A vulnerability, which was classified as very critical, was found in Oracle Communications Application Session Controller up to 3.7.0. This affects an unknown part of the component Glibc. The manipulation leads to memory corruption (Ghost).
This vulnerability is uniquely identified as CVE-2015-0235. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
Hackers are attempting to exploit two zero-day vulnerabilities in PTZOptics pan-tilt-zoom (PTZ) live streaming cameras used in industrial, healthcare, business conferences, government, and courtroom settings. [...]
A vulnerability classified as problematic was found in Linux Kernel 3.x/4.x. Affected by this vulnerability is an unknown functionality of the component aufs Module. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2016-2854. Attacking locally is a requirement. Furthermore, there is an exploit available.
Microsoft announced today that Windows 10 home users can delay the switch to Windows 11 for one more year if they're willing to pay $30 for Extended Security Updates (ESU). [...]
A vulnerability was found in Google Android 11/12/12L/13/14 and classified as problematic. This issue affects the function backupAgentCreated of the file ActivityManagerService.java. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2023-40105. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.