A vulnerability labeled as critical has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. This affects the function mlx5e_netdev_change_profile. The manipulation results in null pointer dereference.
This vulnerability was named CVE-2026-23000. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. Affected by this issue is the function mlx5e_priv. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2026-22996. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. Affected by this vulnerability is the function j1939_xtp_rx_rts_session_active. Executing a manipulation can lead to improper update of reference count.
This vulnerability is handled as CVE-2026-22997. The attack can only be done within the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. It has been rated as critical. Affected is the function tegra_adma_terminate_all of the component Tegra ADMA Driver. Performing a manipulation results in use after free.
This vulnerability is known as CVE-2025-71162. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. It has been declared as critical. This impacts an unknown function of the component dmaengine. Such manipulation leads to memory leak.
This vulnerability is traded as CVE-2025-71163. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.18.6/6.19-rc5. It has been classified as critical. This affects the function xhci_sideband_remove_endpoint. This manipulation causes improper initialization.
This vulnerability appears as CVE-2026-23009. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.18.6/6.19-rc5 and classified as critical. The impacted element is the function rt6_uncached_list_del in the library lib/dump_stack.c of the component IPv4. The manipulation results in use after free.
This vulnerability is reported as CVE-2026-23004. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 and classified as critical. The affected element is the function qfq_change_class. The manipulation leads to allocation of resources.
This vulnerability is documented as CVE-2026-22999. The attack requires being on the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. Impacted is the function fpu_update_guest_xfd. Executing a manipulation can lead to state issue.
This vulnerability is registered as CVE-2026-23005. The attack requires access to the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. This issue affects the function nvmet_tcp_handle_h2c_data_pdu. Performing a manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2026-22998. The attack must originate from the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. This vulnerability affects the function inet6_addr_del of the component ipv6. Such manipulation leads to use after free.
This vulnerability is listed as CVE-2026-23010. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. This affects the function ipgre_header. This manipulation causes allocation of resources.
This vulnerability is tracked as CVE-2026-23011. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. Affected by this issue is the function skb_vlan_inet_prepare in the library include/net/inet_ecn.h of the component ip6_tunnel. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2026-23003. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5. Affected by this vulnerability is the function macvlan_forward_source. The manipulation leads to use after free.
This vulnerability is referenced as CVE-2026-23001. The attack needs to be initiated within the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in D-Link DCS700l 1.03.09. Affected is an unknown function of the file /setDayNightMode of the component Web Form Handler. Executing a manipulation of the argument LightSensorControl can lead to command injection.
The identification of this vulnerability is CVE-2026-1419. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability identified as problematic has been detected in Microvirt MEMU PLAY 3.7.0. This impacts an unknown function of the component MEmusvc Windows Service. Performing a manipulation results in unquoted search path.
This vulnerability was named CVE-2020-36937. The attack needs to be approached locally. In addition, an exploit is available.
A vulnerability categorized as problematic has been discovered in KMSpico Service KMSELDI 17.1.0.0. This affects an unknown function of the file C:\Program Files\KMSpico\Service_KMS.exe. Such manipulation leads to unquoted search path.
This vulnerability is uniquely identified as CVE-2020-36935. Local access is required to approach this attack. Moreover, an exploit is present.