A vulnerability was found in Linux Kernel up to 6.1.87/6.6.28/6.8.7/6.9-rc5 and classified as problematic. Affected by this issue is the function smb2_allocate_rsp_buf of the component ksmbd. The manipulation results in out-of-bounds read.
This vulnerability is known as CVE-2024-26980. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.153/6.1.83/6.6.23/6.7.11/6.8.2. The affected element is the function pci_iounmap. Executing a manipulation can lead to memory leak.
This vulnerability is tracked as CVE-2024-26977. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability, which was classified as critical, was found in IP-COM W30AP up to 1.0.0.11(1340). Affected by this issue is the function R7WebsSecurityHandler of the file /goform/wx3auth of the component POST Request Handler. The manipulation of the argument data results in stack-based buffer overflow.
This vulnerability was named CVE-2026-2017. The attack may be performed from remote. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in itsourcecode School Management System 1.0 and classified as critical. This affects an unknown part of the file /ramonsys/settings/controller.php. This manipulation of the argument ID causes sql injection.
The identification of this vulnerability is CVE-2026-2018. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Yoast SEO Plugin up to 26.8 on WordPress. It has been classified as problematic. Affected is an unknown function of the component Block Attribute Handler. This manipulation of the argument yoast-schema causes cross site scripting.
The identification of this vulnerability is CVE-2026-1293. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.41/6.4.6. This affects the function ath11k_fw_stats_free. Such manipulation leads to memory leak.
This vulnerability is traded as CVE-2023-53602. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 5.15.120/6.1.39/6.4.4 and classified as critical. Impacted is the function sa_ctl. The manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2023-53603. The attack can only be performed from the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.3.1. It has been rated as critical. This affects the function kmem_cache_destroy. Performing a manipulation results in privilege escalation.
This vulnerability is cataloged as CVE-2023-53604. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Axigen Mail Server up to 10.5.56. It has been rated as critical. Affected is an unknown function of the component WebAdmin Interface. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2025-68721. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, was found in o6 Automation Open62541 up to 1.5-rc1. This impacts an unknown function of the component JSON Handler. Executing a manipulation can lead to out-of-bounds write.
The identification of this vulnerability is CVE-2026-1301. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability marked as problematic has been reported in Rapid7 InsightVM and Nexpose 8.24.0. Impacted is the function generateRandomPassword of the file nsc.ks of the component New Password Handler. Performing a manipulation results in insufficient entropy.
This vulnerability is cataloged as CVE-2026-1814. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in TP-Link Archer MR200 v5.2, Archer C20 v6, TL-WR850N v3 and TL-WR845N v4. Affected is the function JavaScript. Such manipulation leads to improper neutralization of directives in dynamically evaluated code.
This vulnerability is uniquely identified as CVE-2025-15551. The attack can only be initiated within the local network. No exploit exists.
A vulnerability classified as problematic was found in Silabs Simplicity SDK 2024.12.0. This affects an unknown part of the component 802.15.4 Packet Handler. The manipulation results in reachable assertion.
This vulnerability is known as CVE-2025-12131. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.6.121/6.12.67/6.18.7/6.19-rc6 and classified as critical. This vulnerability affects the function sama5d2_adc of the component adc. The manipulation results in use after free.
This vulnerability is reported as CVE-2025-71199. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability marked as problematic has been reported in pear pearweb up to 1.32.x. This vulnerability affects unknown code. Performing a manipulation results in predictable seed in pseudo-random number generator (prng).
This vulnerability is identified as CVE-2026-25235. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.18.5/6.19-rc4. The affected element is the function idpf_idc_vport_dev_down of the component idpf. This manipulation causes null pointer dereference.
This vulnerability is tracked as CVE-2026-23042. The attack is only possible within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.8.2. Affected by this vulnerability is the function kvm_put_kvm. Executing a manipulation can lead to null pointer dereference.
This vulnerability is handled as CVE-2024-26976. The attack can only be done within the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.8.2. Impacted is the function completion_done of the component Data Structure Handler. Performing a manipulation results in use after free.
This vulnerability is identified as CVE-2024-26974. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.23/6.7.11/6.8.2. This vulnerability affects unknown code of the component intel_rapl. This manipulation causes null pointer dereference.
The identification of this vulnerability is CVE-2024-26975. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.