A vulnerability has been found in dbus up to 1.10.27/1.12.15/1.13.11 and classified as critical. This affects an unknown part of the file /.dbus-keyrings. The manipulation leads to improper authentication.
This vulnerability is documented as CVE-2019-12749. The attack needs to be performed locally. There is not any exploit available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in SQLite 3.39.0/3.39.1. This affects an unknown part of the component C API. The manipulation leads to improper validation of array index.
This vulnerability is traded as CVE-2022-35737. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Oracle MySQL Workbench up to 8.0.30 and classified as critical. The affected element is an unknown function of the component Workbench. The manipulation leads to denial of service.
This vulnerability is listed as CVE-2022-35737. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in Oracle Communications Messaging Server 8.1.0.20.0 and classified as critical. Affected is an unknown function of the component IMAP. Such manipulation leads to denial of service.
This vulnerability is listed as CVE-2022-35737. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in Oracle Communications Cloud Native Core Policy up to 22.4.4/23.1.1. It has been declared as critical. This impacts an unknown function of the component Policy. Such manipulation leads to denial of service.
This vulnerability is referenced as CVE-2022-35737. It is possible to launch the attack remotely. No exploit is available.
A vulnerability labeled as critical has been found in netatalk up to 3.1.11. This vulnerability affects unknown code of the file dsi_opensess.c. The manipulation results in out-of-bounds write.
This vulnerability was named CVE-2018-1160. The attack may be performed from remote. In addition, an exploit is available.
The affected component should be upgraded.
A vulnerability was found in cURL up to 7.85.x. It has been declared as problematic. Impacted is an unknown function of the component HSTS Handler. Executing a manipulation can lead to missing encryption of sensitive data.
This vulnerability is registered as CVE-2022-42916. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability identified as problematic has been detected in Apple macOS. Impacted is an unknown function of the component curl. This manipulation causes cleartext transmission of sensitive information.
This vulnerability is registered as CVE-2022-42916. The attack requires access to the local network. No exploit is available.
You should upgrade the affected component.
Threat actors are abusing Claude artifacts and Google Ads in ClickFix campaigns that deliver infostealer malware to macOS users searching for specific queries. [...]
A vulnerability was found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. It has been declared as critical. This vulnerability affects the function ieee80211_tdls_oper of the component wifi. Executing a manipulation can lead to uninitialized pointer.
This vulnerability is tracked as CVE-2025-38644. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.16.0. It has been classified as critical. Impacted is an unknown function of the component Bluetooth. The manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2025-38641. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.15.9/6.16.0. This impacts an unknown function. Performing a manipulation results in reachable assertion.
This vulnerability is cataloged as CVE-2025-38642. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.9/6.16.0. It has been rated as critical. This issue affects the function cfg80211_check_and_end_cac of the file net/wireless/chan.c of the component wifi. The manipulation leads to state issue.
This vulnerability is listed as CVE-2025-38643. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. This affects the function nfnl_acct_find_get in the library lib/vsprintf.c of the component netfilter. Such manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2025-38639. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.6.101/6.12.41/6.15.9/6.16.0. Affected by this vulnerability is the function nf_hook_run_bpf in the library /include/linux/filter.h. The manipulation results in reachable assertion.
This vulnerability is known as CVE-2025-38640. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.16.0. It has been declared as problematic. Affected by this vulnerability is the function net6_rt_notify of the file net/ipv6/route.c. Such manipulation leads to privilege escalation.
This vulnerability is listed as CVE-2025-38638. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.