A vulnerability was found in Pygments up to 2.7.3. It has been declared as problematic. This vulnerability affects unknown code of the component SMLLexer. The manipulation of the argument exception leads to infinite loop.
This vulnerability was named CVE-2021-20270. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in HDF5 up to 1.14.3. This affects the function H5VM_memcpyvv of the file H5VM.c. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2024-32614. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.85/6.6.26/6.8.5. This vulnerability affects unknown code. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-36023. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.6.32/6.9.3. Affected by this vulnerability is an unknown functionality of the file kernel/locking/mutex.c of the component zynqmp_dpsub. The manipulation leads to improper initialization.
This vulnerability is known as CVE-2024-38664. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in nodejs Undici up to 5.28.3/6.0.0/6.11.0 and classified as problematic. Affected by this issue is the function fetch. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2024-30261. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in distribution. It has been declared as problematic. This vulnerability affects unknown code of the file /v2/_catalog of the component API Request Handler. The manipulation leads to resource consumption.
This vulnerability was named CVE-2023-2253. The attack needs to be approached within the local network. There is no exploit available.