A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.141/6.6.93/6.12.33/6.15.2. This affects the function bpf_exec_tx_verdict in the library lib/iov_iter.c of the component bpf. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2025-38166. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.33/6.15.2. The impacted element is the function arm_ni_init. Executing manipulation can lead to denial of service.
This vulnerability appears as CVE-2025-38168. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.15.185/6.1.141/6.6.93/6.12.33/6.15.2. Affected by this issue is the function hdr_first_de of the component ntfs3. Such manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2025-38167. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability described as problematic has been identified in Google Chrome. This affects an unknown function of the component Split View. The manipulation results in improper restriction of rendered ui layers.
This vulnerability is reported as CVE-2025-13636. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.12.33/6.15.2/40d76c393cca83938b11eb7ca8983aa3cd0ed69b. Affected by this vulnerability is the function f2fs_gc_range of the component f2fs. This manipulation causes allocation of resources.
This vulnerability appears as CVE-2025-38164. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability was found in Google Chrome. It has been declared as problematic. Impacted is an unknown function of the component Downloads. Such manipulation leads to improper restriction of rendered ui layers.
This vulnerability is referenced as CVE-2025-13635. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Google Chrome on Windows. It has been classified as critical. This issue affects some unknown processing of the component Downloads. This manipulation causes authentication bypass by spoofing.
The identification of this vulnerability is CVE-2025-13634. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.12.33/6.15.2. It has been rated as problematic. This impacts the function check_mul_overflow of the component netfilter. The manipulation leads to allocation of resources.
This vulnerability is documented as CVE-2025-38162. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability has been found in Linux Kernel up to 6.6.117/6.12.59/6.17.9 and classified as critical. Affected by this vulnerability is the function mptcp_schedule_work in the library lib/refcount.c of the component mptcp. Performing manipulation results in use after free.
This vulnerability was named CVE-2025-40258. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting.
This vulnerability is known as CVE-2025-14201. It is possible to launch the attack remotely. Furthermore, an exploit is available.
This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. It has been classified as problematic. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-14200. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Verysync 微力同步 up to 2.21.3 and classified as critical. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload.
This vulnerability appears as CVE-2025-14199. The attack may be performed from remote. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in Verysync 微力同步 2.21.3 and classified as problematic. This affects an unknown function of the file /safebrowsing/clientreport/download?key=dummytoken of the component Web Administration Module. Performing manipulation results in information disclosure.
This vulnerability is reported as CVE-2025-14198. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, was found in Verysync 微力同步 up to 2.21.3. The impacted element is an unknown function of the file /rest/f/api/resources/f96956469e7be39d of the component Web Administration Module. Such manipulation leads to information disclosure.
This vulnerability is documented as CVE-2025-14197. The attack can be executed remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.