Aggregator
CVE-2025-38651 | Linux Kernel up to 6.15.9/6.16.0 security/landlock/id.c get_id_range first privilege escalation (WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 6.15.9/6.16.0. This affects the function get_id_range of the file security/landlock/id.c. Executing manipulation of the argument first can lead to privilege escalation.
This vulnerability is registered as CVE-2025-38651. The attack requires access to the local network. No exploit is available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2025-38648 | Linux Kernel up to 6.6.101/6.12.41/6.15.9/6.16.0 stm32_spi_probe null pointer dereference (Nessus ID 260282 / WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability marked as critical has been reported in Linux Kernel up to 6.6.101/6.12.41/6.15.9/6.16.0. Affected by this vulnerability is the function stm32_spi_probe. The manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-38648. The attack requires being on the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-38649 | Linux Kernel up to 6.15.9/6.16.0 arm64 coresight_find_activated_sysfs_sink stack-based overflow (Nessus ID 276629 / WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.15.9/6.16.0. Impacted is the function coresight_find_activated_sysfs_sink of the component arm64. The manipulation results in stack-based buffer overflow.
This vulnerability is cataloged as CVE-2025-38649. The attack must originate from the local network. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2025-38650 | Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0 hfsplus fs/hfsplus/extents.c hfsplus_free_extents deadlock (Nessus ID 260269 / WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. Affected is the function hfsplus_free_extents of the file fs/hfsplus/extents.c of the component hfsplus. The manipulation results in deadlock.
This vulnerability was named CVE-2025-38650. The attack needs to be approached within the local network. There is no available exploit.
You should upgrade the affected component.
vuldb.com
CVE-2025-38645 | Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0 mlx5_init_once allocation of resources (Nessus ID 266176 / WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. Affected is the function mlx5_init_once. Executing manipulation can lead to allocation of resources.
This vulnerability is registered as CVE-2025-38645. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2025-38647 | Linux Kernel up to 6.16.0 wifi sar.c rtw89_set_sar_from_acpi assertion (WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability was found in Linux Kernel up to 6.16.0. It has been declared as critical. Affected by this issue is the function rtw89_set_sar_from_acpi of the file drivers/net/wireless/realtek/rtw89/sar.c of the component wifi. Executing manipulation can lead to reachable assertion.
The identification of this vulnerability is CVE-2025-38647. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-38644 | Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0 wifi ieee80211_tdls_oper uninitialized pointer (Nessus ID 260276 / WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability was found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. It has been declared as critical. This vulnerability affects the function ieee80211_tdls_oper of the component wifi. Executing manipulation can lead to uninitialized pointer.
This vulnerability is tracked as CVE-2025-38644. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-38646 | Linux Kernel up to 6.6.101/6.12.41/6.15.9/6.16.0 wifi rtw89_vif_rx_stats_iter null pointer dereference (Nessus ID 260274 / WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.101/6.12.41/6.15.9/6.16.0. The impacted element is the function rtw89_vif_rx_stats_iter of the component wifi. Performing manipulation results in null pointer dereference.
This vulnerability is known as CVE-2025-38646. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-38641 | Linux Kernel up to 6.16.0 Bluetooth null pointer dereference (WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability was found in Linux Kernel up to 6.16.0. It has been classified as critical. Impacted is an unknown function of the component Bluetooth. The manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2025-38641. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-38642 | Linux Kernel up to 6.15.9/6.16.0 assertion (Nessus ID 276629 / WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.15.9/6.16.0. This impacts an unknown function. Performing manipulation results in reachable assertion.
This vulnerability is cataloged as CVE-2025-38642. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2025-38643 | Linux Kernel up to 6.15.9/6.16.0 wifi net/wireless/chan.c cfg80211_check_and_end_cac state issue (EUVD-2025-25559 / Nessus ID 260267)
1 hour 26 minutes ago
A vulnerability was found in Linux Kernel up to 6.15.9/6.16.0. It has been rated as critical. This issue affects the function cfg80211_check_and_end_cac of the file net/wireless/chan.c of the component wifi. The manipulation leads to state issue.
This vulnerability is listed as CVE-2025-38643. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
vuldb.com
CVE-2025-38639 | Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0 netfilter lib/vsprintf.c nfnl_acct_find_get out-of-bounds (Nessus ID 266176 / WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. This affects the function nfnl_acct_find_get in the library lib/vsprintf.c of the component netfilter. Such manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2025-38639. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2025-38640 | Linux Kernel up to 6.6.101/6.12.41/6.15.9/6.16.0 /include/linux/filter.h nf_hook_run_bpf assertion (Nessus ID 260283 / WID-SEC-2025-1898)
1 hour 26 minutes ago
A vulnerability classified as critical was found in Linux Kernel up to 6.6.101/6.12.41/6.15.9/6.16.0. Affected by this vulnerability is the function nf_hook_run_bpf in the library /include/linux/filter.h. The manipulation results in reachable assertion.
This vulnerability is known as CVE-2025-38640. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
vuldb.com
CVE-2025-58015 | Ays Pro Quiz Maker Plugin up to 6.7.0.61 on WordPress exposure of sensitive system information to an unauthorized control sphere
1 hour 46 minutes ago
A vulnerability categorized as problematic has been discovered in Ays Pro Quiz Maker Plugin up to 6.7.0.61 on WordPress. Impacted is an unknown function. Executing manipulation can lead to exposure of sensitive system information to an unauthorized control sphere.
This vulnerability is handled as CVE-2025-58015. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2025-58668 | VibeThemes WPLMS Plugin up to 4.970 on WordPress authorization
1 hour 46 minutes ago
A vulnerability has been found in VibeThemes WPLMS Plugin up to 4.970 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. Performing manipulation results in missing authorization.
This vulnerability is known as CVE-2025-58668. Remote exploitation of the attack is possible. No exploit is available.
vuldb.com
CVE-2025-43810 | Liferay Portal/DXP authorization
1 hour 46 minutes ago
A vulnerability, which was classified as problematic, was found in Liferay Portal and DXP. This affects an unknown function. Such manipulation of the argument _com_liferay_commerce_order_web_internal_portlet_CommerceOrderPortlet_commerceOrderId leads to authorization bypass.
This vulnerability is documented as CVE-2025-43810. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2025-43814 | Liferay Portal/DXP Password Reminder insertion of sensitive information into sent data
1 hour 46 minutes ago
A vulnerability has been found in Liferay Portal and DXP and classified as problematic. This impacts an unknown function of the component Password Reminder Handler. Performing manipulation results in insertion of sensitive information into sent data.
This vulnerability is reported as CVE-2025-43814. The attack is possible to be carried out remotely. No exploit exists.
vuldb.com
CVE-2025-43806 | Liferay Portal/DXP REST API authorization
1 hour 46 minutes ago
A vulnerability was found in Liferay Portal and DXP and classified as critical. Affected is an unknown function of the component REST API. Executing manipulation can lead to incorrect authorization.
This vulnerability appears as CVE-2025-43806. The attack may be performed from remote. There is no available exploit.
vuldb.com
CVE-2025-39850 | Linux Kernel up to 6.12.45/6.16.5/6.17-rc4 VXLAN null pointer dereference (Nessus ID 265479 / WID-SEC-2025-2099)
1 hour 46 minutes ago
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.45/6.16.5/6.17-rc4. This impacts an unknown function of the component VXLAN. The manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2025-39850. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.
vuldb.com