A vulnerability classified as critical was found in Linux Kernel up to 6.1.8. This impacts the function highbank_mc_probe. The manipulation results in memory leak.
This vulnerability was named CVE-2022-49757. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.90/6.1.8. Affected by this vulnerability is the function platform_get_resource of the component uniphier-glue. Such manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2022-49758. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.8. The impacted element is the function sp_usb_phy_probe. Executing manipulation can lead to null pointer dereference.
This vulnerability is handled as CVE-2022-49756. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.8. This impacts the function mgmt_mesh_add of the file net/bluetooth/mgmt_util.c of the component Bluetooth. Executing manipulation can lead to buffer overflow.
This vulnerability is registered as CVE-2022-49754. The attack requires access to the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.8. The affected element is the function ffs_ep0_queue_wait of the component f_fs. The manipulation results in use after free.
This vulnerability was named CVE-2022-49755. The attack needs to be approached within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.8. It has been declared as critical. Affected by this issue is the function dma_chan_get in the library lib/refcount.c of the component dmaengine. Executing manipulation can lead to use after free.
This vulnerability is registered as CVE-2022-49753. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.8. It has been rated as critical. This affects an unknown function of the component cpufreq. Performing manipulation of the argument _CPC results in buffer overflow.
This vulnerability is cataloged as CVE-2022-49750. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.15.90/6.1.8. Impacted is the function fwnode_graph_get_next_endpoint. The manipulation of the argument parent leads to improper update of reference count.
This vulnerability is uniquely identified as CVE-2022-49752. The attack can only be initiated within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.1.8. Affected is the function w1_process. The manipulation leads to state issue.
This vulnerability is documented as CVE-2022-49751. The attack requires being on the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.91/6.1.9. It has been declared as critical. The impacted element is the function iomap_iter_done of the file erofs/zmap.c. Such manipulation leads to denial of service.
This vulnerability is listed as CVE-2022-49747. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.4.230/5.10.165/5.15.90/6.1.8 and classified as problematic. Impacted is an unknown function of the component amd. The manipulation results in integer overflow.
This vulnerability is identified as CVE-2022-49748. The attack can only be performed from the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.10.165/5.15.90/6.1.8 and classified as problematic. This issue affects the function i2c_dw_scl_lcnt. The manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2022-49749. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 4.19.271/5.4.230/5.10.166/5.15.91/6.1.9. It has been classified as critical. This affects the function sdma_load_context of the component imx-sdma. This manipulation causes memory leak.
This vulnerability is registered as CVE-2022-49746. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability has been found in Yet Another WebClap Plugin up to 0.2 on WordPress and classified as problematic. This impacts an unknown function of the component Shortcode Handler. This manipulation of the argument text causes cross site scripting.
The identification of this vulnerability is CVE-2025-13857. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as problematic has been discovered in Directory Listing & Classifieds Plugin up to 3.0.0 on WordPress. This issue affects some unknown processing of the file /wp-json/listar/v1/place/save of the component REST API Endpoint. Such manipulation leads to missing authorization.
This vulnerability is referenced as CVE-2025-12577. It is possible to launch the attack remotely. No exploit is available.
A vulnerability, which was classified as problematic, was found in Canadian Nutrition Facts Label Plugin up to 3.0 on WordPress. Affected by this issue is some unknown functionality. Executing manipulation of the argument percentage can lead to cross site scripting.
This vulnerability appears as CVE-2025-12715. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in List Attachments Shortcode Plugin up to 0.4.1a on WordPress. It has been declared as problematic. Impacted is an unknown function of the component Shortcode Handler. Such manipulation of the argument before_list leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-12717. The attack can be launched remotely. No exploit exists.
A vulnerability labeled as problematic has been found in Cute News Ticker Plugin up to 1.0 on WordPress. This impacts the function Color of the component Shortcode Handler. The manipulation results in cross site scripting.
This vulnerability is identified as CVE-2025-13656. The attack can be executed remotely. There is not any exploit available.
A vulnerability has been found in Flex QR Code Generator Plugin up to 1.2.6 on WordPress and classified as critical. Affected is the function update_qr_code. Performing manipulation results in unrestricted upload.
This vulnerability is known as CVE-2025-12673. Remote exploitation of the attack is possible. No exploit is available.