A vulnerability was found in OWASP ModSecurity 2.9.8/2.9.10 and classified as critical. Affected by this issue is some unknown functionality of the component Empty XML Tag Handler. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2025-52891. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in MintyDocs Extension up to 1.39.x/1.42.x/1.43.1 on Mediawiki. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-53493. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in MintyDocs Extension up to 1.39.x/1.42.x/1.43.1 on Mediawiki. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-53492. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in TwoColConflict Extension up to 1.39.12/1.42.6/1.43.1 on Mediawiki. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-53494. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in sysadminsmedia homebox up to 0.20.0. This affects an unknown part of the component API Endpoint. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2025-53108. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in modelcontextprotocol server-filesystem. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2025-53110. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in modelcontextprotocol server-filesystem. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Model Context Protocol. The manipulation leads to link following.
This vulnerability is known as CVE-2025-53109. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in DataEase up to 2.10.10. It has been classified as critical. Affected is an unknown function. The manipulation of the argument socketfactory/socketfactoryarg/sslfactory/sslfactoryarg leads to improper neutralization of substitution characters.
This vulnerability is traded as CVE-2025-53006. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.33/6.14.9/6.15.0 and classified as problematic. This issue affects some unknown processing of the component arm64. The manipulation leads to privilege escalation.
The identification of this vulnerability is CVE-2025-38093. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.92/6.12.31/6.14.9 and classified as problematic. This vulnerability affects the function opinfo_get_list of the component ksmbd. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2025-38092. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.12.31/6.14.9. This affects an unknown part of the component AMD Display. The manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2025-38091. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Stamparm Maltrail up to 0.54 and classified as critical. Affected by this issue is the function subprocess.check_output of the file core/http.py. The manipulation of the argument Username leads to os command injection.
This vulnerability is handled as CVE-2025-34073. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Anthropic Slack MCP Server. It has been rated as problematic. This issue affects some unknown processing of the component unfurling. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2025-34072. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in pycode-browser up to 0.x. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file.
This vulnerability was named CVE-2015-0849. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linkwarden 2.10.2. Affected by this issue is some unknown functionality. The manipulation leads to file inclusion.
This vulnerability is handled as CVE-2025-49588. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.