A vulnerability classified as problematic was found in Geovision GV-ASManager. This vulnerability affects unknown code. The manipulation leads to missing authorization.
This vulnerability was named CVE-2024-12553. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Wacom Center. This issue affects some unknown processing. The manipulation leads to link following.
The identification of this vulnerability is CVE-2024-12552. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Sun JavaMail 1.1.3/1.2/1.3.2. It has been classified as problematic. Affected is an unknown function of the component Apache Tomcat. The manipulation of the argument Download leads to information disclosure.
This vulnerability is traded as CVE-2005-1754. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The real existence of this vulnerability is still doubted at the moment.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.75/6.6.14/6.7.2. Affected is the function regmap_raw_read of the component sc16is7xx. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2023-52488. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.12.6 and classified as critical. This issue affects some unknown processing of the component RDMA. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2021-47076. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.27/6.8.6. It has been classified as problematic. This affects the function panfrost_mmu_map_fault_addr of the component panfrost. The manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2024-35951. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.31/6.8.10/6.9.1 and classified as critical. This issue affects the function l2cap_le_flowctl_init of the component Bluetooth. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2024-36968. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in File up to 5.42. Affected is the function file_copystr of the file funcs.c. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2022-48554. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in wolfSSL up to 5.6.4. This affects an unknown part of the component Elliptic Curve Handler. The manipulation leads to information exposure through discrepancy.
This vulnerability is uniquely identified as CVE-2024-1544. Local access is required to approach this attack. There is no exploit available.
A vulnerability was found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5. It has been declared as problematic. This vulnerability affects the function be_xmit of the component be2net. The manipulation leads to memory leak.
This vulnerability was named CVE-2024-50167. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5 and classified as critical. This issue affects the function strlen of the component Null Character Handler. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2024-50131. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.