A vulnerability, which was classified as critical, was found in NixOS Nix up to 2.24.14/2.26.3/2.28.3/2.29.0. Affected is an unknown function. The manipulation leads to incorrect default permissions.
This vulnerability is traded as CVE-2025-52991. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Blend Media CTA Plugin up to 1.6.9 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2025-53270. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in PHPGurukul Medical Card Generation System 1.0 and classified as problematic. This issue affects some unknown processing of the file /mcgs/admin/manage-card.php. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2025-50369. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in MobSF Mobile-Security-Framework- up to 3.9.6. It has been declared as critical. This vulnerability affects unknown code of the component 302 Redirect Handler. The manipulation leads to server-side request forgery.
This vulnerability was named CVE-2024-54000. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in TrendMakers Sight Bulb Pro. It has been classified as critical. This affects an unknown part of the component Service Port 16668. The manipulation leads to command injection.
This vulnerability is uniquely identified as CVE-2025-6522. The attack needs to be done within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, was found in StarCitizenTools mediawiki-extensions-TabberNeue up to 3.1.0. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-53093. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.0.8. It has been rated as critical. Affected by this issue is the function mousevsc_probe of the component HID. The manipulation leads to memory leak.
This vulnerability is handled as CVE-2022-49874. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 4.19.266/5.4.224/5.10.154/5.15.78/6.0.8. Affected by this vulnerability is the function tun_get_user of the component net. The manipulation leads to memory leak.
This vulnerability is known as CVE-2022-49871. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.0.8. Affected is the function macvlan_changelink_sources of the component net. The manipulation leads to memory leak.
This vulnerability is traded as CVE-2022-49853. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 5.18.10. Affected by this vulnerability is the function of_parse_phandle of the component ti_dra7_xbar_route_allocate. The manipulation leads to improper update of reference count.
This vulnerability is known as CVE-2022-49652. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.18.5. Affected is the function nfcmrvl_play_deferred. The manipulation leads to memory leak.
This vulnerability is traded as CVE-2022-49729. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in zenml-io zenml up to 0.67.x. This affects an unknown part of the file /api/v1/device_authorization. The manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2024-9340. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in OctoPrint up to 1.10.3. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to authentication bypass by spoofing.
This vulnerability is known as CVE-2025-32788. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in CVE-2025-6829 RTL8762E BLE SDK 1.4.0. It has been classified as problematic. Affected is an unknown function of the component Bluetooth Low Energy Stack. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2025-44559. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Cypress PSoC4 3.66. It has been rated as critical. Affected by this issue is some unknown functionality of the component Bluetooth Low Energy Stack. The manipulation leads to improper authentication.
This vulnerability is handled as CVE-2025-44557. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as very critical has been found in Dover Fueling Solutions ProGauge MagLink LX consoles. Affected is an unknown function of the component Target Communication Framework Interface. The manipulation leads to missing authentication.
This vulnerability is traded as CVE-2025-5310. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in MIKO MikoPBX up to 2024.1.114. This vulnerability affects unknown code of the file PBXCoreREST/Controllers/Files/PostController.php. The manipulation leads to relative path traversal.
This vulnerability was named CVE-2025-52207. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.