A vulnerability was found in Open Robotics ROS2 and classified as critical. This issue affects the function executor_thread_. The manipulation leads to permission issues.
The identification of this vulnerability is CVE-2024-41649. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Open Robotics ROS2. It has been classified as critical. Affected is the function nav2_costmap_2d. The manipulation leads to permission issues.
This vulnerability is traded as CVE-2024-41650. The attack can only be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in Open Robotics ROS2. This affects the function smoothPlan. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-44854. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Open Robotics ROS2 and classified as problematic. Affected by this issue is the function computeControl. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-44853. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Open Robotics ROS2. It has been classified as problematic. This affects the function nav2_navfn_planner. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-44855. The attack needs to be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Open Robotics ROS2. It has been declared as problematic. This vulnerability affects the function nav2_smac_planner. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-44856. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Adobe Experience Manager up to 6.5.21 and classified as problematic. Affected by this issue is some unknown functionality of the component URL Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-52860. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.226/5.15.167/6.1.112/6.6.56/6.11.3 and classified as problematic. Affected by this issue is some unknown functionality of the component unicode. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-50089. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1. Affected by this vulnerability is the function ib_cache_setup_one. The manipulation leads to incomplete cleanup.
This vulnerability is known as CVE-2024-47693. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 5.15.167/6.1.112/6.6.54/6.10.13/6.11.2. Affected by this vulnerability is the function timer_check of the component ioapic. The manipulation leads to denial of service.
This vulnerability is known as CVE-2024-49927. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.2. It has been classified as critical. This affects the function ext4_ext_replay_update_ex. The manipulation leads to double free.
This vulnerability is uniquely identified as CVE-2024-49983. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.10.226/5.15.167/6.1.112/6.6.56/6.11.3. Affected is the function mad_agent_priv of the component RDMA. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2024-50095. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.11.2. This issue affects some unknown processing of the component ceph. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2024-50179. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.11.2. Affected by this vulnerability is the function nf_dup_ipv4 of the component nf_tables. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-49952. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in RabbitMQ up to 3.11.23/3.12.6 and classified as problematic. Affected by this issue is some unknown functionality of the component HTTP API. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2023-46118. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.10.226/5.15.167/6.1.112/6.6.56/6.11.3. This affects an unknown part of the component sisfb. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-50180. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.15.168/6.1.112/6.6.56/6.11.3 and classified as critical. This vulnerability affects the function memfd_secret of the component secretmem. The manipulation leads to memory corruption.
This vulnerability was named CVE-2024-50182. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in GNU Binutils 2.38.50. It has been classified as problematic. Affected is the function display_debug_names of the component readelf. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2022-35205. The attack needs to be done within the local network. There is no exploit available.