A vulnerability has been found in Microsoft Windows and classified as critical. This vulnerability affects unknown code of the component StateRepository API Server. The manipulation leads to missing authorization.
This vulnerability was named CVE-2025-49723. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Notification. The manipulation leads to use after free.
This vulnerability is known as CVE-2025-49726. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows and classified as problematic. This issue affects some unknown processing of the component Storage. The manipulation leads to file inclusion.
The identification of this vulnerability is CVE-2025-49760. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Linux Kernel up to 6.6.23/6.7.11/6.8.2 and classified as critical. This issue affects some unknown processing of the component amdgpu. The manipulation leads to deadlock.
The identification of this vulnerability is CVE-2024-35795. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was suspected in Linux Kernel up to 6.7.9. Further investigation has shown that this issues is a false-positive. Please review the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.7.9. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.7.9. This issue appears to be a false-positive. Please verify the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.7.9. Further investigation has shown that this issues is a false-positive. Please review the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.7.9. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.7.9. This issue was flagged as a false-positive. Please consult the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.7.9. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.7.9. This issue was flagged as a false-positive. Please consult the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.7.9. Further investigation has shown that this issues is a false-positive. Please review the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.7.9. This issue was flagged as a false-positive. Please consult the sources mentioned and consider not using this entry at all.
A vulnerability was found in Linux Kernel up to 6.7.8 and classified as problematic. This issue affects some unknown processing of the component Bluetooth. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2024-27416. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.7.8 and classified as problematic. This vulnerability affects the function rtnl_bridge_setlink of the component rtnetlink. The manipulation leads to state issue.
This vulnerability was named CVE-2024-27414. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.7.8. It has been declared as problematic. Affected by this vulnerability is the function efi_capsule_open of the file drivers/firmware/efi/capsule-loader.c of the component capsule-loader. The manipulation leads to allocation of resources.
This vulnerability is known as CVE-2024-27413. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Fortinet FortiClient up to 5.2.3. This vulnerability affects unknown code of the component IOCTL Call Handler. The manipulation of the argument 0x22608C leads to information disclosure (Kernel Memory).
This vulnerability was named CVE-2015-4077. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.