A vulnerability was found in OISF Suricata up to 7.0.7. It has been declared as problematic. Affected by this issue is some unknown functionality of the component BPF Filter File Handler. Such manipulation leads to integer overflow to buffer overflow.
This vulnerability is traded as CVE-2024-55626. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in xmlsoft libxml2 up to 2.12.9/2.13.5. It has been rated as critical. The impacted element is the function xmlSchemaIDCFillNodeTables of the file /xmlschemas.c. This manipulation causes use after free.
The identification of this vulnerability is CVE-2024-56171. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability has been found in Pallets Jinja up to 3.1.4 and classified as critical. This affects the function str.format. The manipulation leads to improper neutralization of special elements used in a template engine.
This vulnerability is uniquely identified as CVE-2024-56326. Local access is required to approach this attack. No exploit exists.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.4. This affects the function ieee80211_purge_tx_queue of the file net/mac80211/main.c. Such manipulation leads to privilege escalation.
This vulnerability is documented as CVE-2024-56609. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in MongoDB libbson 1.7.0 and classified as critical. Impacted is the function bson_utf8_validate of the file bson-iter.c. The manipulation of the argument length as part of Argument results in memory corruption.
This vulnerability is known as CVE-2017-14227. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Apport up to 2.20.7. This affects an unknown function. Such manipulation leads to resource consumption.
This vulnerability is documented as CVE-2017-14180. The attack needs to be performed locally. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in libbson 1.12.0. It has been declared as critical. This vulnerability affects the function _bson_iter_next_internal of the file bson-iter.c. Executing manipulation can lead to memory corruption.
This vulnerability appears as CVE-2018-16790. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability labeled as problematic has been found in Apport. Affected by this issue is some unknown functionality of the component Crash Dump Handler. Such manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2019-11483. The attack can only be performed from a local environment. No exploit is available.
A vulnerability classified as problematic was found in Apport on Ubuntu. This affects the function get_pid_info of the file /proc/pid. Executing manipulation can lead to execution with unnecessary privileges.
This vulnerability is registered as CVE-2019-15790. The attack needs to be launched locally. Furthermore, an exploit is available.
Upgrading the affected component is advised.
A vulnerability classified as problematic was found in Apport. This affects an unknown part. The manipulation results in time-of-check time-of-use.
This vulnerability was named CVE-2020-15702. The attack needs to be approached locally. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability has been found in LuaJIT up to 2.1.0-beta3 and classified as problematic. Affected is the function __gc. The manipulation leads to out-of-bounds read.
This vulnerability is documented as CVE-2020-15890. The attack can be initiated remotely. There is not any exploit available.
A vulnerability marked as critical has been reported in LuaJIT up to 2.1.0-beta3. Impacted is the function lj_err_run of the file lj_err.c. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2020-24372. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Das U-Boot up to 2019.07. The affected element is the function nfs_lookup_reply. Executing manipulation can lead to memory corruption.
This vulnerability is registered as CVE-2019-14196. It is possible to launch the attack remotely. No exploit is available.
A vulnerability has been found in OpenZFS up to 2.0.3 and classified as critical. This impacts an unknown function of the component NFS Share Handler. Performing manipulation results in improper access controls.
This vulnerability was named CVE-2013-20001. The attack needs to be approached within the local network. There is no available exploit.
A vulnerability, which was classified as problematic, has been found in Apport up to 2.17.0. This issue affects some unknown processing of the file usr/share/apport/apport of the component Crash Reporter. This manipulation causes improper access controls.
This vulnerability appears as CVE-2015-1318. The attack requires local access. In addition, an exploit is available.
It is advisable to upgrade the affected component.