A vulnerability, which was classified as critical, was found in e4jvikwp VikRentCar Car Rental Management System Plugin up to 1.4.3 on WordPress. This affects the function do_updatecar. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2025-5322. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in OpenText GroupWise up to 24.4. Affected by this vulnerability is an unknown functionality. The manipulation leads to incorrect authorization.
This vulnerability is known as CVE-2025-0885. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability classified as problematic has been found in Docker Desktop up to 4.42.1. Affected is an unknown function of the component Environment Variable Handler. The manipulation leads to sensitive information in log files.
This vulnerability is traded as CVE-2025-6587. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.15.2. It has been rated as problematic. This issue affects the function usbnet_read_cmd in the library include/linux/etherdevice.h. The manipulation leads to improper initialization.
The identification of this vulnerability is CVE-2025-38153. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.33/6.15.2. It has been declared as critical. This vulnerability affects the function filp_open of the component erofs. The manipulation leads to use after free.
This vulnerability was named CVE-2025-38172. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.185/6.1.141/6.6.93/6.12.33/6.15.2. It has been classified as critical. This affects the function hdr_first_de of the component ntfs3. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-38167. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.33/6.15.2/40d76c393cca83938b11eb7ca8983aa3cd0ed69b and classified as problematic. Affected by this issue is the function f2fs_gc_range of the component f2fs. The manipulation leads to allocation of resources.
This vulnerability is handled as CVE-2025-38164. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.15.2 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component crypto. The manipulation leads to insufficiently random values.
This vulnerability is known as CVE-2025-38173. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.12.33/6.15.2. Affected is the function check_mul_overflow of the component netfilter. The manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2025-38162. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.15.2. This issue affects the function create_singlethread_workqueue of the component power. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2025-38171. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.15.2. This vulnerability affects the function raspberrypi_clk_register of the component clk. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2025-38160. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.15.185/6.1.141/6.6.93/6.12.33/6.15.2. This affects the function rtw_fw_bt_wifi_control of the component wifi. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2025-38159. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.2. It has been rated as problematic. Affected by this issue is the function total_valid_block_count in the library fs/f2fs/f2fs.h. The manipulation leads to privilege escalation.
This vulnerability is handled as CVE-2025-38163. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.141/6.6.93/6.12.33/6.15.2/b172a4a0de254f1fcce7591833a9a63547c2f447. It has been declared as critical. Affected by this vulnerability is the function cma_id_put. The manipulation leads to improper initialization.
This vulnerability is known as CVE-2025-38151. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.141/6.6.93/6.12.33/6.15.2 and classified as problematic. This issue affects the function hisi_acc_vfio_pci. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2025-38158. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.15.2 and classified as problematic. This vulnerability affects the function ath9k_htc_swba. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2025-38157. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.33/6.15.2. This affects the function mt7996_mmio_wed_init of the component wifi. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-38156. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.