A vulnerability has been found in Linux Kernel up to 6.12.57/6.17.7 and classified as critical. This affects the function avs_dai_fe_shutdown of the component ASoC. This manipulation causes use after free.
This vulnerability is tracked as CVE-2025-40344. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.57/6.17.7. This affects the function ttm_bo_vm_dummy_page. Such manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2025-40340. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability described as critical has been identified in Linux Kernel up to 6.17.7. This vulnerability affects unknown code. The manipulation results in privilege escalation.
This vulnerability is known as CVE-2025-40335. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Linux Kernel up to 6.17.7. This issue affects the function hmm_pfn_to_map_order. This manipulation causes privilege escalation.
This vulnerability is handled as CVE-2025-40336. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.17.7. This affects an unknown part. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2025-40334. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.18.9. The affected element is the function mmp_pdma_residue of the component dmaengine. Executing a manipulation can lead to use after free.
This vulnerability is handled as CVE-2025-71221. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in Linux Kernel up to 5.15.199/6.1.162/6.6.123/6.12.69/6.18.9. This issue affects the function tegra_slink_probe of the component spi. This manipulation causes memory leak.
This vulnerability is registered as CVE-2026-23182. The attack requires access to the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.18.9. It has been classified as critical. Impacted is the function kvm_arch_irq_bypass_del_producer of the component KVM. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2026-23198. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.18.9. This vulnerability affects the function mapping_min_folio_order of the component btrfs. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2026-23181. The attack must originate from the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in TP-Link TL-WDR7660 2.0.30. It has been rated as critical. The impacted element is the function upgradeInfoJsonToBin. Performing a manipulation results in stack-based buffer overflow.
This vulnerability is reported as CVE-2023-46371. The attacker must have access to the local network to execute the attack. No exploit exists.
A vulnerability, which was classified as critical, has been found in Tenda W18E 16.01.0.8(1576). This issue affects the function formSetNetCheckTools. The manipulation of the argument portMirrorMirroredPorts leads to stack-based buffer overflow.
This vulnerability is referenced as CVE-2023-46369. The attack needs to be initiated within the local network. No exploit is available.
A vulnerability described as critical has been identified in jbig2enc 0.28. Affected by this vulnerability is the function jbig2_add_page of the file src/jbig2enc.cc. Executing a manipulation can lead to memory corruption.
This vulnerability is handled as CVE-2023-46363. The attack can only be done within the local network. There is not any exploit available.
A vulnerability has been found in Snegurka Referral and Affiliation Program Module up to 3.5.1 on PrestaShop and classified as critical. Affected is the function ReferralByPhoneDefaultModuleFrontController::ajaxProcessCartRuleValidate. This manipulation causes sql injection.
This vulnerability appears as CVE-2023-46358. The attacker needs to be present on the local network. There is no available exploit.
A vulnerability was found in jbig2enc 0.28 and classified as critical. The affected element is the function jbig2enc_auto_threshold_using_hash of the file src/jbig2enc.cc. Executing a manipulation can lead to use after free.
This vulnerability is tracked as CVE-2023-46362. The attack is only possible within the local network. No exploit exists.
A vulnerability, which was classified as critical, has been found in Artifex jbig2dec 0.20. Affected by this vulnerability is the function jbig2_error of the file /jbig2dec/jbig2.c. Performing a manipulation results in memory corruption.
This vulnerability is known as CVE-2023-46361. Remote exploitation of the attack is possible. No exploit is available.
Threat actors are abusing Pastebin comments to distribute a new ClickFix-style attack that tricks cryptocurrency users into executing malicious JavaScript in their browser, allowing attackers to hijack Bitcoin swap transactions and redirect funds to attacker-controlled wallets. [...]
A vulnerability described as problematic has been identified in Unidocs ezPDF DRM Reader and ezPDF Reader 2.0/3.0.0.4 on 32-bit. This affects an unknown part in the library SHFOLDER.dll. Such manipulation leads to uncontrolled search path.
This vulnerability is documented as CVE-2026-2516. The attack needs to be performed locally. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.