A vulnerability was found in Linux Kernel. It has been classified as problematic. Impacted is the function xsk_rcv_check. Performing manipulation results in race condition.
This vulnerability is cataloged as CVE-2025-37920. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.12.27/6.14.5/6.15-rc4. It has been classified as critical. Affected by this vulnerability is the function ksmbd_session_rpc_open. This manipulation causes use after free.
This vulnerability is tracked as CVE-2025-37926. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.6.89/6.12.27/6.14.5/6.15-rc4. It has been declared as critical. The affected element is an unknown function of the component book3s64. Executing manipulation can lead to null pointer dereference.
This vulnerability is registered as CVE-2025-37922. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. This issue affects some unknown processing of the file /search.php of the component GET Parameter Handler. Performing manipulation of the argument Search results in denial of service.
This vulnerability was named CVE-2025-5404. The attack needs to be approached within the local network. In addition, an exploit is available.
This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Impacted is an unknown function of the file /post.php. Executing manipulation of the argument comment_author/comment_email/comment_content can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-5405. The attack may be launched remotely. Furthermore, there is an exploit available.
This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability labeled as critical has been found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Affected by this issue is some unknown functionality of the file /post.php of the component GET Parameter Handler. The manipulation of the argument p_id results in sql injection.
This vulnerability is known as CVE-2025-5401. It is possible to launch the attack remotely. Furthermore, an exploit is available.
This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability marked as critical has been reported in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. This affects an unknown part of the file /admin/includes/edit_post.php of the component GET Parameter Handler. This manipulation of the argument edit_post_id causes sql injection.
This vulnerability is handled as CVE-2025-5402. The attack can be initiated remotely. Additionally, an exploit exists.
Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as critical has been identified in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. This vulnerability affects unknown code of the file /admin/view_all_posts.php of the component GET Parameter Handler. Such manipulation of the argument post_id leads to sql injection.
This vulnerability is uniquely identified as CVE-2025-5403. The attack can be launched remotely. Moreover, an exploit is present.
This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability identified as critical has been detected in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Affected by this vulnerability is an unknown functionality of the file /user.php of the component GET Parameter Handler. The manipulation of the argument u_id leads to sql injection.
This vulnerability is traded as CVE-2025-5400. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in Linux Kernel up to 6.1.137/6.6.89/6.12.27/6.14.5/6.15-rc4 and classified as problematic. This impacts the function vxlan_core of the file drivers/net/vxlan/vxlan_core.c. The manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2025-37921. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.15-rc4. It has been classified as problematic. This affects the function trace_seq_to_buffer of the file kernel/trace/trace.c of the component tracing. This manipulation causes out-of-bounds read.
This vulnerability is registered as CVE-2025-37923. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.1.137/6.6.89/6.12.27/6.14.5/6.15-rc4. It has been rated as critical. The impacted element is the function ksmbd_free_user. The manipulation leads to use after free.
This vulnerability is documented as CVE-2025-37924. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Linux Kernel up to 6.15-rc4. This issue affects the function parse_ivrs_acpihid. The manipulation results in buffer overflow.
This vulnerability is known as CVE-2025-37927. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.137/6.6.89/6.12.27/6.14.5/6.15-rc4. This affects the function in_atomic of the file drivers/md/dm-bufio.c. The manipulation results in buffer overflow.
This vulnerability is reported as CVE-2025-37928. The attacker must have access to the local network to execute the attack. Moreover, an exploit is present.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to ed681e90fb244aa883b918c4d8be2614e816c6df. This impacts the function spectre_bhb_loop_affected of the component arm64. This manipulation causes denial of service.
This vulnerability appears as CVE-2025-37929. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.15-rc4. Impacted is the function nouveau_fence_context_kill. This manipulation causes information disclosure.
This vulnerability is handled as CVE-2025-37930. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.0.7. It has been declared as problematic. This impacts the function kvm_gfn_to_pfn_cache_init of the component KVM. The manipulation results in improper initialization.
This vulnerability is reported as CVE-2022-49884. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 5.10.154/5.15.78/6.0.8. Affected by this vulnerability is the function of_reserved_mem_lookup of the component riscv. Such manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2022-49851. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.