A vulnerability was found in LabRedesCefetRJ WeGIA up to 3.2.7. It has been declared as problematic. This issue affects some unknown processing of the file CobrancaController.php. The manipulation of the argument local_recepcao results in cross site scripting.
This vulnerability was named CVE-2025-22597. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in LabRedesCefetRJ WeGIA up to 3.2.7. It has been rated as problematic. Impacted is an unknown function of the file cadastrarSocio.php. This manipulation of the argument local_recepcao causes cross site scripting.
The identification of this vulnerability is CVE-2025-22598. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in containerd up to 1.6.37/1.7.26/2.0.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument UID:GID results in integer overflow.
This vulnerability is known as CVE-2024-40635. Attacking locally is a requirement. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.63/6.11.10/6.12.1 and classified as problematic. This impacts the function schedule_delayed_monitor_work of the component kvfree. This manipulation causes information disclosure.
This vulnerability appears as CVE-2024-53160. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.11.9 and classified as critical. This impacts the function dc_state_copy_internal of the component AMD Display. The manipulation results in allocation of resources.
This vulnerability was named CVE-2024-53133. The attack needs to be approached within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.10/6.11.9. The impacted element is an unknown function. Performing manipulation results in privilege escalation.
This vulnerability is reported as CVE-2024-53137. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.119/6.6.63/6.11.10/6.12.1. Impacted is the function applnco_probe. Performing manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2024-53154. The attack must originate from the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 6.12.1. This vulnerability affects the function ocfs2_file_read_iter. The manipulation results in uninitialized pointer.
This vulnerability was named CVE-2024-53155. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.12.1. This issue affects some unknown processing of the component arm_scpi. This manipulation causes null pointer dereference.
The identification of this vulnerability is CVE-2024-53157. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.12.1. This impacts the function htc_connect_service of the file drivers/net/wireless/ath/ath9k/htc_hst.c of the component ath9k. The manipulation results in improper validation of array index.
This vulnerability is cataloged as CVE-2024-53156. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.12.1. Affected is the function geni_se_clk_tbl_get of the component geni-se. This manipulation of the argument clk_perf_tbl[] causes excessive iteration.
This vulnerability is registered as CVE-2024-53158. The attack requires access to the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.6.62/6.11.9. Impacted is the function onecell_data.num_domains of the component pmdomain. This manipulation causes denial of service.
This vulnerability is registered as CVE-2024-53134. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.11.9 and classified as problematic. This affects an unknown function. The manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2024-53132. The attack can only be initiated within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.6.62/6.11.9. It has been classified as critical. Affected is the function psnet_open_pf_bar of the component solidrun. This manipulation causes use after free.
The identification of this vulnerability is CVE-2024-53126. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.118/6.6.62/6.11.9. This impacts the function sk_wait_data of the component MPTCP Protocol. This manipulation causes divide by zero.
This vulnerability is tracked as CVE-2024-53123. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.11.9. Affected by this vulnerability is the function free_pages_prepare of the file include/linux/page_owner.h. Performing manipulation results in improper update of reference count.
This vulnerability is cataloged as CVE-2024-53105. The attack must originate from the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.0. This affects an unknown part of the component hv_sock. This manipulation causes improper initialization.
The identification of this vulnerability is CVE-2024-53103. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.11. Impacted is the function mmap_region. The manipulation leads to incorrect control flow.
This vulnerability is traded as CVE-2024-53096. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.6. It has been classified as problematic. Affected by this vulnerability is an unknown functionality of the component iwlwifi. This manipulation causes information disclosure.
This vulnerability is handled as CVE-2024-53074. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is recommended.