A vulnerability labeled as critical has been found in Linux Kernel up to 5.15.126/6.1.45/6.4.10. This impacts the function xp_alloc_tx_descs of the component xsk. Such manipulation leads to improper update of reference count.
This vulnerability is referenced as CVE-2023-53698. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability has been found in Linux Kernel up to 5.15.120/6.1.38/6.4.3 and classified as critical. Affected is the function memblock_allow_resize. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2023-53699. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Linux Kernel up to 5.10.172/5.15.98/6.1.15/6.2.2. Impacted is the function max9286_v4l2_register of the file media/i2c/max9286.c of the component media. The manipulation results in memory leak.
This vulnerability is cataloged as CVE-2023-53700. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.52/6.4.15/6.5.2. This affects the function unregister_nvdimm_pmu of the component nvdimm. This manipulation causes allocation of resources.
The identification of this vulnerability is CVE-2023-53697. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 5.15.106/6.1.23/6.2.10. Affected by this vulnerability is the function qla2x00_probe_one of the component scsi. Performing a manipulation results in improper initialization.
This vulnerability was named CVE-2023-53696. The attack needs to be approached within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.2.2. The impacted element is an unknown function of the component UDF File Parser. The manipulation results in privilege escalation.
This vulnerability was named CVE-2023-53695. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in OneFlow 0.9.0. The impacted element is the function floor_divide of the component Tensor Handler. Executing a manipulation can lead to denial of service.
This vulnerability is registered as CVE-2025-65887. The attack requires access to the local network. No exploit is available.
A vulnerability has been found in CyberArk Endpoint Privilege Manager Agent up to 25.10.0 and classified as problematic. Affected is an unknown function of the component Administration Task Handler. The manipulation leads to Local Privilege Escalation.
This vulnerability is listed as CVE-2025-66374. The attack must be carried out locally. There is no available exploit.
A vulnerability marked as critical has been reported in DrayTek Vigor 300B up to 1.5.1.6. This affects the function cgiGetFile of the file /cgi-bin/mainfunction.cgi/uploadlangs of the component Web Management Interface. The manipulation of the argument File leads to os command injection. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is listed as CVE-2026-3040. The attack may be initiated remotely. In addition, an exploit is available.
The vendor confirms that "300B is EoL, and this is an authenticated vulnerability. We don't plan to fix it."
A vulnerability was found in valkey-io valkey-bloom. It has been declared as problematic. Affected by this issue is some unknown functionality. Executing a manipulation can lead to reachable assertion.
This vulnerability appears as CVE-2026-21864. The attack may be performed from remote. There is no available exploit.
A patch should be applied to remediate this issue.
A vulnerability was found in ImageMagick up to 6.9.13-39/7.1.2-14. It has been rated as problematic. This affects an unknown part. The manipulation leads to resource consumption.
This vulnerability is traded as CVE-2026-24484. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as problematic has been discovered in ImageMagick up to 6.9.13-39/7.1.2-14. This vulnerability affects the function DecodeImage of the component PCD File Handler. The manipulation results in resource consumption.
This vulnerability is known as CVE-2026-24485. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical has been found in FUXA 1.2.7. This impacts an unknown function of the file server/api/jwt-helper.js. Performing a manipulation results in hard-coded credentials.
This vulnerability was named CVE-2025-69971. The attack may be initiated remotely. There is no available exploit.
A vulnerability has been found in Wikimedia MediaWiki up to 1.39.12/1.43.x and classified as problematic. Affected is an unknown function of the file includes/api/ApiFeedContributions.Php. Performing a manipulation results in cross site scripting.
This vulnerability is known as CVE-2025-6591. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.22/6.2.2. This affects the function stop_machine of the component riscv. Such manipulation leads to denial of service.
This vulnerability is listed as CVE-2023-53694. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 5.10.149/5.15.74/5.19.16/6.0.2. It has been rated as critical. The affected element is the function poll_enabled_time. The manipulation leads to integer underflow.
This vulnerability is uniquely identified as CVE-2022-50582. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as critical was found in Linux Kernel up to c0c8edbc8abbe8f16d80a1d794d1ba2c12b6f193. The impacted element is the function ext4_clu_mapped of the file fs/ext4/extents.c of the component ext4. Such manipulation leads to use after free.
This vulnerability is documented as CVE-2023-53692. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in Linux Kernel up to 5.10.189/5.15.123/6.1.42/6.4.7. The impacted element is the function raw_queue_event of the file mm/slab_common.c. This manipulation causes memory leak.
This vulnerability is tracked as CVE-2023-53693. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.1. It has been declared as critical. Impacted is the function hfs_write_inode of the component HFS File Parser. Executing a manipulation can lead to out-of-bounds read.
This vulnerability is handled as CVE-2022-50581. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.