A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. The impacted element is the function davinci_lpsc_clk_register of the component clk. Such manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-38635. The attack requires being on the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.16.0. It has been declared as critical. The affected element is the function do_trace_event_raw_event_event_da_monitor of the component rv. The manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2025-38636. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.6.101/6.12.41/6.15.9/6.16.0. The affected element is the function pinctrl_select_state of the component Gpio Call Handler. This manipulation causes null pointer dereference.
This vulnerability is registered as CVE-2025-38632. The attack requires access to the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.16.0. This impacts an unknown function of the component clk. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2025-38633. The attack can only be initiated within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. It has been rated as critical. The impacted element is the function cpcap_usb_detect of the component power. This manipulation causes null pointer dereference.
This vulnerability is tracked as CVE-2025-38634. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.12.41/6.15.9/6.16.0 and classified as critical. This issue affects the function clk_register. Executing a manipulation can lead to state issue.
The identification of this vulnerability is CVE-2025-38631. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability identified as critical has been detected in Tandoor Recipes up to 2.5.0. The impacted element is an unknown function of the file cookbook/integration/cookmate.py of the component Cookmate Integration. The manipulation leads to server-side request forgery.
This vulnerability is referenced as CVE-2026-25991. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in bacnet-stack up to 1.4.2/1.5.0.rc2. The affected element is the function tokenizer_string of the file src/bacnet/basic/program/ubasic/tokenizer.c. Executing a manipulation can lead to off-by-one.
The identification of this vulnerability is CVE-2026-21870. The attack can only be executed locally. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in bacnet-stack BACnet Stack up to 1.4.3rc1/1.5.0rc3. It has been rated as problematic. Impacted is the function wp_decode_service_request of the file wp.c. Performing a manipulation results in out-of-bounds read.
This vulnerability was named CVE-2026-26264. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in bacnet-stack BACnet Stack up to 1.5.0.rc3. It has been declared as critical. This issue affects some unknown processing of the file apps/readfile/main.c. Such manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2026-21878. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Alex4SSB ADB-Explorer up to Beta 0.9.26019. It has been classified as critical. This vulnerability affects unknown code of the file Newtonsoft.Json of the component JSON File Parser. This manipulation causes deserialization.
This vulnerability is handled as CVE-2026-26208. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in milvus-io milvus up to 2.5.26/2.6.9 and classified as critical. This affects an unknown part of the file /expr of the component Full REST API. The manipulation results in missing authentication.
This vulnerability is known as CVE-2026-26190. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Google Chrome and classified as critical. Affected by this issue is some unknown functionality of the component CSS. The manipulation leads to use after free.
This vulnerability is traded as CVE-2026-2441. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
Currently trending CVE - Hype Score: 3 - The issue was addressed with improved memory handling. This issue is fixed in tvOS 26.2, Safari 26.2, watchOS 26.2, visionOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.