A vulnerability categorized as problematic has been discovered in Demo Importer Plus Plugin up to 2.0.9/8.0 on WordPress. The affected element is an unknown function of the component SVG File Parser. The manipulation results in xml external entity reference.
This vulnerability is reported as CVE-2025-14478. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in PAYGENT for WooCommerce Plugin up to 2.4.6 on WordPress and classified as problematic. The affected element is the function paygent_check_webhook of the file /wp-json/paygent/v1/check/ of the component Payment Call Handler. The manipulation results in missing authorization.
This vulnerability was named CVE-2025-14078. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in Integrate Dynamics 365 CRM Plugin up to 1.1.1 on WordPress. It has been declared as problematic. This affects an unknown function of the component Setting Handler. Such manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2026-0725. It is possible to launch the attack remotely. No exploit is available.
A vulnerability labeled as problematic has been found in Open5GS up to 2.7.6. This affects the function sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request of the file /src/sgwc/s11-handler.c. Executing a manipulation can lead to reachable assertion.
This vulnerability is handled as CVE-2025-15530. The attack can be executed remotely. Additionally, an exploit exists.
The issue report is flagged as already-fixed.
A vulnerability was found in CubeWP Plugin up to 1.1.26 on WordPress. It has been classified as problematic. The impacted element is the function cubewp_shortcode_taxonomy of the component Shortcode Handler. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2025-8615. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in Linux Kernel up to 6.18.2. This issue affects the function name_size. The manipulation results in memory corruption.
This vulnerability is cataloged as CVE-2025-68792. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.159/6.12.63/6.18.2/6.19-rc2. The impacted element is the function nfsd_create_setattr of the component NFSv4. Performing a manipulation results in privilege escalation.
This vulnerability is reported as CVE-2025-68803. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability marked as problematic has been reported in Open5GS up to 2.7.5. This vulnerability affects the function sgwc_bearer_add of the file src/sgwc/context.c. The manipulation leads to reachable assertion.
This vulnerability is uniquely identified as CVE-2025-15531. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The issue report is flagged as already-fixed.
A vulnerability was found in Linux Kernel up to 6.6.77/6.12.13/6.13.2. It has been classified as critical. Affected is the function fwnode_handle_put. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2024-58003. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.12.13/6.13.2 and classified as problematic. Affected by this issue is the function list_add of the component ipu6. The manipulation results in out-of-bounds write.
This vulnerability is reported as CVE-2024-58004. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.13.1. This issue affects the function array_index_nospec. Performing a manipulation results in infinite loop.
This vulnerability is reported as CVE-2024-58000. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.13/6.13.2 and classified as critical. This impacts the function release of the component File Descriptor Handler. Executing a manipulation can lead to uncontrolled file descriptor consumption.
This vulnerability appears as CVE-2024-58002. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. Affected is an unknown function of the component ocfs2. Executing a manipulation can lead to symlink following.
This vulnerability is registered as CVE-2024-58001. The attack needs to be launched locally. No exploit is available.
You should upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.12.12/6.13.1. Affected by this issue is some unknown functionality. The manipulation results in insufficient verification of data authenticity.
This vulnerability was named CVE-2024-57999. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability marked as problematic has been reported in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. This issue affects the function wcn->chan_survey. This manipulation causes improper initialization.
This vulnerability appears as CVE-2024-57997. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.6.75/6.12.12/6.13.1. This vulnerability affects the function _read_freq. Such manipulation leads to buffer overflow.
This vulnerability is documented as CVE-2024-57998. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.13.1. This affects the function ath12k_mac_assign_vif_to_vdev. This manipulation causes use after free.
This vulnerability is registered as CVE-2024-57995. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.