A vulnerability was found in Power Daemon up to 2.0.2. It has been declared as critical. This vulnerability affects unknown code of the file powerd.c. The manipulation of the argument WHATIDO leads to memory corruption.
This vulnerability was named CVE-2006-0681. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Oniguruma up to 6.9.3. Affected is the function str_lower_case_match of the file regexec.c. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2019-19246. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in ezXML 0.8.3/0.8.4/0.8.5/0.8.6. Affected is an unknown function. The manipulation leads to xml injection.
This vulnerability is traded as CVE-2019-20201. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical has been found in Squid Web Proxy up to 3.x/4.8. Affected is an unknown function of the component URI Scheme Handler. The manipulation leads to improper input validation.
This vulnerability is traded as CVE-2019-18676. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Linux Kernel 4.19.83. Affected by this vulnerability is the function debugfs_remov of the file fs/debugfs/inode.c. The manipulation leads to use after free.
This vulnerability is known as CVE-2019-19770. The attack can be launched remotely. There is no exploit available.
The real existence of this vulnerability is still doubted at the moment.
A vulnerability has been found in GPAC 0.8.0/0.9.0-development-20191109 and classified as critical. This vulnerability affects the function ReadGF_IPMPX_WatermarkingInit of the file odf/ipmpx_code.c. The manipulation leads to out-of-bounds write.
This vulnerability was named CVE-2019-20161. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in Linux Kernel up to 5.3.4 and classified as problematic. Affected by this issue is the function ql_alloc_large_buffers of the file drivers/net/ethernet/qlogic/qla3xxx.c. The manipulation leads to resource consumption.
This vulnerability is handled as CVE-2019-18806. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.3.11. This affects the function alloc_sgtable of the file drivers/net/wireless/intel/iwlwifi/fw/dbg.c. The manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2019-19058. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 5.3.11. It has been rated as problematic. Affected by this issue is the function rtl_usb_probe of the file drivers/net/wireless/realtek/rtlwifi/usb.c. The manipulation leads to resource consumption.
This vulnerability is handled as CVE-2019-19063. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in iproute2 up to 5.0.x and classified as critical. Affected by this vulnerability is the function get_netnsid_from_name of the file ip/ipnetns.c. The manipulation leads to use after free.
This vulnerability is known as CVE-2019-20795. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.