A vulnerability classified as critical has been found in Linux Kernel up to 6.12.4. Affected is the function inet6_create. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-56600. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Xe x. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to reliance on untrusted inputs in a security decision.
This vulnerability is handled as CVE-2025-24369. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in compose-spec compose-go up to 2.4.0. This issue affects some unknown processing of the component YAML Handler. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2024-10846. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in go-ethereum up to 1.14.12. This affects an unknown part. The manipulation leads to uncaught exception.
This vulnerability is uniquely identified as CVE-2025-24883. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in kubewarden-controller up to 1.20.x. It has been classified as critical. This affects an unknown part. The manipulation leads to improper authorization.
This vulnerability is uniquely identified as CVE-2025-24784. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in CometBFT up to 0.38.16/1.0.0. This affects an unknown part. The manipulation leads to improper check or handling of exceptional conditions.
This vulnerability is uniquely identified as CVE-2025-24371. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in RichardoC kube-audit-rest up to 1.0.15. This issue affects some unknown processing of the component k8s api. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2025-24884. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in argoproj argo-cd up to 2.11.12/2.12.9/2.13.3 on Kubernetes. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to information exposure through error message.
This vulnerability is handled as CVE-2025-23216. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in kubewarden-controller up to 1.20.x and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper authorization.
This vulnerability is handled as CVE-2025-24376. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Google Go 1.24rc2. Affected is an unknown function of the component cmd-go. The manipulation of the argument executable_path/loader_path/rpath leads to command injection.
This vulnerability is traded as CVE-2025-22867. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in drakkan sftpgo up to 2.6.4. It has been classified as critical. This affects an unknown part. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2025-24366. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in clidey whodb. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument allowAllFiles leads to improper neutralization of special elements in data query logic.
This vulnerability is known as CVE-2025-24787. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in clidey whodb. This affects the function Join of the file /db. The manipulation leads to path traversal: '.../...//'.
This vulnerability is uniquely identified as CVE-2025-24786. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in OpenSC pam_pkcs11 0.6.12. Affected is the function pam_sm_authenticate. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2025-24531. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in GitLab Community Edition and Enterprise Edition up to 17.7.3/17.8.1. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to incorrect authorization.
This vulnerability was named CVE-2025-0516. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in OpenSC pam_pkcs11 up to 0.6.12. Affected by this vulnerability is an unknown functionality of the file pam_pkcs11.conf of the component X.509 Certificate Handler. The manipulation of the argument default leads to improper authentication.
This vulnerability is known as CVE-2025-24032. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Yamna Tatheer KNR Author List Widget Plugin up to 3.1.1 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-22514. The attack can be initiated remotely. There is no exploit available.
A vulnerability has been found in Marcus Downing Site PIN Plugin up to 1.3 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-22576. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Infosoft Consultant Order Audit Log for WooCommerce Plugin up to 2.0 on WordPress. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-22337. The attack may be initiated remotely. There is no exploit available.