A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.133/6.6.86/6.12.22/6.13.10/6.14.1. This vulnerability affects the function regulator_bulk_get. Performing manipulation results in denial of service.
This vulnerability is reported as CVE-2025-22095. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.13.10/6.14.1. It has been classified as critical. The affected element is the function vpa_pmu of the component powerpc. The manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2025-22094. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.6.87/6.12.24/6.14.3/6.15-rc2. The impacted element is the function avs_component_probe of the component ASoC. Executing manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2025-37793. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.6.86/6.12.22/6.13.10/6.14.1. Impacted is the function copy_page_range of the component VM_PAT Handler. Performing manipulation results in information disclosure.
This vulnerability is known as CVE-2025-22090. Access to the local network is required for this attack. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.87/6.12.24/6.14.3/6.15-rc2 and classified as critical. Impacted is the function dsa_tree_setup. The manipulation results in use after free.
This vulnerability was named CVE-2025-37786. The attack needs to be approached within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.134/6.6.87/6.12.24/6.14.3/6.15-rc2 and classified as critical. This affects the function devlink_region_destroy of the component Net. Such manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-37787. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.134/6.6.87/6.12.24/6.14.3/6.15-rc2. Impacted is the function ieee80211_do_stop of the component wifi. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2025-37794. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Ghost Robotics Vision 60 0.27.2. It has been declared as critical. This issue affects some unknown processing of the component MAVLink Interface. Such manipulation leads to improper authentication.
This vulnerability is referenced as CVE-2025-41108. It is possible to launch the attack remotely. No exploit is available.
A vulnerability categorized as critical has been discovered in Ghost Robotics Vision 60 0.27.2. The affected element is an unknown function. Executing manipulation can lead to hard-coded credentials.
This vulnerability is tracked as CVE-2025-41109. The attack is only possible within the local network. No exploit exists.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.134/6.6.87/6.12.24/6.14.3/6.15-rc2. Impacted is the function at76_disconnect of the component Wifi. The manipulation leads to use after free.
This vulnerability is traded as CVE-2025-37796. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability marked as problematic has been reported in Status Tracker Energy CRM 2025. The impacted element is an unknown function of the file /crm/create_job_submit.php of the component Query Handler. Performing manipulation of the argument JobCreatedBy results in cross site scripting.
This vulnerability is known as CVE-2025-40643. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability was found in Zucchetti Ad Hoc Infinity up to 4.2. It has been declared as problematic. Affected by this issue is some unknown functionality of the file /ahi/jsp/gsfr_feditorHTML.jsp. The manipulation of the argument pHtmlSource results in cross site scripting.
This vulnerability is reported as CVE-2025-52180. The attack can be launched remotely. No exploit exists.
A vulnerability identified as problematic has been detected in IBM Concert Software up to 2.0.0. This vulnerability affects unknown code. The manipulation leads to improper clearing of heap memory before release.
This vulnerability is documented as CVE-2025-36083. The attack needs to be performed locally. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in SonicWall SMA100. The affected element is an unknown function. Performing manipulation results in sensitive information in log files.
This vulnerability is known as CVE-2025-40603. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability, which was classified as problematic, has been found in Rank Math SEO Plugin up to 1.0.252.1 on WordPress. Affected by this issue is some unknown functionality. This manipulation causes insertion of sensitive information into sent data.
This vulnerability appears as CVE-2025-64351. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as critical, was found in WPDeveloper Essential Addons for Elementor Plugin up to 6.2.4 on WordPress. This affects an unknown part. Such manipulation leads to missing authorization.
This vulnerability is traded as CVE-2025-64352. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Chouby Polylang Plugin up to 3.7.3 on WordPress and classified as critical. This issue affects some unknown processing. Executing manipulation can lead to deserialization.
This vulnerability is handled as CVE-2025-64353. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as problematic, has been found in BEO Atlas Einfuhr Ausfuhr 3.0. The impacted element is an unknown function. The manipulation of the argument Password leads to cross site scripting.
This vulnerability is documented as CVE-2025-61427. The attack can be initiated remotely. There is not any exploit available.