A vulnerability was found in Kerlink KerOS up to 5.9. It has been declared as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation results in channel accessible by non-endpoint.
This vulnerability is cataloged as CVE-2024-32384. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in jvde-github AIS-catcher up to 0.63. This impacts an unknown function of the component MQTT Parser. Executing manipulation of the argument Topic Length can lead to heap-based buffer overflow.
This vulnerability is registered as CVE-2025-66217. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability has been found in jvde-github AIS-catcher up to 0.63 and classified as critical. This issue affects the function AIS::Message. Performing manipulation results in incorrect calculation of buffer size.
This vulnerability is reported as CVE-2025-66216. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Samsung Exynos Modem 5123 and Exynos Modem 5300. Affected is an unknown function of the component Shannon RCS. The manipulation results in incorrect resource transfer.
This vulnerability is cataloged as CVE-2023-31114. The attack must originate from the local network. There is no exploit available.
A vulnerability classified as critical has been found in Samsung Exynos Modem 5123 and Exynos Modem 5300. Affected by this vulnerability is an unknown functionality of the component Shannon RCS. This manipulation causes incorrect resource transfer.
This vulnerability is registered as CVE-2023-31115. The attack requires access to the local network. No exploit is available.
A vulnerability classified as critical has been found in Broadcom LSI PCI-SV92EX Soft Modem Kernel Driver up to 2.2.100.1. This impacts an unknown function in the library AGRSM64.sys. The manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2023-31096. Local access is required to approach this attack. No exploit exists.
A vulnerability was found in typora up to 1.38. It has been classified as problematic. The affected element is an unknown function of the component Export from Editor. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2022-40011. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Ninja Forms Plugin up to 3.12.0 on WordPress and classified as problematic. This affects an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-10498. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in Linux Kernel up to 6.1.141/6.6.94/6.12.34/6.15.3. It has been rated as problematic. This issue affects some unknown processing of the component net. This manipulation causes out-of-bounds read.
This vulnerability is registered as CVE-2025-38422. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.141/6.6.94/6.12.34/6.15.3. Impacted is an unknown function of the component i2c. Such manipulation leads to buffer overflow.
This vulnerability is documented as CVE-2025-38425. The attack requires being on the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.16-rc2. The impacted element is the function do_exit of the component perf. Executing manipulation can lead to stack-based buffer overflow.
This vulnerability appears as CVE-2025-38424. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability classified as problematic was found in Liferay Portal and DXP. This vulnerability affects unknown code of the component JSON Web Service. Executing manipulation can lead to incorrect authorization.
This vulnerability is tracked as CVE-2025-43789. The attack is only possible within the local network. No exploit exists.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.6.100/6.12.40/6.15.8. Affected by this vulnerability is the function cpu_switch_to. Executing manipulation can lead to denial of service.
This vulnerability is tracked as CVE-2025-38670. The attack is only possible within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. This impacts the function do_insn_ioctl of the component comedi. The manipulation results in improper initialization.
This vulnerability was named CVE-2025-38478. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. This affects the function sch_qfq. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2025-38477. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.3. It has been declared as critical. This issue affects the function ims_pcu_flash_firmware. Such manipulation of the argument len leads to memory corruption.
This vulnerability is referenced as CVE-2025-38428. The attack needs to be initiated within the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability has been found in TSplus Remote Access up to 16.0.2.14 and classified as critical. This affects an unknown function of the file %PROGRAMFILES(X86)%\TSplus\Clients\www.. Performing manipulation results in permission issues.
This vulnerability is known as CVE-2023-31067. Attacking locally is a requirement. Furthermore, an exploit is available.
A vulnerability marked as problematic has been reported in Repetier Server up to 1.4.10. Affected is an unknown function. Performing manipulation results in cross-site request forgery.
This vulnerability is cataloged as CVE-2023-31061. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic was found in Linux Kernel up to 6.16-rc2. Impacted is the function try_module_get. Executing manipulation can lead to privilege escalation.
The identification of this vulnerability is CVE-2025-38416. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.