A vulnerability identified as critical has been detected in Linux Kernel up to 5.15.74/6.0.3. This affects the function io_wqe. This manipulation causes memory leak.
This vulnerability appears as CVE-2022-50639. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.3. This affects the function pci_device_is_present. Performing a manipulation results in denial of service.
This vulnerability is identified as CVE-2022-50636. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.10.162/5.15.85/6.0.15/6.1.1. This impacts the function qcom_cpufreq_hw_read_lut of the component cpufreq. Executing a manipulation can lead to memory leak.
This vulnerability is tracked as CVE-2022-50637. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.3. Affected is the function swap_inode_boot_loader of the file fs/ext4/extents_status.c of the component ext4. Executing a manipulation can lead to improper initialization.
The identification of this vulnerability is CVE-2022-50638. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.0.15/6.1.1. It has been rated as critical. The affected element is the function cw_bat_probe. The manipulation of the argument ret leads to null pointer dereference.
This vulnerability is documented as CVE-2022-50634. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 5.15.74/5.19.16/6.0.2. The impacted element is the function arch_prepare_kprobe. The manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2022-50635. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.0.15/6.1.1 and classified as critical. Affected is the function tad_pmu_init of the component marvell_cn10k. The manipulation leads to state issue.
This vulnerability is listed as CVE-2022-50632. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 5.10.162/5.15.86/6.0.16/6.1.1. This issue affects the function of_icc_get of the component usb. Executing a manipulation can lead to memory leak.
This vulnerability appears as CVE-2022-50633. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.0.17/6.1.3. It has been classified as critical. Affected by this issue is the function elf_kexec_load of the component RISC-V. This manipulation causes memory leak.
This vulnerability is registered as CVE-2022-50631. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in etcd-io etcd up to 3.4.41/3.5.27/3.6.8. The impacted element is an unknown function of the component gRPC API. Performing a manipulation results in missing authorization.
This vulnerability was named CVE-2026-33413. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in etcd-io etcd up to 3.4.41/3.5.27/3.6.8. It has been rated as critical. This affects an unknown part. Performing a manipulation results in incorrect authorization.
This vulnerability is cataloged as CVE-2026-33343. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical was found in vim up to 8.1. This affects an unknown part. The manipulation results in use after free.
This vulnerability is known as CVE-2022-0443. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel and classified as critical. This impacts the function cgroup_release_agent_write of the file kernel/cgroup/cgroup-v1.c of the component cgroups Subsystem. Executing a manipulation can lead to improper authentication.
This vulnerability is registered as CVE-2022-0492. The attack requires access to the local network. No exploit is available.
A patch should be applied to remediate this issue.
A vulnerability identified as critical has been detected in vim up to 8.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to use after free.
This vulnerability is referenced as CVE-2022-0413. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in vim up to 8.1. This affects an unknown part. The manipulation leads to heap-based buffer overflow.
This vulnerability is referenced as CVE-2022-0417. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Five Star Restaurant Reservations Plugin up to 2.4.11 on WordPress. This affects an unknown part. The manipulation results in missing authorization.
This vulnerability is reported as CVE-2022-0421. The attacker must have access to the local network to execute the attack. No exploit exists.
You should upgrade the affected component.
A vulnerability, which was classified as critical, was found in nektos act. This affects the function set-env/add-path. Executing a manipulation can lead to injection.
This vulnerability is handled as CVE-2026-34041. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in pyca cryptography 41.0.2/41.0.6/42.0.4/46.0.5. The impacted element is an unknown function of the component DNS Name Handler. Performing a manipulation results in an unknown weakness.
This vulnerability is known as CVE-2026-34073. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.