A vulnerability identified as problematic has been detected in Linux Kernel up to 6.12.8. This affects the function dip_ctx. The manipulation leads to privilege escalation.
This vulnerability is traded as CVE-2024-57935. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.12.8. Impacted is an unknown function of the component fgraph. Performing a manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2024-57934. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 6.6.69/6.12.8. This impacts an unknown function of the component gve. Such manipulation leads to denial of service.
This vulnerability is traded as CVE-2024-57933. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.8. It has been declared as critical. The impacted element is the function BUG of the component SELinux. The manipulation results in permission issues.
This vulnerability is reported as CVE-2024-57931. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.69/6.12.8. It has been rated as problematic. This affects an unknown function of the component gve. This manipulation causes divide by zero.
This vulnerability appears as CVE-2024-57932. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in MIT Kerberos 5 1.7. This impacts an unknown function of the file kadmind of the component Incremental Propagation. This manipulation causes memory corruption.
This vulnerability is registered as CVE-2025-24528. The attack requires access to the local network. No exploit is available.
A vulnerability was found in Linux Kernel up to 6.1.123/6.6.69/6.12.8. It has been classified as problematic. The affected element is the function process_string of the component tracing. The manipulation of the argument record leads to null pointer dereference.
This vulnerability is documented as CVE-2024-57930. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.15.176/6.1.126/6.6.73/6.12.10. This issue affects the function bpf_sk_select_reuseport. This manipulation causes memory leak.
This vulnerability is registered as CVE-2025-21683. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 6.1.126/6.6.73/6.12.10. Affected by this issue is the function skb_tx_hash. Executing a manipulation can lead to infinite loop.
This vulnerability is tracked as CVE-2025-21681. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in TP-Link TL-WR886N 7.0_3.0.14_Build_221115_Rel.56908n.bin. It has been classified as critical. This impacts the function registerRequestHandle. The manipulation leads to stack-based buffer overflow.
This vulnerability is referenced as CVE-2023-46539. The attack needs to be initiated within the local network. No exploit is available.
A vulnerability was found in Totolink X2000R Gh 1.0.0-B20230221.0948.web. It has been rated as critical. Affected by this vulnerability is the function formNtp. This manipulation causes stack-based buffer overflow.
This vulnerability is tracked as CVE-2023-46540. The attack is only possible within the local network. No exploit exists.
A vulnerability, which was classified as critical, has been found in TP-Link TL-WR886N 7.0_3.0.14_Build_221115_Rel.56908n.bin. Impacted is the function chkResetVeriRegister. This manipulation causes stack-based buffer overflow.
This vulnerability is handled as CVE-2023-46538. The attack can only be done within the local network. There is not any exploit available.
A vulnerability has been found in TP-Link TL-WR886N 7.0_3.0.14_Build_221115_Rel.56908n.bin and classified as critical. The impacted element is the function getRegVeriRegister. Performing a manipulation results in stack-based buffer overflow.
This vulnerability was named CVE-2023-46537. The attack needs to be approached within the local network. There is no available exploit.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.12.68/6.18.8. This affects the function ice_vsi_set_napi_queues of the component ice. Executing a manipulation can lead to null pointer dereference.
This vulnerability is registered as CVE-2026-23166. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Linux Kernel up to 6.6.122/6.12.68/6.18.8. This vulnerability affects the function gs_usb_receive_bulk_callback. The manipulation results in information exposure through error message.
This vulnerability was named CVE-2026-23155. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in Linux Kernel up to 6.12.10. This affects the function get_canonical_dev_path. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2025-21679. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 5.15.176/6.1.126/6.6.73/6.12.10. Affected is the function gtp_newlink in the library lib/ref_tracker.c of the file drivers/net/gtp.c. Such manipulation leads to excessive iteration.
This vulnerability is referenced as CVE-2025-21678. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability described as problematic has been identified in Linux Kernel up to 5.15.176/6.1.126/6.6.73/6.12.10. This vulnerability affects the function get_imix_entries in the library lib/dump_stack.c of the file net/core/pktgen.c. The manipulation results in improper validation of array index.
This vulnerability is cataloged as CVE-2025-21680. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.12.10. Affected by this vulnerability is the function pfcp_newlink in the library lib/ref_tracker.c of the file drivers/net/pfcp.c. Performing a manipulation results in excessive iteration.
This vulnerability is identified as CVE-2025-21677. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.