A vulnerability has been found in Linux Kernel up to 6.17.8 and classified as critical. This affects the function of_genpd_add_provider_onecell of the component pmdomain. This manipulation causes memory leak.
This vulnerability is registered as CVE-2025-68204. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.12.58/6.17.8. It has been rated as problematic. This vulnerability affects unknown code of the component guc. Performing a manipulation results in resource consumption.
This vulnerability is known as CVE-2025-68207. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.17.8 and classified as critical. This vulnerability affects the function nf_nat_setup_info. Such manipulation leads to state issue.
This vulnerability is documented as CVE-2025-68206. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.17.8 and classified as critical. Affected by this vulnerability is the function build_controls of the component HDMI Codec Driver. This manipulation causes improper initialization.
This vulnerability is tracked as CVE-2025-68205. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.12.58/6.17.8. This impacts the function scx_dump_state of the component sched_ext. Such manipulation leads to deadlock.
This vulnerability is uniquely identified as CVE-2025-68202. The attack can only be initiated within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.12.58/6.17.8 and classified as critical. Affected by this issue is some unknown functionality of the component amdgpu. Such manipulation leads to privilege escalation.
This vulnerability is listed as CVE-2025-68201. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.15.196/6.1.158/6.6.116/6.12.58/6.17.8 and classified as critical. Affected is the function bpf_prog_run_data_pointers of the file net/core/skbuff.c of the component bpf. The manipulation leads to privilege escalation.
This vulnerability is documented as CVE-2025-68200. The attack requires being on the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in BigBlueButton up to 3.0.21. Affected by this issue is some unknown functionality of the file /var/bigbluebutton. Such manipulation leads to exposure of resource.
This vulnerability is uniquely identified as CVE-2026-27466. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in BigBlueButton up to 3.0.19. This affects an unknown part. Performing a manipulation results in information disclosure.
This vulnerability was named CVE-2026-27467. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability marked as problematic has been reported in zumba json-serializer up to 3.2.2. Affected by this vulnerability is the function JsonSerializer::unserialize. This manipulation causes deserialization.
This vulnerability is handled as CVE-2026-27206. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability marked as critical has been reported in sigstore fulcio up to 1.8.4. The affected element is the function metaRegex. Performing a manipulation results in server-side request forgery.
This vulnerability was named CVE-2026-22772. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability identified as problematic has been detected in Traefik up to 3.6.7. Affected is the function readTimeout. Performing a manipulation results in resource consumption.
This vulnerability is known as CVE-2026-25949. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, was found in directus up to 11.14.0. Affected by this issue is some unknown functionality. Such manipulation of the argument reset_url leads to observable timing discrepancy.
This vulnerability is referenced as CVE-2026-26185. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Nsasoft Nsauditor SpotAuditor 5.3.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality. Executing a manipulation of the argument Password can lead to stack-based buffer overflow.
This vulnerability is tracked as CVE-2019-25340. The attack is restricted to local execution. Moreover, an exploit is present.
A vulnerability was found in Nsasoft Nsauditor SpotAuditor 5.3.2. It has been rated as critical. This issue affects some unknown processing. This manipulation causes stack-based buffer overflow.
This vulnerability is tracked as CVE-2019-25336. The attack is restricted to local execution. Moreover, an exploit is present.
A vulnerability labeled as problematic has been found in solspace craft-freeform up to 5.14.6 on CraftCMS. The impacted element is an unknown function. Executing a manipulation can lead to cross site scripting.
This vulnerability is registered as CVE-2026-26188. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability has been found in Beetel 777VR1 up to 01.00.09 and classified as critical. The impacted element is an unknown function of the component Web Management Interface. The manipulation leads to hard-coded credentials.
This vulnerability is referenced as CVE-2026-2616. The attack needs to be initiated within the local network. Furthermore, an exploit is available.
It is advisable to modify the configuration settings.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability identified as critical has been detected in Guardian Gryphon 01.06.0006.22. Affected by this vulnerability is an unknown functionality of the component TLS Certification Handler. The manipulation leads to improper certificate validation.
This vulnerability is listed as CVE-2025-65753. The attack must be carried out from within the local network. There is no available exploit.
A vulnerability was found in Smoothwall Express 3.1-SP4-polar-x86_64-update9. It has been rated as problematic. Affected is an unknown function of the file modem.cgi of the component POST Request Handler. This manipulation of the argument INIT/HANGUP/SPEAKER_ON/SPEAKER_OFF/TONE_DIAL/PULSE_DIAL causes cross site scripting.
This vulnerability appears as CVE-2019-25394. The attack may be initiated remotely. In addition, an exploit is available.