A vulnerability classified as critical has been found in Linux Kernel up to 4.17.4. This affects the function inode_init_owner of the file fs/inode.c. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2018-13405. Attacking locally is a requirement. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in OctoBot up to 0.4.3. It has been declared as critical. This vulnerability affects unknown code of the component WebInterface. The manipulation leads to unrestricted upload.
This vulnerability was named CVE-2021-36711. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in GitLab Community Edition and Enterprise Edition up to 17.4.4/17.5.2/17.6.0 and classified as problematic. This vulnerability affects unknown code of the component API Endpoint. The manipulation leads to incorrect authorization.
This vulnerability was named CVE-2024-11669. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in GitLab Community Edition and Enterprise Edition up to 17.4.4/17.5.2/17.6.0 and classified as problematic. This issue affects some unknown processing of the component API Call Handler. The manipulation leads to inefficient algorithmic complexity.
The identification of this vulnerability is CVE-2024-11828. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in GitLab Community Edition and Enterprise Edition up to 17.4.4/17.5.2/17.6.0. This vulnerability affects unknown code of the component Personal Access Token Handler. The manipulation leads to missing authorization.
This vulnerability was named CVE-2024-8114. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in GitLab Community Edition and Enterprise Edition up to 17.4.4/17.5.2/17.6.0. Affected is an unknown function of the component cargo.toml File Handler. The manipulation leads to inefficient algorithmic complexity.
This vulnerability is traded as CVE-2024-8237. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in KDE 1.1/1.1.1/1.1.2. It has been rated as critical. Affected by this issue is some unknown functionality of the component kdesud. The manipulation of the argument DISPLAY as part of Environment Variable leads to memory corruption.
This vulnerability is handled as CVE-2000-0460. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in GitLab Community Edition and Enterprise Edition up to 17.4.4/17.5.2/17.6.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Streaming Result Handler. The manipulation leads to session expiration.
This vulnerability is handled as CVE-2024-11668. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in GitLab Community Edition and Enterprise Edition up to 17.4.4/17.5.2/17.6.0. This issue affects some unknown processing of the component Harbor Registry Handler. The manipulation leads to inefficient algorithmic complexity.
The identification of this vulnerability is CVE-2024-8177. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.