A vulnerability classified as problematic was found in swtpm up to 0.5.2/0.6.1/0.7.0. The impacted element is an unknown function. Such manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2022-23645. The attack must be carried out locally. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability labeled as problematic has been found in nbdkit. This affects an unknown function of the component STARTTLS Encryption Handler. Executing a manipulation can lead to improper enforcement of message integrity.
This vulnerability is tracked as CVE-2021-3716. The attack is only possible within the local network. No exploit exists.
It is advisable to implement a patch to correct this issue.
A vulnerability described as critical has been identified in TCG TPM2.0 Module Library. Affected is the function CryptParameterDecryption. Executing a manipulation can lead to out-of-bounds write.
This vulnerability appears as CVE-2023-1017. The attacker needs to be present on the local network. There is no available exploit.
A vulnerability was found in Tuxera ntfs-3g. It has been declared as critical. This affects the function ntfs_attr_record_resize of the component NTFS Image Handler. Executing a manipulation can lead to integer overflow.
This vulnerability is handled as CVE-2021-39254. The physical device can be targeted for the attack. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Tuxera ntfs-3g. It has been classified as problematic. The impacted element is the function ntfs_runlists_merge_i of the component NTFS Image Handler. Performing a manipulation results in out-of-bounds read.
This vulnerability is known as CVE-2021-39253. The attack may be carried out on the physical device. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in Tuxera ntfs-3g up to 2021.8.21 and classified as problematic. The affected element is the function ntfs_ie_lookup of the component NTFS Image Handler. Such manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2021-39252. The attack can be executed directly on the physical device. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Tuxera ntfs-3g and classified as problematic. Impacted is the function ntfs_extent_inode_open of the component NTFS Image Handler. This manipulation causes null pointer dereference.
This vulnerability appears as CVE-2021-39251. It is feasible to perform the attack on the physical device. There is no available exploit.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Tuxera ntfs-3g. This issue affects the function ntfs_attr_setup_flag of the component NTFS Attribute Handler. Such manipulation leads to heap-based buffer overflow.
This vulnerability is referenced as CVE-2021-35269. The attack can be executed directly on the physical device. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Tuxera ntfs-3g. It has been rated as critical. This vulnerability affects the function ntfs_inode_real_open of the component Inode Loader. This manipulation causes heap-based buffer overflow.
The identification of this vulnerability is CVE-2021-35268. It is feasible to perform the attack on the physical device. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Tuxera ntfs-3g. Affected by this issue is some unknown functionality. The manipulation results in stack-based buffer overflow.
This vulnerability is identified as CVE-2021-35267. An attack on the physical device is feasible. There is not any exploit available.
It is advisable to upgrade the affected component.
Fake Xeno and Roblox gaming tools are spreading a Windows RAT (remote access trojan) using PowerShell and LOLBins, Microsoft Threat Intelligence warns.
A vulnerability was found in Linux Kernel up to 6.2.2. It has been rated as critical. This affects the function mt76x0_phy_get_target_power of the component wifi. The manipulation leads to out-of-bounds read.
This vulnerability is documented as CVE-2022-50508. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Linux Kernel up to 6.3.1. This issue affects the function rpi_firmware_get. This manipulation causes improper update of reference count.
This vulnerability is tracked as CVE-2023-53533. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.172/5.15.98/6.1.15/6.2.2 and classified as critical. Affected by this issue is the function mtk_drm_crtc of the component mediatek. Such manipulation leads to unchecked return value.
This vulnerability is documented as CVE-2023-53534. The attack requires being on the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.2.2. It has been classified as critical. This affects the function skb_over_panic of the component net. Performing a manipulation results in allocation of resources.
This vulnerability is reported as CVE-2023-53535. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.1.1 and classified as critical. This affects the function ppr_notifier. Executing a manipulation can lead to improper update of reference count.
This vulnerability is tracked as CVE-2022-50505. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.0.5. It has been classified as critical. Affected by this vulnerability is the function bi_bdev of the component drbd. Performing a manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2022-50506. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 5.15.86/6.0.16/6.1.2. It has been declared as critical. Affected by this issue is the function run_unpack of the component ntfs3. Executing a manipulation can lead to use after free.
This vulnerability is registered as CVE-2022-50507. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.2 and classified as critical. The affected element is the function rtas_os_term of the component powerpc. The manipulation leads to denial of service.
This vulnerability is listed as CVE-2022-50504. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.