A vulnerability was found in node-tar up to 4.4.1. It has been declared as critical. Impacted is an unknown function of the component Tarball Handler. The manipulation results in link following.
This vulnerability was named CVE-2018-20834. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Elegant Themes Bloom Plugin up to 1.1.0 on WordPress. The impacted element is an unknown function. Such manipulation leads to improper privilege management.
This vulnerability is listed as CVE-2016-11003. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability has been found in WordPress Real Media Library Plugin up to 4.14.1 and classified as problematic. This affects an unknown part of the file ~/inc/overrides/lite/rest/Folder.php. The manipulation of the argument Name leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2021-34668. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.1. The affected element is the function wmi_evaluate_method. The manipulation results in memory leak.
This vulnerability is reported as CVE-2022-50521. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.1. The impacted element is the function chameleon_parse_gdd. This manipulation causes improper update of reference count.
This vulnerability appears as CVE-2022-50522. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.0.15/6.1.1. This impacts the function platform_get_resource of the component mediatek. The manipulation leads to unchecked return value.
This vulnerability is listed as CVE-2022-50524. The attack must be carried out from within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.1. It has been classified as critical. This affects the function rockchip_clk_register_pll of the component clk. Performing a manipulation results in memory leak.
This vulnerability was named CVE-2022-50523. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.0.18/6.1.4. Affected by this issue is the function amdgpu_bo_validate_size. This manipulation causes uninitialized pointer.
This vulnerability is tracked as CVE-2022-50527. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.0.6. This issue affects some unknown processing of the component dp. Executing a manipulation can lead to memory corruption.
This vulnerability is registered as CVE-2022-50526. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.1.1. It has been rated as critical. Affected is the function radeon_atrm_get_bios. The manipulation leads to improper update of reference count.
This vulnerability is referenced as CVE-2022-50520. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.1. This issue affects the function fsl_pamu_probe of the component iommu. The manipulation leads to memory leak.
This vulnerability is traded as CVE-2022-50525. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Micron Crucial MX500 Series Solid State Drives M3CR046. The affected element is an unknown function of the component ATA Packet Handler. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-42642. The attack can only be initiated within the local network. No exploit exists.
A vulnerability, which was classified as problematic, has been found in Google Go up to 1.25.1. Affected by this issue is the function Equal of the component crypto-x509. Performing a manipulation results in denial of service.
This vulnerability is reported as CVE-2025-58188. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in Google Go up to 1.25.1. It has been declared as problematic. The affected element is an unknown function of the component crypto-x509. Such manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2025-58187. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Google Go up to 1.25.1. Affected is an unknown function of the component encoding-asn1. This manipulation causes uncontrolled memory allocation.
This vulnerability is registered as CVE-2025-58185. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Google Go up to 1.25.1. It has been classified as problematic. Impacted is an unknown function of the component net-http. This manipulation causes uncontrolled memory allocation.
This vulnerability is handled as CVE-2025-58186. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability described as critical has been identified in Google Go up to 1.25.1. This impacts an unknown function of the component net-url. The manipulation results in Remote Code Execution.
This vulnerability is cataloged as CVE-2025-47912. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.