A vulnerability has been found in Linux Kernel up to 6.12.57/6.17.7 and classified as critical. This affects the function avs_dai_fe_shutdown of the component ASoC. This manipulation causes use after free.
This vulnerability is tracked as CVE-2025-40344. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.57/6.17.7. This affects the function ttm_bo_vm_dummy_page. Such manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2025-40340. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability described as critical has been identified in Linux Kernel up to 6.17.7. This vulnerability affects unknown code. The manipulation results in privilege escalation.
This vulnerability is known as CVE-2025-40335. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Linux Kernel up to 6.17.7. This issue affects the function hmm_pfn_to_map_order. This manipulation causes privilege escalation.
This vulnerability is handled as CVE-2025-40336. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.17.7. This affects an unknown part. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2025-40334. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.18.9. The affected element is the function mmp_pdma_residue of the component dmaengine. Executing a manipulation can lead to use after free.
This vulnerability is handled as CVE-2025-71221. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in Linux Kernel up to 5.15.199/6.1.162/6.6.123/6.12.69/6.18.9. This issue affects the function tegra_slink_probe of the component spi. This manipulation causes memory leak.
This vulnerability is registered as CVE-2026-23182. The attack requires access to the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.18.9. It has been classified as critical. Impacted is the function kvm_arch_irq_bypass_del_producer of the component KVM. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2026-23198. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.18.9. This vulnerability affects the function mapping_min_folio_order of the component btrfs. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2026-23181. The attack must originate from the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in TP-Link TL-WDR7660 2.0.30. It has been rated as critical. The impacted element is the function upgradeInfoJsonToBin. Performing a manipulation results in stack-based buffer overflow.
This vulnerability is reported as CVE-2023-46371. The attacker must have access to the local network to execute the attack. No exploit exists.
A vulnerability, which was classified as critical, has been found in Tenda W18E 16.01.0.8(1576). This issue affects the function formSetNetCheckTools. The manipulation of the argument portMirrorMirroredPorts leads to stack-based buffer overflow.
This vulnerability is referenced as CVE-2023-46369. The attack needs to be initiated within the local network. No exploit is available.
A vulnerability described as critical has been identified in jbig2enc 0.28. Affected by this vulnerability is the function jbig2_add_page of the file src/jbig2enc.cc. Executing a manipulation can lead to memory corruption.
This vulnerability is handled as CVE-2023-46363. The attack can only be done within the local network. There is not any exploit available.
A vulnerability has been found in Snegurka Referral and Affiliation Program Module up to 3.5.1 on PrestaShop and classified as critical. Affected is the function ReferralByPhoneDefaultModuleFrontController::ajaxProcessCartRuleValidate. This manipulation causes sql injection.
This vulnerability appears as CVE-2023-46358. The attacker needs to be present on the local network. There is no available exploit.
A vulnerability was found in jbig2enc 0.28 and classified as critical. The affected element is the function jbig2enc_auto_threshold_using_hash of the file src/jbig2enc.cc. Executing a manipulation can lead to use after free.
This vulnerability is tracked as CVE-2023-46362. The attack is only possible within the local network. No exploit exists.
A vulnerability, which was classified as critical, has been found in Artifex jbig2dec 0.20. Affected by this vulnerability is the function jbig2_error of the file /jbig2dec/jbig2.c. Performing a manipulation results in memory corruption.
This vulnerability is known as CVE-2023-46361. Remote exploitation of the attack is possible. No exploit is available.
Threat actors are abusing Pastebin comments to distribute a new ClickFix-style attack that tricks cryptocurrency users into executing malicious JavaScript in their browser, allowing attackers to hijack Bitcoin swap transactions and redirect funds to attacker-controlled wallets. [...]
A vulnerability described as problematic has been identified in Unidocs ezPDF DRM Reader and ezPDF Reader 2.0/3.0.0.4 on 32-bit. This affects an unknown part in the library SHFOLDER.dll. Such manipulation leads to uncontrolled search path.
This vulnerability is documented as CVE-2026-2516. The attack needs to be performed locally. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic has been found in Open5GS up to 2.7.6. This vulnerability affects the function ogs_gtp2_parse_tft in the library lib/gtp/v2/types.c of the component SMF. Performing a manipulation of the argument pf[0].content.length results in denial of service.
This vulnerability is reported as CVE-2026-2517. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The project was informed of the problem early through an issue report but has not responded yet.