A vulnerability identified as problematic has been detected in jairiidriss RestaurantWebsite up to e7911f12d035e8e2f9a75e7a28b59e4ef5c1d654. Impacted is an unknown function of the component Make a Reservation. This manipulation of the argument selected_date causes cross site scripting.
This vulnerability is handled as CVE-2025-13802. The attack can be initiated remotely. Additionally, an exploit exists.
Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability labeled as problematic has been found in MediaCrush 1.0.0/1.0.1. The affected element is an unknown function of the file /mediacrush/paths.py of the component Header Handler. Such manipulation of the argument Host leads to improper neutralization of http headers for scripting syntax.
This vulnerability is uniquely identified as CVE-2025-13803. The attack can be launched remotely. No exploit exists.
A vulnerability marked as problematic has been reported in nutzam NutzBoot up to 2.6.0-SNAPSHOT. The impacted element is an unknown function of the file nutzboot-demo/nutzboot-demo-simple/nutzboot-demo-simple-web3j/src/main/java/io/nutz/demo/simple/module/EthModule.java of the component Ethereum Wallet Handler. Performing manipulation results in information disclosure.
This vulnerability was named CVE-2025-13804. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability described as problematic has been identified in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This affects the function getInputStream of the file nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java of the component LiteRpc-Serializer. Executing manipulation can lead to deserialization.
The identification of this vulnerability is CVE-2025-13805. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Linux Kernel up to 5.19.1. Affected by this issue is the function cp2112_xfer of the file drivers/hid/hid-cp2112.c of the component HID. Executing manipulation of the argument read_length can lead to buffer overflow.
This vulnerability appears as CVE-2022-50156. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 5.15.60/5.18.17/5.19.1. It has been declared as critical. The impacted element is the function mc_pcie_init_irq_domains of the component PCI. Executing manipulation can lead to improper update of reference count.
The identification of this vulnerability is CVE-2022-50157. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel. It has been rated as critical. This affects the function of_get_child_by_name of the component mtd. The manipulation leads to improper update of reference count.
This vulnerability is referenced as CVE-2022-50158. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in Linux Kernel up to 5.19.1. This impacts the function of_parse_phandle of the component usb. This manipulation causes improper update of reference count.
This vulnerability is registered as CVE-2022-50152. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.19.1. Affected by this vulnerability is the function of_find_compatible_node of the component usb. Performing manipulation results in improper update of reference count.
This vulnerability is reported as CVE-2022-50153. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.60/5.18.17/5.19.1. This vulnerability affects the function mtk_pcie_init_irq_domains of the component PCI. The manipulation results in improper update of reference count.
This vulnerability is known as CVE-2022-50154. Access to the local network is required for this attack. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.60/5.18.17/5.19.1. It has been classified as critical. The affected element is the function of_find_node_by_path of the component mtd. Performing manipulation results in improper update of reference count.
This vulnerability was named CVE-2022-50155. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.4.210/5.10.136/5.15.60/5.18.17/5.19.1. This affects the function __driver_attach. Executing manipulation can lead to deadlock.
The identification of this vulnerability is CVE-2022-50149. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1 and classified as problematic. This vulnerability affects the function dev_coredumpm of the component mwifiex. The manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2022-50150. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 5.15.62/5.19.1 and classified as problematic. Impacted is the function cdns3_allocate_trb_pool of the component usb. Such manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2022-50151. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.15.60/5.18.17/5.19.1 and classified as problematic. This issue affects the function get_nodes of the component mempolicy. This manipulation causes out-of-bounds read.
This vulnerability is handled as CVE-2022-50147. The attack can only be done within the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 5.19.3 and classified as critical. This affects the function dpcm_add_paths of the component ASoC. The manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2022-50049. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.62/5.19.3. It has been declared as critical. This affects the function nft_expr_clone of the component netfilter. Such manipulation leads to improper update of reference count.
This vulnerability is documented as CVE-2022-50048. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.62/5.19.3. It has been rated as critical. This impacts the function snprintf of the component ASoC. Performing manipulation results in buffer overflow.
This vulnerability is reported as CVE-2022-50050. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.