A vulnerability described as problematic has been identified in Linux Kernel up to 6.12.34/6.15.3/6.16-rc2. The affected element is the function smb_extract_folioq_to_rdma of the component SMB Client. Executing manipulation can lead to out-of-bounds read.
The identification of this vulnerability is CVE-2025-38179. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.15.3. The impacted element is the function p54_rx_eeprom_readback of the component wifi. Executing manipulation can lead to buffer overflow.
This vulnerability is tracked as CVE-2025-38348. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.137/6.6.89/6.12.27/6.14.5. It has been declared as problematic. Affected by this vulnerability is the function hfsc_qlen_notify of the component sch_hfsc. Executing manipulation can lead to privilege escalation.
This vulnerability appears as CVE-2025-38177. The attacker needs to be present on the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.15.3 and classified as critical. Impacted is the function ftrace_mod_get_kallsym of the component ftrace. Performing manipulation results in memory corruption.
This vulnerability is cataloged as CVE-2025-38346. The attack must originate from the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.94/6.12.34/6.15.3. The affected element is the function hung_task_timeout_secs of the file /proc/sys/kernel/hung_task_timeout_secs of the component f2fs. Performing manipulation results in deadlock.
This vulnerability is identified as CVE-2025-38347. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Autodesk AutoCAD and Maya. This vulnerability affects unknown code in the library pskernel.dll of the component File Handler. Such manipulation leads to memory corruption.
This vulnerability is documented as CVE-2023-29068. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as problematic was found in JFinalCMS 5.0.0. This affects an unknown function of the file admin/nav/delete. The manipulation results in cross-site request forgery.
This vulnerability is reported as CVE-2023-49448. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability, which was classified as problematic, has been found in CONPROSYS HMI System up to 3.5.2. The impacted element is an unknown function. This manipulation causes missing encryption of sensitive data.
This vulnerability appears as CVE-2023-28713. The attack requires local access. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Openfind Mail2000. It has been declared as problematic. This impacts an unknown function of the component Email Content Handler. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2023-28705. The attack may be performed from remote. There is no available exploit.
A vulnerability classified as critical has been found in Elite Technology Web Fax. This affects an unknown part of the component Login Page. This manipulation causes sql injection.
This vulnerability is handled as CVE-2023-28701. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as critical was found in Asus RT-AC86U. This vulnerability affects unknown code of the component Web URL Handler. Such manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2023-28702. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as critical, has been found in Asus RT-AC86. This issue affects some unknown processing of the component Network Packet Handler. Performing manipulation results in out-of-bounds write.
This vulnerability was named CVE-2023-28703. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in UGREEN DH2100+ up to 5.3.0.251125. It has been rated as critical. This impacts the function handler_file_backup_create of the file /v1/file/backup/create of the component nas_svr. The manipulation of the argument path leads to command injection.
This vulnerability is uniquely identified as CVE-2025-14188. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in Furbo Dog Camera. Impacted is an unknown function of the component Device Log Management. Executing manipulation can lead to command injection.
The identification of this vulnerability is CVE-2023-28704. The attack may be launched remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in Chanjet CRM up to 20251121. Affected is an unknown function of the file /tools/jxf_dump_table_demo.php. The manipulation of the argument gblOrgID results in sql injection.
This vulnerability was named CVE-2025-14189. The attack may be performed from remote. In addition, an exploit is available.
Applying restrictive firewalling is recommended.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability identified as critical has been detected in Chanjet TPlus up to 20251121. Affected by this vulnerability is an unknown functionality of the file /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load. This manipulation of the argument currentAccId causes sql injection.
The identification of this vulnerability is CVE-2025-14190. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is advisable to implement restrictive firewalling.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability labeled as critical has been found in UTT 进取 512W up to 1.7.7-171114. Affected by this issue is the function strcpy of the file /goform/formP2PLimitConfig. Such manipulation of the argument except leads to buffer overflow.
This vulnerability is referenced as CVE-2025-14191. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.