A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.135/6.12.82/6.18.23/6.19.13. This affects the function gsi_channel_trans_quiesce of the component net. The manipulation leads to privilege escalation.
This vulnerability is documented as CVE-2026-43345. The attack requires being on the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability labeled as problematic has been found in go-git up to 5.17.x/6.0.0-alpha.1. The affected element is an unknown function. The manipulation results in insufficiently protected credentials.
This vulnerability was named CVE-2026-41506. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.166/6.6.129/6.12.77/6.18.18/6.19.8. This vulnerability affects the function buffer_list. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2026-43366. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.77/6.18.18/6.19.8. The affected element is the function remove_nh_grp_entry. The manipulation results in use after free.
This vulnerability is known as CVE-2026-43374. Attacking locally is a requirement. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.77/6.18.18/6.19.8. It has been classified as critical. Affected by this vulnerability is the function btrfs_map_block of the component btrfs. Performing a manipulation results in privilege escalation.
This vulnerability is identified as CVE-2026-43393. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in 8421bit MiniClaw 0.8.0/0.9.0. This issue affects the function resolveSkillScriptPath of the file src/kernel.ts of the component System Command Handler. The manipulation results in os command injection.
This vulnerability is cataloged as CVE-2026-8235. The attack must originate from the local network. Furthermore, there is an exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in EFM ipTIME A8004T 14.18.2. It has been rated as critical. This vulnerability affects the function formWifiBasicSet of the file /goform/WifiBasicSet. The manipulation of the argument security_5g leads to stack-based buffer overflow.
This vulnerability is listed as CVE-2026-8234. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
Braintrust warned customers to rotate API keys after hackers breached an AWS account, exposing secrets tied to cloud-based AI models. AI observability startup Braintrust warned customers to rotate API keys after attackers gained unauthorized access to one of the company’s AWS accounts, potentially exposing secrets used to connect to cloud-based AI models. The company said […]