A vulnerability was found in Audimex 15.0.0 and classified as problematic. This impacts an unknown function of the file /audimex/cgi-bin/wal.fcgi of the component Search Filter. The manipulation of the argument company results in cross site scripting.
This vulnerability is known as CVE-2023-46396. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as critical has been reported in Totolink X6000R 9.4.0cu.652_B20230116. Affected by this issue is the function sub_41DD80. This manipulation causes command injection.
This vulnerability is handled as CVE-2023-46408. The attack can only be done within the local network. There is not any exploit available.
A vulnerability marked as problematic has been reported in gougucms 4.08.18. The impacted element is an unknown function of the file /home/user/edit_submit. Performing a manipulation of the argument headimgurl results in cross site scripting.
This vulnerability was named CVE-2023-46394. The attack may be initiated remotely. There is no available exploit.
A vulnerability classified as problematic has been found in gougucms 4.08.18. This impacts an unknown function of the component Packet Handler. The manipulation leads to weak password recovery.
This vulnerability is referenced as CVE-2023-46393. The attack needs to be initiated within the local network. No exploit is available.
A vulnerability classified as problematic has been found in LOYTEC LINX-212, LVIS-3ME12-A1 and LIOB-586. Affected by this vulnerability is an unknown functionality of the component Web Interface. This manipulation causes cleartext transmission of sensitive information.
This vulnerability appears as CVE-2023-46380. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as critical, has been found in GeekAI up to 4.2.4. The affected element is the function Download of the file api/handler/net_handler.go. This manipulation of the argument url causes server-side request forgery.
This vulnerability is registered as CVE-2026-2558. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability classified as problematic was found in cskefu up to 8.0.1. Impacted is the function Upload of the file com/cskefu/cc/controller/resource/MediaController.java of the component File Upload. The manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2026-2557. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical has been found in cskefu up to 8.0.1. This issue affects some unknown processing of the file com/cskefu/cc/controller/resource/MediaController.java of the component Endpoint. The manipulation of the argument url leads to server-side request forgery.
This vulnerability is listed as CVE-2026-2556. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as critical has been identified in JeecgBoot 3.9.1. This vulnerability affects the function importDocumentFromZip of the file org/jeecg/modules/airag/llm/controller/AiragKnowledgeController.java of the component Retrieval-Augmented Generation. Executing a manipulation can lead to deserialization.
This vulnerability is tracked as CVE-2026-2555. The attack can be launched remotely. No exploit exists.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.6.112/6.12.52/6.17.2. This impacts the function in_atomic in the library /include/linux/uaccess.h of the component SVM. This manipulation causes privilege escalation.
The identification of this vulnerability is CVE-2025-40038. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.17.2. The impacted element is the function aer_ratelimit of the component PCI. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-40034. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2. This impacts the function copy_to_user of the component particular. Executing a manipulation can lead to improper initialization.
This vulnerability is tracked as CVE-2025-40035. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2. This impacts the function copy_to_user of the component Misc. The manipulation results in memory leak.
This vulnerability is known as CVE-2025-40036. Access to the local network is required for this attack. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.52/6.17.2. The affected element is the function simplefb_detach_genpds of the component fbdev. Executing a manipulation can lead to use after free.
This vulnerability is handled as CVE-2025-40037. The attack can only be done within the local network. There is not any exploit available.
It is advisable to upgrade the affected component.