A vulnerability was found in itsourcecode Student Management System 1.0. It has been rated as critical. Impacted is an unknown function of the file /addrecord.php. This manipulation of the argument ID causes sql injection.
This vulnerability is registered as CVE-2025-14653. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability categorized as critical has been discovered in Tenda AC20 16.03.08.12. The affected element is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component httpd. Such manipulation of the argument list leads to stack-based buffer overflow.
This vulnerability is documented as CVE-2025-14654. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability was found in MartialBE one-hub up to 0.14.27. It has been classified as critical. This vulnerability affects unknown code of the file docker-compose.yml. The manipulation of the argument SESSION_SECRET leads to use of hard-coded cryptographic key
.
This vulnerability is listed as CVE-2025-14651. The attack may be initiated remotely. In addition, an exploit is available.
It is recommended to change the configuration settings.
The code maintainer recommends (translated from Chinese): "The default docker-compose example file is not recommended for production use. If you intend to use it in production, please carefully check and modify every configuration and environment variable yourself!"
A vulnerability was found in itsourcecode Online Cake Ordering System 1.0. It has been declared as critical. This issue affects some unknown processing of the file /admindetail.php?action=edit. The manipulation of the argument ID results in sql injection.
This vulnerability is cataloged as CVE-2025-14652. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Linux Kernel up to 6.12.27/6.14.5/6.15-rc4 and classified as critical. The impacted element is the function smb2_sess_setup of the component ksmbd. Executing manipulation can lead to use after free.
This vulnerability is tracked as CVE-2025-37899. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.27/6.14.5/6.15-rc4. Affected is the function iommu_copy_struct_from_user of the component iommu. Executing manipulation can lead to null pointer dereference.
This vulnerability is tracked as CVE-2025-37900. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.137/6.6.89/6.12.27/6.14.5/6.15-rc4 and classified as critical. Affected by this issue is some unknown functionality of the component qcom-mpm. The manipulation results in denial of service.
This vulnerability is cataloged as CVE-2025-37901. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability marked as problematic has been reported in Linux Kernel up to 6.14.5/6.15-rc4. This vulnerability affects the function module_memory_alloc. The manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2025-37898. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.14.5/6.15-rc4. It has been declared as problematic. This vulnerability affects the function spi_mem_calc_op_duration of the component SPI. Such manipulation leads to divide by zero.
This vulnerability is documented as CVE-2025-37896. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.137/6.6.89/6.12.27/6.14.5/6.15-rc4. Affected is the function plfxlc_mac_release of the file drivers/net/wireless/purelifi/plfxlc/mac.c of the component wifi. Performing manipulation results in reachable assertion.
This vulnerability was named CVE-2025-37897. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.27/6.14.5/6.15-rc4. This issue affects the function sock_gen_put of the file mrdump.ko. This manipulation causes improper update of reference count.
The identification of this vulnerability is CVE-2025-37894. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.12.27/6.14.5/6.15-rc4. Impacted is the function bnxt_init_chip of the file kernel/workqueue.c. Such manipulation leads to improper initialization.
This vulnerability is referenced as CVE-2025-37895. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.