A vulnerability, which was classified as critical, was found in Open-Source Technology Committee SRS Real-Time Video Server. This affects an unknown part of the component Request Handler. The manipulation leads to server-side request forgery.
This vulnerability is uniquely identified as CVE-2024-33250. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.7.8. It has been classified as problematic. Affected is the function bq27xxx_battery_i2c_probe of the file kernel/irq/manage.c of the component power. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-27412. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.12/6.1.82/6.6.22/6.7.10/6.8.1. This affects an unknown part of the component nvme. The manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2024-27435. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.147/6.1.74/6.6.13/6.7.1. Affected is the function clamp of the component scarlett2. The manipulation leads to Privilege Escalation.
This vulnerability is traded as CVE-2023-52674. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.7.1 and classified as critical. This vulnerability affects unknown code of the component qseecom. The manipulation leads to memory leak.
This vulnerability was named CVE-2023-52684. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.74/6.6.13/6.7.1. This vulnerability affects the function dma_map_sg of the component safexcel. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2023-52687. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.8.5 and classified as critical. This vulnerability affects the function sb_bread of the component sysv. The manipulation leads to deadlock.
This vulnerability was named CVE-2023-52699. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.13.5. This issue affects the function caif_seqpkt_sendmsg in the library lib/dump_stack.c. The manipulation leads to uninitialized resource.
The identification of this vulnerability is CVE-2021-47297. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 4.14.237/4.19.195/5.4.127/5.10.45/5.12.12. Affected by this issue is the function mcba_usb_start. The manipulation leads to memory leak.
This vulnerability is handled as CVE-2021-47231. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.8.4. Affected by this issue is the function ip6erspan_rcv in the library include/linux/skbuff.h of the component erspan. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-35888. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.8.8 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file drivers/net/ethernet/mellanox/mlxsw/core_acl_flex_keys.c of the component spectrum_acl_tcam. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-36007. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.