A vulnerability classified as critical has been found in Linux Kernel up to 6.12.57/6.17.7. The affected element is the function dst_dev_rcu of the component tcp. This manipulation causes use after free.
This vulnerability is tracked as CVE-2025-68188. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.15.98/6.1.15/6.2.2. Impacted is the function uart_add_one_port of the component tty. The manipulation results in null pointer dereference.
This vulnerability was named CVE-2023-54287. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.52/6.4.15/6.5.2. Affected by this issue is some unknown functionality of the component HID. Such manipulation leads to use after free.
This vulnerability is documented as CVE-2023-54207. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.5.4. The affected element is the function qt1010_init of the file drivers/media/tuners/qt1010.c of the component media. This manipulation causes buffer overflow.
The identification of this vulnerability is CVE-2023-54282. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability categorized as critical has been discovered in troglobit Redir 3.3. This vulnerability affects the function doproxyconnect. The manipulation results in stack-based buffer overflow.
This vulnerability is reported as CVE-2020-37182. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.18.9. This issue affects the function nvmet_tcp_build_pdu_iovec of the component nvmet-tcp. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2026-23112. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Vim up to 9.1.2147 and classified as critical. Impacted is the function special_keys of the file src/netbeans.c of the component NetBeans Feature. Such manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2026-26269. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in Unidocs ezPDF DRM Reader and ezPDF Reader 2.0/3.0.0.4 on 32-bit. This affects an unknown part in the library SHFOLDER.dll. Such manipulation leads to uncontrolled search path.
This vulnerability is documented as CVE-2026-2516. The attack needs to be performed locally. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Linux Kernel up to 6.6.63/6.11.10/6.12.1. It has been classified as critical. The affected element is the function f2fs_record_stop_reason of the component kswapd0. This manipulation causes deadlock.
This vulnerability is registered as CVE-2024-56744. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability has been found in Linux Kernel up to 5.15.173/6.1.119/6.6.63/6.11.10/6.12.1 and classified as critical. Affected is the function reset_method_store of the component PCI. Performing a manipulation results in memory leak.
This vulnerability is identified as CVE-2024-56745. The attack can only be performed from the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.12.1. It has been declared as problematic. Affected is the function rtc_timer_do_work. Executing a manipulation can lead to uninitialized pointer.
This vulnerability is registered as CVE-2024-56739. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.11.10/6.12.1. Affected by this issue is the function mlx5vf_add_migration_pages of the component vfio. The manipulation results in memory leak.
This vulnerability is reported as CVE-2024-56742. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.12.1. This affects an unknown function of the component nfs_common. This manipulation causes improper locking.
The identification of this vulnerability is CVE-2024-56743. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.1. This impacts the function nfs3_read_done of the component localio. Such manipulation of the argument res.replen leads to memory corruption.
This vulnerability is referenced as CVE-2024-56740. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.1 and classified as problematic. The impacted element is the function otx2_mbox_get_rsp of the file otx2_ethtool.c of the component octeontx2-pf. This manipulation causes improper check for unusual conditions.
This vulnerability is tracked as CVE-2024-56728. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.