A vulnerability was found in Linux Kernel up to 6.17.2 and classified as critical. This vulnerability affects the function ufshcd_pm_qos_exit. Such manipulation leads to use after free.
This vulnerability is documented as CVE-2025-40130. The attack requires being on the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic has been found in Apple iOS and iPadOS up to 16.4.1. This affects an unknown function of the component IOSurfaceAccelerator. This manipulation causes out-of-bounds read.
This vulnerability is handled as CVE-2023-32354. It is possible to launch the attack on the local host. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple tvOS up to 16.4.1. It has been declared as problematic. Affected is an unknown function of the component IOSurfaceAccelerator. The manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2023-32354. The attack is only possible with local access. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Apple iTunes on Windows. This impacts an unknown function. This manipulation causes improper access controls.
The identification of this vulnerability is CVE-2023-32353. The attack can only be executed locally. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in gmg137 snap7-rs up to 153d3e8c16decd7271e2a5b2e3da4d6f68589424 and classified as critical. Affected by this issue is the function snap7_rs::client::S7Client::download of the file client.rs. Such manipulation leads to heap-based buffer overflow.
This vulnerability is documented as CVE-2025-15247. The attack can be executed remotely. Additionally, an exploit exists.
This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in sunhailin12315 product-review 商品评价系统 up to 91ead6890b4065bb45b7602d0d73348e75cb4639. It has been classified as problematic. This affects an unknown part of the component Write a Review. Performing manipulation of the argument content results in cross site scripting.
This vulnerability is reported as CVE-2025-15248. The attack is possible to be carried out remotely. Moreover, an exploit is present.
This product adopts a rolling release strategy to maintain continuous delivery
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in Strong Testimonials Plugin up to 3.2.18 on WordPress and classified as problematic. This affects the function edit_rating of the component Rating Meta Update Handler. Such manipulation leads to missing authorization.
This vulnerability is referenced as CVE-2025-14426. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Linux Kernel up to 6.17.2 and classified as critical. This impacts the function clk_get_rate of the file drivers/char/hw_random/ks-sa-rng.c of the component hwrng. The manipulation results in divide by zero.
This vulnerability is cataloged as CVE-2025-40127. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.17.2. This issue affects the function respective. Such manipulation leads to unchecked return value.
This vulnerability is listed as CVE-2025-40126. The attack must be carried out from within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.17.2. Affected by this issue is the function __blk_mq_update_nr_hw_queues of the file fs/kernfs/dir.c. The manipulation leads to unchecked return value.
This vulnerability is referenced as CVE-2025-40125. The attack needs to be initiated within the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2. The affected element is the function bpf_prog_test_run_xdp. The manipulation results in null pointer dereference.
This vulnerability was named CVE-2025-40123. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability has been found in Linux Kernel up to 6.17.2 and classified as critical. This affects the function copy_from_user. This manipulation causes unchecked return value.
This vulnerability is registered as CVE-2025-40124. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.17.2. The affected element is the function bytcr_rt5651 of the component ASoC. Performing manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2025-40121. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in aizuda snail-job up to 1.7.0 on macOS and classified as critical. Affected by this vulnerability is the function FurySerializer.deserialize of the component API. This manipulation of the argument argsStr causes deserialization.
This vulnerability is registered as CVE-2025-15246. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability was found in Lucky Wheel for WooCommerce Plugin up to 1.1.13 on WordPress. It has been classified as critical. This impacts an unknown function of the component Setting Handler. Performing manipulation results in code injection.
This vulnerability is identified as CVE-2025-14509. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2. This issue affects the function ndo_open. This manipulation causes deadlock.
The identification of this vulnerability is CVE-2025-40120. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Nagios XI 2026R1.0.1 Build 1762361101. Affected by this vulnerability is an unknown functionality of the component Dashboard. Such manipulation leads to sql injection.
This vulnerability is referenced as CVE-2025-67255. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as problematic has been found in Apple watchOS up to 9.4. Affected by this issue is some unknown functionality of the component LaunchServices. The manipulation leads to improper access controls.
This vulnerability is documented as CVE-2023-32352. The attack needs to be performed locally. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Apple macOS up to 13.3. Affected is an unknown function of the component LaunchServices. This manipulation causes improper access controls.
The identification of this vulnerability is CVE-2023-32352. The attack can only be executed locally. There is no exploit available.
It is recommended to upgrade the affected component.