A vulnerability was found in ESET Protect and classified as problematic. The affected element is an unknown function. The manipulation results in observable response discrepancy.
This vulnerability is reported as CVE-2025-3716. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in GIGABYTE Control Center and classified as critical. Impacted is an unknown function of the component Performance Library. The manipulation leads to deserialization.
This vulnerability is documented as CVE-2026-4416. The attack needs to be performed locally. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in pop-os cosmic-greeter. This issue affects some unknown processing. Executing a manipulation can lead to privilege dropping / lowering errors.
This vulnerability is registered as CVE-2026-25704. The attack needs to be launched locally. No exploit is available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in libarchive on 32-bit. This vulnerability affects unknown code of the component ISO9660 Image Parser. Performing a manipulation results in heap-based buffer overflow.
This vulnerability is cataloged as CVE-2026-5121. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in GIGABYTE Control Center up to 25.07.21.01. This affects an unknown part. Such manipulation leads to relative path traversal.
This vulnerability is listed as CVE-2026-4415. The attack may be performed from remote. There is no available exploit.
A vulnerability labeled as problematic has been found in Apache Seata up to 2.1.x. This impacts an unknown function. Executing a manipulation can lead to deserialization.
This vulnerability is registered as CVE-2024-47552. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability described as problematic has been identified in Apache Seata up to 2.2.x. This affects an unknown part. The manipulation results in deserialization.
This vulnerability is reported as CVE-2025-32897. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 7.0-rc2. It has been rated as critical. Affected by this vulnerability is the function bcm_tx_setup of the component can. The manipulation leads to improper initialization.
This vulnerability is referenced as CVE-2026-23362. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc1. Affected by this issue is the function dw_pcie_ep_raise_msix_irq of the component PCI. The manipulation results in privilege escalation.
This vulnerability is identified as CVE-2026-23361. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2. This affects the function acpi_lock of the component i2c. This manipulation causes null pointer dereference.
This vulnerability is tracked as CVE-2026-23369. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2. Affected is the function mt7925_mac_write_txwi_80211 of the component wifi. The manipulation results in out-of-bounds read.
This vulnerability was named CVE-2026-23363. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 7.0-rc1. Affected by this issue is the function memcmp of the component ksmbd. Such manipulation leads to observable timing discrepancy.
This vulnerability is referenced as CVE-2026-23364. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability classified as critical has been found in Linux Kernel up to 7.0-rc1. This issue affects some unknown processing of the component USB Endpoint. The manipulation leads to denial of service.
This vulnerability is listed as CVE-2026-23365. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.