Exploitation of CVE-2025-42957 requires "minimal effort" and can result in a complete compromise of the SAP system and host OS, according to researchers.
Experts warn of an actively exploited vulnerability, tracked as CVE-2025-42957 (CVSS score: 9.9), in SAP S/4HANA software. A critical command injection vulnerability, tracked as CVE-2025-42957 (CVSS score of 9.9), in SAP S/4HANA is under active exploitation. An attacker can exploit this flaw to fully compromise SAP systems, altering databases, creating superuser accounts, and stealing password hashes. “SAP […]
A vulnerability was found in Linux Kernel up to 6.6.102/6.12.43/6.16.3 and classified as critical. Affected by this issue is the function mei_cldev_disable of the file drivers/misc/mei/client.c. Such manipulation leads to use after free.
This vulnerability is listed as CVE-2025-39711. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.16.3 and classified as critical. Affected by this vulnerability is the function rain_interrupt of the component media. This manipulation causes race condition.
This vulnerability is tracked as CVE-2025-39713. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in ExpressTech Systems Quiz and Survey Master Plugin up to 10.2.5 on WordPress. Affected is an unknown function. The manipulation results in deserialization.
This vulnerability is identified as CVE-2025-49401. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in arcinfo PcVue up to 12.0.30/15.2.11/16.3.0. It has been declared as problematic. This impacts an unknown function of the component Message Handler. The manipulation leads to improper verification of source of a communication channel.
This vulnerability is referenced as CVE-2025-9999. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Nordic Semiconductor nRF52810. It has been classified as critical. This affects an unknown function. Executing manipulation can lead to on-chip debug and test interface with improper access control.
The identification of this vulnerability is CVE-2025-9709. The physical device can be targeted for the attack. There is no exploit available.
A vulnerability was found in arcinfo PcVue up to 12.0.30/15.2.11/16.3.0 and classified as problematic. The impacted element is an unknown function of the component Messages Handler. Performing manipulation results in improper check for unusual conditions.
This vulnerability was named CVE-2025-9998. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability has been found in Google Android 16 and classified as critical. The affected element is an unknown function. Such manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2025-32318. The attack can be launched remotely. No exploit exists.
A patch should be applied to remediate this issue.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.148/6.6.102/6.12.43/6.16.3/6.17-rc2. Impacted is an unknown function. This manipulation causes privilege escalation.
This vulnerability is handled as CVE-2025-39694. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.148/6.6.102/6.12.43/6.16.3. This issue affects the function skb_put. The manipulation results in buffer overflow.
This vulnerability is known as CVE-2025-39718. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability classified as critical was found in Linux Kernel up to 6.16.3. This vulnerability affects the function vb2_is_busy of the component media. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2025-39714. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.16.3. This affects an unknown part of the component media. Executing manipulation can lead to out-of-bounds read.
This vulnerability appears as CVE-2025-39710. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.12.43/6.16.3. Affected by this issue is the function mt9m114_ifp_get_frame_interval of the component driver. Performing manipulation results in deadlock.
This vulnerability is reported as CVE-2025-39712. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.148/6.6.102/6.12.43/6.16.3. Affected by this vulnerability is the function __get_user. Such manipulation leads to incorrect comparison.
This vulnerability is documented as CVE-2025-39716. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.148/6.6.102/6.12.43/6.16.3. It has been classified as critical. Affected is an unknown function of the component LWS Call Handler. This manipulation causes incorrect comparison.
This vulnerability is registered as CVE-2025-39715. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.16.3/6.17-rc2 and classified as critical. This impacts the function can_idmap_mount. The manipulation results in missing initialization of a variable.
This vulnerability is cataloged as CVE-2025-39717. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.43/6.16.3/6.17-rc2 and classified as critical. This affects the function relocate_lowcore. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2025-38733. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in RealMag777 InPost Gallery Plugin up to 2.1.4.5 on WordPress. The impacted element is an unknown function. Executing manipulation can lead to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is tracked as CVE-2025-57889. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as problematic, has been found in gavias Indutri Plugin up to 1.2.x on WordPress. The affected element is an unknown function. Performing manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is identified as CVE-2025-58214. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.