A vulnerability identified as critical has been detected in Linux Kernel up to 6.2.2. This vulnerability affects the function __flush_work of the file kernel/workqueue.c of the component cifs. Performing manipulation results in use after free.
This vulnerability is identified as CVE-2023-53427. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.15.85/6.0.15/6.1.1. The affected element is the function wpcm450_aic_of_init. This manipulation causes memory leak.
This vulnerability appears as CVE-2022-50416. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic has been found in Tor up to 0.4.7.16/0.4.8.17. Impacted is an unknown function of the component Onion Service Descriptor Handler. Performing manipulation results in resource consumption.
This vulnerability was named CVE-2025-4444. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.1. Affected by this issue is the function svc_xprt_put of the component nfsd. Performing manipulation results in use after free.
This vulnerability is reported as CVE-2022-50401. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.3. Affected by this issue is the function ext4_check_flag_values in the library fs/ext4/ext4.h. Such manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2022-50403. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 5.10.179/5.15.110/6.1.27/6.2.14/6.3.1. It has been classified as critical. Affected is the function fw_info of the component wifi. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2023-53422. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.1. Affected by this vulnerability is the function md_bitmap_get_counter. This manipulation causes null pointer dereference.
This vulnerability is tracked as CVE-2022-50402. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 5.10.233/5.15.74/5.19.16/6.0.2. Impacted is the function cec_unregister_adapter. Executing manipulation can lead to Local Privilege Escalation.
The identification of this vulnerability is CVE-2022-50412. The physical device can be targeted for the attack. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.0.15/6.1.1. It has been classified as critical. This vulnerability affects the function TTM_TT_FLAG_PRIV_POPULATED of the component ttm. The manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2022-50390. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 5.15.98/6.1.15/6.2.2. It has been rated as critical. Affected by this vulnerability is the function debugfs_lookup. The manipulation leads to memory leak.
This vulnerability is listed as CVE-2023-53414. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability identified as very critical has been detected in Microsoft Windows. Affected is an unknown function of the component Advanced Local Procedure Call. Performing manipulation results in use after free.
This vulnerability is identified as CVE-2023-21674. The attack can be initiated remotely. Additionally, an exploit exists.
Applying a patch is the recommended action to fix this issue.
A vulnerability classified as critical was found in Adobe FrameMaker up to 2020 Update 4/2022. This affects an unknown part. Executing manipulation can lead to out-of-bounds write.
This vulnerability is registered as CVE-2023-21622. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Adobe FrameMaker up to 2020 Update 4/2022. It has been classified as problematic. This issue affects some unknown processing. This manipulation causes out-of-bounds read.
This vulnerability is handled as CVE-2023-21620. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability described as critical has been identified in Adobe FrameMaker up to 2020 Update 4/2022. Affected by this vulnerability is an unknown functionality. Such manipulation leads to out-of-bounds write.
This vulnerability is listed as CVE-2023-21619. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Adobe FrameMaker up to 2020 Update 4/2022. Affected by this issue is some unknown functionality. Performing manipulation results in improper input validation.
This vulnerability is cataloged as CVE-2023-21621. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Adobe Experience Manager up to 6.5.15.0 and classified as problematic. This vulnerability affects unknown code. Performing manipulation results in cross site scripting.
This vulnerability is identified as CVE-2023-21616. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.