A vulnerability has been found in Adobe Audition up to 23.6.6/24.4.1 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2024-41868. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Perfex CRM 1.1.0. Affected is an unknown function of the component Discussion Section. The manipulation of the argument Content leads to cross site scripting.
This vulnerability is traded as CVE-2024-44851. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Comfast CF-XR11 2.7.2. This issue affects the function sub_424CB4 of the file /usr/bin/webmgnt of the component HTTP POST Request Handler. The manipulation of the argument iface leads to command injection.
The identification of this vulnerability is CVE-2024-44466. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Linux Kernel up to 5.10.224/5.15.165/6.1.106/6.6.47/6.10.6. This vulnerability affects unknown code of the component flowtable. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2024-45018. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.106/6.6.47/6.10.6. This affects the function __pm_runtime_resume of the file kernel/locking/mutex.c of the component tegra. The manipulation leads to Privilege Escalation.
This vulnerability is uniquely identified as CVE-2024-45029. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.6. It has been rated as critical. Affected by this issue is the function alloc_pages of the component mmc_test. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-45028. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.6. It has been declared as problematic. Affected by this vulnerability is the function xhci_mem_clearup of the component usb. The manipulation leads to allocation of resources.
This vulnerability is known as CVE-2024-45027. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.6. It has been classified as problematic. Affected is the function dasd_ese_needs_format of the component ESE Handler. The manipulation leads to Privilege Escalation.
This vulnerability is traded as CVE-2024-45026. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.6 and classified as critical. This issue affects the function close_range. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2024-45025. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.10.6 and classified as problematic. This vulnerability affects the function memcg_write_event_control. The manipulation leads to improper initialization.
This vulnerability was named CVE-2024-45021. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
The operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of SOHO routers and VPN appliances by leveraging a combination of both known and unknown security flaws.
Targets include devices from TP-LINK, Zyxel, Asus, Axentra, D-Link, and NETGEAR, according to a new report by French cybersecurity company Sekoia.
"The Quad7 botnet operators appear to be
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.47/6.10.6. This affects the function stacksafe of the component bpf. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2024-45020. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.106/6.6.47/6.10.6. Affected by this issue is the function mlx5e_safe_reopen_channels. The manipulation leads to deadlock.
This vulnerability is handled as CVE-2024-45019. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.6.47/6.10.6. Affected by this vulnerability is the function wpa_supplicant of the component cfg80211. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-46672. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.47/6.10.6. Affected is an unknown function of the component igb. The manipulation of the argument MAX_SKB_FRAGS leads to buffer overflow.
This vulnerability is traded as CVE-2024-45030. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.6. It has been rated as problematic. This issue affects the function read_balance. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2024-45023. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.106/6.6.47/6.10.6. It has been declared as critical. This vulnerability affects the function vm_area_alloc_pages. The manipulation leads to memory corruption.
This vulnerability was named CVE-2024-45022. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.6. It has been classified as problematic. This affects the function down_read of the file kernel/locking/rwsem.c of the component mlx5. The manipulation leads to state issue.
This vulnerability is uniquely identified as CVE-2024-45017. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.6 and classified as problematic. Affected by this issue is the function pte_offset_map_lock of the component hugetlb. The manipulation leads to state issue.
This vulnerability is handled as CVE-2024-45024. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.