A vulnerability marked as critical has been reported in itsourcecode Society Management System 1.0. Impacted is an unknown function of the file /admin/add_activity.php. Performing a manipulation of the argument Title results in sql injection.
This vulnerability is cataloged as CVE-2026-1118. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. It has been declared as critical. Affected is an unknown function in the library lib/refcount.c. Such manipulation leads to use after free.
This vulnerability is listed as CVE-2025-21796. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc1/6.14-rc2. The impacted element is the function usb_check_int_endpoints of the file usb.c. Such manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2025-21794. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. This affects the function nfsd4_shutdown_callback. Performing a manipulation results in state issue.
This vulnerability is cataloged as CVE-2025-21795. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. The impacted element is the function vxlan_vnigroup_init. This manipulation causes unchecked return value.
This vulnerability appears as CVE-2025-21790. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. The impacted element is the function l3mdev_l3_out. The manipulation leads to information disclosure.
This vulnerability is documented as CVE-2025-21791. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2. It has been rated as critical. The affected element is an unknown function of the component sn-f-ospi. This manipulation causes divide by zero.
This vulnerability is tracked as CVE-2025-21793. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. The affected element is the function ax25_release in the library lib/refcount.c. The manipulation results in improper update of reference count.
This vulnerability is reported as CVE-2025-21792. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.