A vulnerability was found in Xen. It has been rated as critical. Impacted is an unknown function. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2025-58144. The attack must be carried out from within the local network. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability categorized as problematic has been discovered in Xen. The affected element is an unknown function of the component P2M Lock. The manipulation results in privilege escalation.
This vulnerability is cataloged as CVE-2025-58145. The attack must originate from the local network. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability, which was classified as critical, was found in Zabbix Agent 2 smartctl Plugin up to 6.0.39/7.0.10/7.2.4. This vulnerability affects unknown code of the component Parameter Handler. The manipulation of the argument smart.disk.get results in command injection.
This vulnerability is identified as CVE-2025-27233. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.16-rc2. The impacted element is the function do_exit of the component perf. Executing manipulation can lead to stack-based buffer overflow.
This vulnerability appears as CVE-2025-38424. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability labeled as problematic has been found in Google Android. Affected is an unknown function. Such manipulation leads to cleartext transmission of sensitive information.
This vulnerability is referenced as CVE-2023-21219. It is possible to launch the attack remotely. No exploit is available.
It is best practice to apply a patch to resolve this issue.