Currently trending CVE - Hype Score: 10 - Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem ...
A vulnerability was found in Oracle Java SE 11.0.7/14.0.1. It has been declared as problematic. Affected by this issue is some unknown functionality of the component Hotspot. The manipulation results in an unknown weakness.
This vulnerability is identified as CVE-2020-14573. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.4.257/5.10.194/5.15.131/6.1.53/6.5.3. It has been declared as critical. The impacted element is the function fc4_type. Such manipulation leads to race condition.
This vulnerability is listed as CVE-2023-53615. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.4.257/5.10.197/5.15.133/6.1.55/6.5.5. It has been classified as critical. Affected by this vulnerability is the function rds_rdma_cm_event_handler_cmn of the component rds. Performing manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2023-52573. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Microsoft Configuration Manager and Configuration Manager 2409. It has been classified as critical. This vulnerability affects unknown code. The manipulation leads to authentication bypass by spoofing.
This vulnerability is traded as CVE-2025-59501. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability described as problematic has been identified in FRRouting FRR up to 10.4.1. This impacts the function show_vty_ext_link_rmt_itf_addr of the file ospf_ext.c of the component OSPF Packet Handler. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2025-61101. The attack must originate from the local network. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.15.6. This vulnerability affects the function iio_info of the component HID Sensor Interface. Such manipulation leads to denial of service.
This vulnerability is listed as CVE-2025-38540. The attack must be carried out from within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.6.99/6.12.39/6.15.7. The impacted element is the function rtnl_lock of the component Genphy Driver. Executing manipulation can lead to deadlock.
The identification of this vulnerability is CVE-2025-38537. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. This affects the function probe of the component dmaengine. The manipulation of the argument chan[] leads to memory corruption.
This vulnerability is referenced as CVE-2025-38538. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7 and classified as critical. Affected by this vulnerability is the function lockdep_assert_held of the component tracing. Such manipulation leads to format string.
This vulnerability is listed as CVE-2025-38539. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.99/6.12.39/6.15.7. The affected element is the function wx_rx_buffer of the component net. Performing manipulation of the argument address results in use after free.
This vulnerability was named CVE-2025-38533. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. It has been classified as problematic. This impacts the function regulator_is_enabled of the file drivers/regulator/core.c. This manipulation causes state issue.
This vulnerability is registered as CVE-2025-38535. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.15.7. Impacted is an unknown function of the component netfs. This manipulation causes denial of service.
This vulnerability appears as CVE-2025-38534. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.7. It has been declared as critical. Affected is the function airoha_npu_get of the component net. Such manipulation leads to use after free.
This vulnerability is documented as CVE-2025-38536. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. This vulnerability affects the function aio_iiro_16 of the component comedi. The manipulation results in out-of-bounds read.
This vulnerability is known as CVE-2025-38529. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. This issue affects the function irq_bits of the component comedi. This manipulation causes out-of-bounds read.
This vulnerability is handled as CVE-2025-38530. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.99/6.12.39/6.15.7 and classified as problematic. This affects the function do_reset of the file net/core/skbuff.c. The manipulation results in improper initialization.
This vulnerability is cataloged as CVE-2025-38532. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. This affects the function bpf_trace_printk in the library lib/vsprintf.c of the component bpf. The manipulation of the argument fmt[] results in format string.
This vulnerability was named CVE-2025-38528. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.