causes memory corruption.
This vulnerability is tracked as CVE-2022-26129. The attack is only possible within the local network. No exploit exists.
A vulnerability classified as critical has been found in BlueZ up to 5.62. This affects an unknown function of the component Files Handler. Performing manipulation results in heap-based buffer overflow.
This vulnerability is reported as CVE-2022-0204. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in PJSIP up to 2.12. Impacted is an unknown function of the component Hashed Digest Credential Handler. Performing manipulation results in buffer overflow.
This vulnerability was named CVE-2022-24754. The attack may be initiated remotely. There is no available exploit.
It is suggested to install a patch to address this issue.
A vulnerability has been found in PJSIP up to 2.12 and classified as critical. This impacts the function pjmedia_sdp_print/pjmedia_sdp_media_print of the component PJSUA2. The manipulation leads to stack-based buffer overflow.
This vulnerability is documented as CVE-2022-24764. The attack can be initiated remotely. There is not any exploit available.
To fix this issue, it is recommended to deploy a patch.