A vulnerability was found in Xen. It has been rated as critical. Impacted is an unknown function. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2025-58144. The attack must be carried out from within the local network. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability categorized as problematic has been discovered in Xen. The affected element is an unknown function of the component P2M Lock. The manipulation results in privilege escalation.
This vulnerability is cataloged as CVE-2025-58145. The attack must originate from the local network. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability, which was classified as critical, was found in Zabbix Agent 2 smartctl Plugin up to 6.0.39/7.0.10/7.2.4. This vulnerability affects unknown code of the component Parameter Handler. The manipulation of the argument smart.disk.get results in command injection.
This vulnerability is identified as CVE-2025-27233. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.16-rc2. The impacted element is the function do_exit of the component perf. Executing manipulation can lead to stack-based buffer overflow.
This vulnerability appears as CVE-2025-38424. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability labeled as problematic has been found in Google Android. Affected is an unknown function. Such manipulation leads to cleartext transmission of sensitive information.
This vulnerability is referenced as CVE-2023-21219. It is possible to launch the attack remotely. No exploit is available.
It is best practice to apply a patch to resolve this issue.
A vulnerability labeled as problematic has been found in Google Android 13.0. Affected by this vulnerability is the function addGroupWithConfigInternal of the file p2p_iface.cpp. Executing manipulation can lead to out-of-bounds read.
This vulnerability is handled as CVE-2023-21214. It is possible to launch the attack on the local host. There is not any exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in Google Android 13.0 and classified as problematic. Impacted is the function initiateTdlsTeardownInternal of the file sta_iface.cpp. Executing manipulation can lead to out-of-bounds read.
This vulnerability is registered as CVE-2023-21213. The attack needs to be launched locally. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability categorized as problematic has been discovered in Google Android 13.0. This impacts an unknown function. Such manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2023-21211. An attack has to be approached locally. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability identified as problematic has been detected in Google Android 13.0. Affected is an unknown function of the component Wifi Server. Performing manipulation results in out-of-bounds read.
This vulnerability is known as CVE-2023-21212. Attacking locally is a requirement. No exploit is available.
Applying a patch is the recommended action to fix this issue.
The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations' Salesforce environments to steal data and extort victims. [...]
A vulnerability, which was classified as critical, has been found in Zabbix Agent 2 smartctl Plugin up to 5.0.46. This affects an unknown part of the file smart.disk.get of the component Parameter Handler. The manipulation leads to os command injection.
This vulnerability is referenced as CVE-2025-27234. The attack needs to be initiated within the local network. No exploit is available.
A vulnerability categorized as problematic has been discovered in MailEnable 6.5. The affected element is an unknown function. The manipulation results in cross site scripting.
This vulnerability is reported as CVE-2012-2588. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability categorized as problematic has been discovered in IBM WebSphere MQ 7.0.3/7.0.4. Affected is an unknown function. Such manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2012-2206. The attack can be launched remotely. Moreover, an exploit is present.
It is advisable to implement a patch to correct this issue.
A vulnerability identified as problematic has been detected in IOServer 1.0.18.0. This impacts an unknown function. Performing manipulation results in path traversal.
This vulnerability is reported as CVE-2012-4680. The attack is possible to be carried out remotely. Moreover, an exploit is present.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in IBM Ds4100 1724. The impacted element is an unknown function of the file ModuleServlet.do. The manipulation of the argument selectedModuleOnly leads to sql injection.
This vulnerability is traded as CVE-2012-2171. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is suggested to upgrade the affected component.
A vulnerability identified as problematic has been detected in IBM WebSphere MQ 7.0.3/7.0.4/7.5. Affected by this vulnerability is an unknown functionality. Performing manipulation results in cross-site request forgery.
This vulnerability was named CVE-2012-3294. The attack may be initiated remotely. In addition, an exploit is available.
Applying a patch is the recommended action to fix this issue.