A vulnerability identified as critical has been detected in SourceCodester Best House Rental Management System 1.0. This impacts the function login2 of the file /admin_class.php. Performing manipulation of the argument Username results in sql injection.
This vulnerability is reported as CVE-2025-12208. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability categorized as problematic has been discovered in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-12207. The attack needs to be performed locally. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Kamailio 5.5. It has been rated as problematic. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference.
This vulnerability is registered as CVE-2025-12206. The attack needs to be launched locally. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Kamailio 5.5. It has been declared as problematic. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-12205. The attack must be initiated from a local position. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Kamailio 5.5. It has been classified as problematic. Impacted is the function rve_destroy of the file src/core/rvalue.c of the component Configuration File Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is listed as CVE-2025-12204. The attack must be carried out locally. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in Oracle Product Hub up to 12.2.14. This vulnerability affects unknown code of the component Item Catalog. Such manipulation leads to improper authorization.
This vulnerability is documented as CVE-2025-53043. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability classified as critical has been found in Oracle Scripting up to 12.2.14. This vulnerability affects unknown code of the component Miscellaneous. This manipulation causes open redirect.
This vulnerability is tracked as CVE-2025-61753. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Red Hat Enterprise Linux and OpenShift Container Platform. It has been classified as problematic. Impacted is the function exsltFuncResultComp of the component XML Document Handler. Performing manipulation results in type confusion.
This vulnerability is cataloged as CVE-2025-11731. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.48/6.16.8. This affects the function io_link_skb of the component io_uring. The manipulation results in incorrect comparison.
This vulnerability is known as CVE-2025-39963. Access to the local network is required for this attack. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability has been found in TOTOLINK N150RT 3.4.0-B20190525 and classified as critical. The affected element is an unknown function of the file /boafrm/formPortFw. The manipulation of the argument service_type leads to buffer overflow.
This vulnerability is listed as CVE-2025-3988. The attack may be initiated remotely. In addition, an exploit is available.