A vulnerability classified as critical has been found in Linux Kernel up to 6.6.121/6.12.67/6.18.7/6.19-rc6. This impacts the function isolate_err_threshold_read of the component uacce. This manipulation causes denial of service.
This vulnerability is tracked as CVE-2026-23094. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in adonisjs up to 10.1.2/11.0.0-next.8. It has been rated as critical. Affected is an unknown function of the component Multipart Form Handler. This manipulation causes improperly controlled modification of object prototype attributes.
This vulnerability is tracked as CVE-2026-25754. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, was found in denpiligrim 3dp-manager up to 2.0.1. This affects an unknown function of the component Setting Handler. Executing a manipulation can lead to hard-coded credentials.
This vulnerability is handled as CVE-2026-25803. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability has been found in adonisjs up to 10.1.2/11.0.0-next.8 and classified as problematic. This impacts an unknown function of the component bodyparser. The manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2026-25762. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in My-Little-Forum mylittleforum 2.5.12 and classified as critical. Affected by this vulnerability is an unknown functionality of the component phar Protocol Handler. The manipulation results in unrestricted upload.
This vulnerability was named CVE-2026-25923. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in langchain-ai langchain up to 1.2.10 and classified as critical. This impacts the function ChatOpenAI.get_num_tokens_from_messages of the component Image Parser. Such manipulation of the argument image_url leads to server-side request forgery.
This vulnerability is listed as CVE-2026-26013. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Microcom ZeusWeb 6.1.31. The impacted element is an unknown function of the component My Account Page. This manipulation of the argument Name/Surname causes cross site scripting.
This vulnerability is handled as CVE-2025-13648. The attack can be initiated remotely. There is not any exploit available.
A vulnerability, which was classified as problematic, was found in Microcom ZeusWeb 6.1.31. This affects an unknown function of the component Recover Password. Such manipulation of the argument Email leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-13649. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Linux Kernel up to 6.18.7. It has been rated as critical. This affects the function ath12k_mac_op_flush of the component wifi. Performing a manipulation results in race condition.
This vulnerability is identified as CVE-2026-23130. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Linux Kernel up to 6.6.121/6.12.67/6.18.7. Affected by this issue is the function hp_init_bios_buffer_attribute in the library lib/kobject.c. The manipulation results in buffer overflow.
This vulnerability is known as CVE-2026-23131. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.18.7/6.19-rc6. This affects the function dma_unmap_sg of the component ksmbd. This manipulation causes privilege escalation.
This vulnerability is handled as CVE-2026-23093. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 6.6.54/6.10.13/6.11.2. Impacted is the function ath12k_dp_rx_process of the component wifi. Executing a manipulation can lead to out-of-bounds read.
This vulnerability is tracked as CVE-2024-49931. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.11.2. This issue affects the function ath11k_dp_process_rx of the component wifi. Performing a manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2024-49930. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.11.2. The affected element is an unknown function in the library include/linux/scatterlist.h of the component btrfs. Performing a manipulation results in allocation of resources.
This vulnerability is cataloged as CVE-2024-49932. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.6.54/6.10.13/6.11.2. This vulnerability affects the function iwl_mvm_tx_skb_sta of the component iwlwifi. Such manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2024-49929. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.13/6.11.2. It has been rated as problematic. This affects an unknown part of the component rtw89. This manipulation causes out-of-bounds read.
The identification of this vulnerability is CVE-2024-49928. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in Qool CMS 2.0. Affected is the function addnewtype/addnewdatafield/addmenu/addusergroup/addnewuserfield/adduser/addgeneraldata/addcontentitem of the component POST Parameter Handler. This manipulation causes cross site scripting.
This vulnerability appears as CVE-2013-20006. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability described as problematic has been identified in Raytha CMS up to 1.4.5. The affected element is an unknown function. The manipulation of the argument backToListUrl results in cross site scripting.
This vulnerability was named CVE-2025-69242. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.