A vulnerability classified as critical was found in Linux Kernel up to 6.3.12/6.4.3. The impacted element is the function num_configs of the component pinctrl. Executing a manipulation can lead to out-of-bounds read.
This vulnerability is handled as CVE-2023-53750. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.2.4. It has been rated as critical. Impacted is the function uml_parse_vector_ifspec. The manipulation leads to unchecked return value.
This vulnerability is documented as CVE-2023-53745. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.4.239/5.10.176/5.15.105/6.1.22/6.2.9. This affects the function vfio_ap. Such manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2023-53746. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.3.3. This impacts the function vcs_write of the file drivers/tty/vt/vc_screen.c. Performing a manipulation results in use after free.
This vulnerability is known as CVE-2023-53747. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.52/6.4.15/6.5.2. This impacts the function release_resource of the component PCI. Executing a manipulation can lead to privilege escalation.
The identification of this vulnerability is CVE-2023-53743. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 5.10.179/5.15.110/6.1.27/6.2.14/6.3.1. It has been classified as critical. This vulnerability affects the function wkup_m3_ipc_get of the component soc. Performing a manipulation results in improper update of reference count.
This vulnerability is cataloged as CVE-2023-53744. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability labeled as problematic has been found in Lost and Found Information System 1.0. The impacted element is an unknown function of the file /classes/Users.php?f=save. Such manipulation of the argument username/password leads to authorization bypass.
This vulnerability is traded as CVE-2023-38965. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Creative Item Academy LMS 6.0. It has been rated as problematic. This affects an unknown function. Performing a manipulation results in cross site scripting.
This vulnerability is known as CVE-2023-38964. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability classified as critical was found in JerryScript 3.0.0. This affects the function scanner_is_context_needed of the file js-scanner-until.c. Such manipulation leads to buffer overflow.
This vulnerability is listed as CVE-2023-38961. The attack may be performed from remote. There is no available exploit.
A vulnerability marked as critical has been reported in Raiden RaidenFTPD 2.4 Build 4005. This impacts an unknown function. The manipulation leads to permission issues.
This vulnerability is documented as CVE-2023-38960. The attack needs to be performed locally. There is not any exploit available.
A vulnerability has been found in Oracle Communications Diameter Signaling Router up to 8.2.2 and classified as critical. Affected is an unknown function of the component IDIH. The manipulation leads to xml external entity reference.
This vulnerability is traded as CVE-2020-10683. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability classified as critical was found in The Events Calendar Plugin up to 6.15.13 on WordPress. This impacts the function start_migration/cancel_migration/revert_migration of the component Data Migration Handler. The manipulation results in missing authorization.
This vulnerability is reported as CVE-2025-15043. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as problematic, has been found in Creator LMS Plugin up to 1.1.12 on WordPress. Affected is the function get_items_permissions_check of the component Options Update Handler. This manipulation causes missing authorization.
This vulnerability appears as CVE-2025-15347. The attack may be initiated remotely. There is no available exploit.
A vulnerability has been found in NotificationX Plugin up to 3.2.0 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. Performing a manipulation of the argument nx-preview results in cross site scripting.
This vulnerability is known as CVE-2025-15380. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability identified as critical has been detected in IBM Sterling Connect:Direct for Unix. This affects an unknown part. This manipulation causes hard-coded credentials.
The identification of this vulnerability is CVE-2025-14115. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical has been found in IBM Licensing Operator. Affected by this issue is some unknown functionality. Performing a manipulation results in incorrect default permissions.
This vulnerability is identified as CVE-2025-12985. The attack is only possible with local access. There is not any exploit available.
A vulnerability has been found in IBM Aspera Console 3.4.7 and classified as problematic. Impacted is an unknown function. This manipulation causes sensitive information in log files.
This vulnerability is registered as CVE-2025-13925. The attack needs to be launched locally. No exploit is available.
A vulnerability was found in MedDream PACS Premium 7.3.6.870. It has been classified as problematic. The impacted element is the function sendOruReport. Performing a manipulation results in cross site scripting.
This vulnerability is reported as CVE-2025-44000. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in MedDream PACS Premium 7.3.6.870. It has been declared as problematic. This affects the function downloadZip. Executing a manipulation can lead to cross site scripting.
This vulnerability appears as CVE-2025-53516. The attack may be performed from remote. There is no available exploit.