A vulnerability was found in QNAP QuLog Center and classified as critical. Impacted is an unknown function. Such manipulation leads to link following.
This vulnerability is traded as CVE-2024-48862. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Samsung Galaxy Wearable 2.2.50/2.2.61.24112961. This affects an unknown part. The manipulation results in improper access controls.
This vulnerability is identified as CVE-2025-21022. The attack is only possible with local access. There is not any exploit available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in GitHub Enterprise Server up to 3.14.18/3.15.13/3.16.9/3.17.6/3.18.0. This issue affects some unknown processing. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2025-11892. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Google Android 13/14/15/16. Affected is an unknown function. The manipulation results in Remote Code Execution.
This vulnerability is identified as CVE-2025-48626. The attack can be executed remotely. There is not any exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability described as problematic has been identified in Google Android 13/14/15/16. This issue affects the function ProcessArea of the file dng_misc_opcodes.cpp. Executing manipulation can lead to out-of-bounds read.
This vulnerability is tracked as CVE-2025-48622. The attack is restricted to local execution. No exploit exists.
A vulnerability was found in Google Android 13/14/15/16 and classified as problematic. Affected is the function getComponentName of the file MediaButtonReceiverHolder.java. Executing manipulation can lead to resource consumption.
This vulnerability appears as CVE-2025-48615. The attack requires local access. There is no available exploit.
A vulnerability was found in Google Android 13/14/15/16. It has been declared as problematic. This issue affects the function rebootWipeUserData of the file RecoverySystem.java of the component Factory Reset Handler. Such manipulation leads to denial of service.
This vulnerability is traded as CVE-2025-48614. The attack can be executed directly on the physical device. There is no exploit available.
A vulnerability was found in Google Android 13/14/15/16. It has been rated as problematic. Impacted is the function processLaunchBrowser of the file CommandParamsFactory.java of the component Lockscreen. Performing manipulation results in improper locking.
This vulnerability is known as CVE-2025-48618. The attack may be carried out on the physical device. No exploit is available.
A vulnerability identified as problematic has been detected in Google Android 13/14/15/16. The impacted element is an unknown function of the file DefaultTransitionHandler.java. The manipulation leads to improper restriction of rendered ui layers.
This vulnerability is uniquely identified as CVE-2025-48621. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability marked as problematic has been reported in Google Android 13/14/15/16. This impacts the function onSomePackagesChanged of the file VoiceInteractionManagerService.java. This manipulation causes Local Privilege Escalation.
The identification of this vulnerability is CVE-2025-48620. The attack can only be executed locally. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Google Android 13/14. This vulnerability affects the function startNextMatchingActivity of the file ActivityTaskManagerService.java. The manipulation results in Local Privilege Escalation.
This vulnerability is cataloged as CVE-2025-48627. The attack must be initiated from a local position. There is no exploit available.
A vulnerability was found in GitHub Enterprise Server up to 3.14.18/3.15.13/3.16.9/3.17.6/3.18.0. It has been rated as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to link following.
This vulnerability is listed as CVE-2025-11578. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability identified as problematic has been detected in Pluggabl Booster for WooCommerce Plugin up to 7.2.5 on WordPress. Affected by this issue is some unknown functionality. Performing manipulation results in cross site scripting.
This vulnerability is identified as CVE-2025-64196. The attack can be initiated remotely. There is not any exploit available.
A vulnerability described as critical has been identified in Booster for WooCommerce Plugin up to 7.2.4 on WordPress. The affected element is the function add_files_to_order of the component Double Extension Handler. Executing manipulation can lead to unrestricted upload.
The identification of this vulnerability is CVE-2024-13342. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in bulletphysics bullet3 up to 3.25. This impacts an unknown function of the component LoadOFF. Performing manipulation results in buffer overflow.
This vulnerability was named CVE-2025-8854. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.