A vulnerability described as critical has been identified in Linux Kernel up to 5.15.90/6.1.8. Affected is the function safety_feat_cfg. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2023-53011. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 6.1.8. This issue affects some unknown processing of the component amdkfd. Such manipulation leads to improper initialization.
This vulnerability is listed as CVE-2023-53009. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.8 and classified as critical. This affects the function snprintf. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2023-53010. The attack can only be initiated within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 4.19.271/5.4.230/5.10.165/5.15.90/6.1.8. It has been declared as critical. This affects an unknown part of the file trace_events_hist.c. The manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2023-53005. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.8. This affects the function trace_printk. The manipulation results in denial of service.
This vulnerability is reported as CVE-2023-53007. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 4.19.271/5.4.230/5.10.165/5.15.90/6.1.8. Affected by this issue is the function smbd_destroy. Executing manipulation can lead to use after free.
This vulnerability is handled as CVE-2023-53006. The attack can only be done within the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.8. It has been rated as critical. This vulnerability affects the function cifs_ses::auth_key.response. This manipulation causes memory leak.
This vulnerability is tracked as CVE-2023-53008. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.4.230/5.10.165/5.15.90/6.1.8. Affected by this vulnerability is the function llcc_driv_data of the component LLCC Driver. Performing manipulation results in use after free.
This vulnerability is known as CVE-2023-53003. Access to the local network is required for this attack. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.8. It has been rated as problematic. This impacts an unknown function of the component ovl. The manipulation leads to memory leak.
This vulnerability is referenced as CVE-2023-53004. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.1.8. The impacted element is the function drm_vma_node_allow. The manipulation leads to memory leak.
This vulnerability is documented as CVE-2023-53002. The attack requires being on the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Formidable PRO2PDF Plugin up to 3.10 on WordPress. It has been rated as critical. This affects the function fpropdf_export_file. The manipulation of the argument fieldmap leads to sql injection.
This vulnerability is listed as CVE-2023-28663. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Waiting One-click Countdowns Plugin up to 0.6.2 on WordPress. Affected by this issue is the function pbc_save_downs. The manipulation of the argument pbc_down[meta][id] results in sql injection.
This vulnerability is known as CVE-2023-28659. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Events Made Easy Plugin up to 2.3.14 on WordPress. It has been classified as critical. Affected by this vulnerability is the function eme_recurrences_list. Performing manipulation of the argument search_name results in sql injection.
This vulnerability is identified as CVE-2023-28660. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in WP Popup Banners Plugin up to 1.2.5 on WordPress. It has been declared as critical. Affected by this issue is the function get_popup_data. Executing manipulation of the argument Value can lead to sql injection.
This vulnerability is tracked as CVE-2023-28661. The attack can be launched remotely. No exploit exists.
A vulnerability categorized as critical has been discovered in CONPROSYS HMI System up to 3.5.2. Affected by this vulnerability is an unknown functionality. The manipulation results in improper access controls.
This vulnerability is identified as CVE-2023-28657. The attack is only possible with local access. There is not any exploit available.
It is advisable to upgrade the affected component.