A vulnerability marked as problematic has been reported in Adobe Substance 3D Stager up to 2.0.0. This impacts an unknown function. The manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2023-25875. The attack must be carried out locally. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in Adobe Substance 3D Stager up to 2.0.0. Affected is an unknown function. The manipulation results in out-of-bounds read.
This vulnerability is cataloged as CVE-2023-25876. The attack must be initiated from a local position. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in Adobe Substance 3D Stager up to 2.0.0. Affected by this vulnerability is an unknown functionality. This manipulation causes out-of-bounds read.
This vulnerability is registered as CVE-2023-25877. The attack needs to be launched locally. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Adobe Substance 3D Stager up to 2.0.0. Affected by this issue is some unknown functionality. Such manipulation leads to out-of-bounds read.
This vulnerability is documented as CVE-2023-25878. The attack needs to be performed locally. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical was found in Adobe Substance 3D Stager up to 2.0.0. This issue affects some unknown processing. Executing manipulation can lead to heap-based buffer overflow.
This vulnerability is registered as CVE-2023-25874. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Adobe Substance 3D Stager up to 2.0.0 and classified as problematic. This affects an unknown function of the component File Handler. Such manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2023-25873. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Adobe Substance 3D Stager up to 2.0.0. This vulnerability affects unknown code. Performing manipulation results in heap-based buffer overflow.
This vulnerability is cataloged as CVE-2023-25872. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.15.2. Impacted is the function has_locked_children of the file fs/fhandle.c. This manipulation causes improper update of reference count.
This vulnerability is registered as CVE-2025-38306. The attack requires access to the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.16-rc1. It has been classified as critical. This impacts the function ptp_vclock_in_use of the component ptp. The manipulation leads to deadlock.
This vulnerability is traded as CVE-2025-38305. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.12.33/6.15.2/6.16-rc1. It has been declared as critical. This issue affects the function submit_bio_noacct_nocheck of the component block. Such manipulation leads to deadlock.
This vulnerability is uniquely identified as CVE-2025-38302. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.141/6.6.93/6.12.33/6.15.2/6.16-rc1. The affected element is the function eir_get_service_data of the component Bluetooth. Such manipulation of the argument len leads to null pointer dereference.
This vulnerability is documented as CVE-2025-38304. The attack requires being on the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.33/6.15.2/6.16-rc1. This vulnerability affects the function eir_create_adv_data of the component Bluetooth. The manipulation leads to denial of service.
This vulnerability is listed as CVE-2025-38303. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.12.33/6.15.2. Affected by this issue is the function COMP_DUMMY of the component ASoC. Performing manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2025-38299. The attack can only be performed from the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in Linux Kernel up to 6.1.141/6.6.93/6.12.33/6.15.2. This affects the function sun8i_ce_cipher_prepare. Executing manipulation can lead to allocation of resources.
This vulnerability is tracked as CVE-2025-38300. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.12.33/6.15.2. It has been classified as critical. This vulnerability affects the function zynqmp_nvmem of the component nvmem. This manipulation of the argument context causes null pointer dereference.
This vulnerability is handled as CVE-2025-38301. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability labeled as problematic has been found in Linux Kernel up to 32700ecf8007e071d1ce4c78f65b85f46d05f32a. Affected by this vulnerability is the function adxl_put of the component ADXL Component. Such manipulation of the argument adxl_component_count leads to out-of-bounds read.
This vulnerability is referenced as CVE-2025-38298. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability labeled as critical has been found in fushengqian fuint up to 41e26be8a2c609413a0feaa69bdad33a71ae8032. Affected by this issue is some unknown functionality of the file fuint-application/src/main/java/com/fuint/module/clientApi/controller/ClientSignController.java of the component Authentication Token Handler. Such manipulation leads to authorization bypass.
This vulnerability is traded as CVE-2025-12623. The attack may be launched remotely. Furthermore, there is an exploit available.
This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
A vulnerability identified as critical has been detected in Tenda AC10 16.03.10.13. Affected by this vulnerability is the function formSysRunCmd of the file /goform/SysRunCmd. This manipulation of the argument getui causes buffer overflow.
This vulnerability appears as CVE-2025-12622. The attack may be initiated remotely. In addition, an exploit is available.