About 900 Sangoma FreePBX systems were infected with web shells after attackers exploited a command injection flaw. Hundreds of Sangoma FreePBX instances are still infected with web shells following attacks that began in December 2025. Sangoma FreePBX is an open-source, web-based platform for managing Asterisk-powered VoIP phone systems. Maintained by Sangoma Technologies, it allows businesses […]
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.3.4. Affected is the function usb_submit_urb of the file drivers/usb/core/urb.c. Performing a manipulation results in privilege escalation.
This vulnerability is reported as CVE-2023-53644. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.17/6.2.4. The affected element is the function getsockname. The manipulation results in null pointer dereference.
This vulnerability was named CVE-2023-53643. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.3.1. Impacted is the function dev_dbg. The manipulation leads to race condition.
This vulnerability is uniquely identified as CVE-2023-53639. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 5.15.113/6.1.30/6.3.4. This impacts the function use_after_free of the component ASoC. The manipulation results in out-of-bounds read.
This vulnerability was named CVE-2023-53640. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.3.1. It has been declared as critical. This affects the function ath9k_hif_usb_rx_stream. The manipulation results in improper initialization.
This vulnerability is reported as CVE-2023-53641. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.28. Affected by this vulnerability is the function clear_user_rep_good in the library arch/x86/lib/clear_page_64.S. Such manipulation leads to memory corruption.
This vulnerability is referenced as CVE-2023-53642. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.2.2 and classified as critical. Affected is the function ov772x_probe of the component media. Executing a manipulation can lead to memory leak.
This vulnerability is handled as CVE-2023-53637. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.27/6.2.14/6.3.1. This issue affects the function adev_release. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2023-53636. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.4.11. The impacted element is the function octeon_ep. This manipulation causes use after free.
The identification of this vulnerability is CVE-2023-53638. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.24/6.2.11. It has been declared as critical. This issue affects some unknown processing. Such manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2023-53634. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.27/6.2.14/6.3.1. This impacts the function ctnetlink_change_timeout. Performing a manipulation results in stack-based buffer overflow.
This vulnerability is identified as CVE-2023-53635. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in itsourcecode University Management System 1.0. This vulnerability affects unknown code of the file /admin_single_student.php. This manipulation of the argument ID causes sql injection.
This vulnerability is tracked as CVE-2026-3413. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability classified as problematic was found in itsourcecode University Management System 1.0. This affects an unknown part of the file /att_single_view.php. The manipulation of the argument dt results in cross site scripting.
This vulnerability is identified as CVE-2026-3412. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability classified as critical has been found in itsourcecode University Management System 1.0. Affected by this issue is some unknown functionality of the file /admin_single_student_update.php. The manipulation of the argument ID leads to sql injection.
This vulnerability is referenced as CVE-2026-3411. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability described as critical has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/check_studid.php. Executing a manipulation of the argument student_id can lead to sql injection.
The identification of this vulnerability is CVE-2026-3410. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability marked as critical has been reported in eosphoros-ai db-gpt 0.7.5. Affected is the function importlib.machinery.SourceFileLoader.exec_module of the file /api/v1/serve/awel/flow/import of the component Flow Import Endpoint. Performing a manipulation as part of File results in code injection.
This vulnerability was named CVE-2026-3409. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.