A vulnerability classified as problematic has been found in GitLab Enterprise Edition up to 18.3.4/18.4.2/18.5.0. This issue affects some unknown processing of the component Description Handler. The manipulation leads to missing authorization.
This vulnerability is listed as CVE-2025-11989. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in GitLab Enterprise Edition up to 18.4.2/18.5.0. This vulnerability affects unknown code. Executing manipulation can lead to business logic errors.
This vulnerability is tracked as CVE-2025-6601. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in GitLab Community Edition and Enterprise Edition up to 18.3.4/18.4.2/18.5.0. This affects an unknown part of the component API Endpoint. Performing manipulation results in allocation of resources.
This vulnerability is identified as CVE-2025-11974. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in GitLab Community Edition and Enterprise Edition up to 18.3.4/18.4.2/18.5.0. Affected by this issue is some unknown functionality. Such manipulation leads to allocation of resources.
This vulnerability is referenced as CVE-2025-10497. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in GitLab Community Edition and Enterprise Edition up to 18.3.4/18.4.2/18.5.0. Affected by this vulnerability is an unknown functionality of the component JSON Handler. This manipulation causes allocation of resources.
The identification of this vulnerability is CVE-2025-11447. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in GitLab Enterprise Edition up to 18.3.4/18.4.2/18.5.0. Affected is an unknown function of the component Pipeline Execution Handler. The manipulation results in incorrect authorization.
This vulnerability was named CVE-2025-11971. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. The impacted element is the function governor_name. Executing manipulation can lead to null pointer dereference.
This vulnerability is tracked as CVE-2025-38609. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. It has been rated as critical. The impacted element is the function get_pd_power_uw of the component powercap. This manipulation causes null pointer dereference.
This vulnerability is registered as CVE-2025-38610. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.15.9/6.16.0. This affects the function can_jump of the file verifier.c of the component bpf. Such manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2025-38607. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. This vulnerability affects the function bpf_msg_pop_data of the component ktls. The manipulation leads to uninitialized pointer.
This vulnerability is traded as CVE-2025-38608. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.15.9/6.16.0. This issue affects the function ath12k_mac_handle_beacon_miss_iter of the component P2P Interface. Such manipulation leads to uninitialized pointer.
This vulnerability is listed as CVE-2025-38606. The attack must be carried out from within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.15.9/6.16.0. The affected element is the function ath12k_dp_tx_get_encap_type. Performing manipulation results in denial of service.
This vulnerability is identified as CVE-2025-38605. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0 and classified as critical. This vulnerability affects the function rtl8187_stop. Performing manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2025-38604. The attack can only be performed from the local network. There is not any exploit available.
The affected component should be upgraded.