VulDB Updates Updates
- CVE-2026-5042 | Belkin F9K1122 1.00.33 Parameter formCrossBandSwitch webpage stack-based overflow (EUVD-2026-16987)by vuldb.com on March 30, 2026 at 10:05 am
A vulnerability, which was classified as critical, was found in Belkin F9K1122 1.00.33. The affected element is the function formCrossBandSwitch of the file /goform/formCrossBandSwitch of the component Parameter Handler. The manipulation of the argument webpage results in stack-based buffer overflow. This vulnerability is cataloged as CVE-2026-5042. The attack may be launched remotely. Furthermore, there is an exploit available. The vendor was contacted early about this disclosure but did not respond in any way.
- CVE-2025-15379 | MLflow up to 3.8.1 Model _install_model_dependencies_to_env command injection (EUVD-2025-209121)by vuldb.com on March 30, 2026 at 10:05 am
A vulnerability was found in MLflow up to 3.8.1. It has been declared as critical. Impacted is the function _install_model_dependencies_to_env of the component Model Handler. The manipulation results in command injection. This vulnerability is known as CVE-2025-15379. It is possible to launch the attack remotely. No exploit is available. It is recommended to upgrade the affected component.
- CVE-2026-3945 | tinyproxy up to 1.11.3 Chunk strtol integer overflow (EUVD-2026-17066)by vuldb.com on March 30, 2026 at 10:05 am
A vulnerability was found in tinyproxy up to 1.11.3. It has been classified as problematic. This issue affects the function strtol of the component Chunk Handler. The manipulation leads to integer overflow. This vulnerability is traded as CVE-2026-3945. It is possible to initiate the attack remotely. There is no exploit available. Upgrading the affected component is recommended.
- CVE-2026-2328 | WAGO Device Sphere/Solution Builder up to 1.2.1 improper filtering of special elements (VDE-2026-010 / EUVD-2026-17064)by vuldb.com on March 30, 2026 at 10:05 am
A vulnerability categorized as critical has been discovered in WAGO Device Sphere and Solution Builder up to 1.2.1. The impacted element is an unknown function. Such manipulation leads to improper filtering of special elements. This vulnerability is uniquely identified as CVE-2026-2328. The attack can be launched remotely. No exploit exists. It is advisable to upgrade the affected component.
- CVE-2025-3716 | ESET Protect prior 12.1.1.0 response discrepancy (EUVD-2025-209122)by vuldb.com on March 30, 2026 at 10:05 am
A vulnerability was found in ESET Protect and classified as problematic. The affected element is an unknown function. The manipulation results in observable response discrepancy. This vulnerability is reported as CVE-2025-3716. The attacker must have access to the local network to execute the attack. No exploit exists. It is suggested to upgrade the affected component.
- CVE-2026-25704 | pop-os cosmic-greeter privilege dropping (ID 426 / EUVD-2026-17067)by vuldb.com on March 30, 2026 at 10:05 am
A vulnerability, which was classified as problematic, was found in pop-os cosmic-greeter. This issue affects some unknown processing. Executing a manipulation can lead to privilege dropping / lowering errors. This vulnerability is registered as CVE-2026-25704. The attack needs to be launched locally. No exploit is available. You should upgrade the affected component.
- CVE-2026-4415 | GIGABYTE Control Center up to 25.07.21.01 path traversal (EUVD-2026-17069)by vuldb.com on March 30, 2026 at 10:05 am
A vulnerability classified as critical was found in GIGABYTE Control Center up to 25.07.21.01. This affects an unknown part. Such manipulation leads to relative path traversal. This vulnerability is listed as CVE-2026-4415. The attack may be performed from remote. There is no available exploit.
- CVE-2026-23364 | Linux Kernel up to 7.0-rc1 ksmbd memcmp timing discrepancyby vuldb.com on March 30, 2026 at 9:43 am
A vulnerability labeled as problematic has been found in Linux Kernel up to 7.0-rc1. Affected by this issue is the function memcmp of the component ksmbd. Such manipulation leads to observable timing discrepancy. This vulnerability is referenced as CVE-2026-23364. The attack needs to be initiated within the local network. No exploit is available. The affected component should be upgraded.
- CVE-2026-23365 | Linux Kernel up to 7.0-rc1 USB Endpoint denial of serviceby vuldb.com on March 30, 2026 at 9:43 am
A vulnerability classified as critical has been found in Linux Kernel up to 7.0-rc1. This issue affects some unknown processing of the component USB Endpoint. The manipulation leads to denial of service. This vulnerability is listed as CVE-2026-23365. The attack must be carried out from within the local network. There is no available exploit. It is recommended to upgrade the affected component.
- CVE-2026-23366 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc1 drm_client_modeset_probe null pointer dereferenceby vuldb.com on March 30, 2026 at 9:43 am
A vulnerability classified as critical was found in Linux Kernel up to 6.18.16/6.19.6/7.0-rc1. Impacted is the function drm_client_modeset_probe. The manipulation results in null pointer dereference. This vulnerability is cataloged as CVE-2026-23366. The attack must originate from the local network. There is no exploit available. Upgrading the affected component is advised.
- CVE-2026-23368 | Linux Kernel up to 7.0-rc1 rtnl_lock deadlockby vuldb.com on March 30, 2026 at 9:43 am
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 7.0-rc1. The affected element is the function rtnl_lock. This manipulation causes deadlock. This vulnerability is registered as CVE-2026-23368. The attack requires access to the local network. No exploit is available. It is advisable to upgrade the affected component.
- CVE-2026-23370 | Linux Kernel up to 7.0-rc2 set_new_password missing encryptionby vuldb.com on March 30, 2026 at 9:43 am
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 7.0-rc2. The impacted element is the function set_new_password. Such manipulation leads to missing encryption of sensitive data. This vulnerability is documented as CVE-2026-23370. The attack can be executed remotely. There is not any exploit available. You should upgrade the affected component.
- CVE-2026-23367 | Linux Kernel up to 7.0-rc1 wifi _next_ns_data uninitialized pointerby vuldb.com on March 30, 2026 at 9:43 am
A vulnerability has been found in Linux Kernel up to 7.0-rc1 and classified as critical. This affects the function _next_ns_data of the component wifi. Performing a manipulation results in uninitialized pointer. This vulnerability is reported as CVE-2026-23367. The attacker must have access to the local network to execute the attack. No exploit exists. The affected component should be upgraded.
- CVE-2026-23369 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2 i2c acpi_lock null pointer dereferenceby vuldb.com on March 30, 2026 at 9:43 am
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2. This affects the function acpi_lock of the component i2c. This manipulation causes null pointer dereference. This vulnerability is tracked as CVE-2026-23369. The attack is only possible within the local network. No exploit exists. You should upgrade the affected component.
- CVE-2026-23363 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2 wifi mt7925_mac_write_txwi_80211 out-of-boundsby vuldb.com on March 30, 2026 at 9:43 am
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2. Affected is the function mt7925_mac_write_txwi_80211 of the component wifi. The manipulation results in out-of-bounds read. This vulnerability was named CVE-2026-23363. The attack needs to be approached within the local network. There is no available exploit. It is advisable to upgrade the affected component.
- CVE-2026-23361 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc1 PCI dw_pcie_ep_raise_msix_irq privilege escalation (Nessus ID 303733)by vuldb.com on March 30, 2026 at 9:43 am
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc1. Affected by this issue is the function dw_pcie_ep_raise_msix_irq of the component PCI. The manipulation results in privilege escalation. This vulnerability is identified as CVE-2026-23361. The attack can only be performed from the local network. There is not any exploit available. It is advisable to upgrade the affected component.
- CVE-2024-47552 | Apache Seata up to 2.1.x deserializationby vuldb.com on March 30, 2026 at 9:43 am
A vulnerability labeled as problematic has been found in Apache Seata up to 2.1.x. This impacts an unknown function. Executing a manipulation can lead to deserialization. This vulnerability is registered as CVE-2024-47552. The attack requires access to the local network. No exploit is available. The affected component should be upgraded.
- CVE-2025-32897 | Apache Seata up to 2.2.x deserialization (EUVD-2025-19540)by vuldb.com on March 30, 2026 at 9:43 am
A vulnerability described as problematic has been identified in Apache Seata up to 2.2.x. This affects an unknown part. The manipulation results in deserialization. This vulnerability is reported as CVE-2025-32897. The attacker must have access to the local network to execute the attack. No exploit exists. Upgrading the affected component is recommended.
- CVE-2026-23362 | Linux Kernel up to 7.0-rc2 can bcm_tx_setup initialization (Nessus ID 303735)by vuldb.com on March 30, 2026 at 9:43 am
A vulnerability was found in Linux Kernel up to 7.0-rc2. It has been rated as critical. Affected by this vulnerability is the function bcm_tx_setup of the component can. The manipulation leads to improper initialization. This vulnerability is referenced as CVE-2026-23362. The attack needs to be initiated within the local network. No exploit is available. Upgrading the affected component is advised.
- CVE-2025-54479 | F5 BIG-IP Next CNF prior 15.1.10.8/16.1.6.1/17.1.3/17.5.1.3 Traffic Management Microkernel denial of service (K000151475 / Nessus ID 270619)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability was found in F5 BIG-IP Next CNF, BIG-IP Next for Kubernetes and BIG-IP PEM and classified as problematic. Affected is an unknown function of the component Traffic Management Microkernel. The manipulation results in denial of service. This vulnerability was named CVE-2025-54479. The attack may be performed from remote. There is no available exploit. It is suggested to upgrade the affected component.
- CVE-2025-53868 | F5 BIG-IP up to 15.1.10/16.1.6/17.1.2/17.5.1 Appliance Mode os command injection (K000151902 / Nessus ID 270606)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability, which was classified as critical, has been found in F5 BIG-IP up to 15.1.10/16.1.6/17.1.2/17.5.1. This affects an unknown part of the component Appliance Mode. This manipulation causes os command injection. This vulnerability appears as CVE-2025-53868. The attack may be initiated remotely. There is no available exploit. It is advisable to upgrade the affected component.
- CVE-2025-53474 | F5 BIG-IP APM up to 15.1.10/16.1.6/17.1.2/17.5.1 iRules denial of service (K000156572 / Nessus ID 270578)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability labeled as problematic has been found in F5 BIG-IP APM up to 15.1.10/16.1.6/17.1.2/17.5.1. This affects an unknown part of the component iRules. Executing a manipulation can lead to denial of service. This vulnerability is registered as CVE-2025-53474. It is possible to launch the attack remotely. No exploit is available. The affected component should be upgraded.
- CVE-2025-53521 | F5 BIG-IP APM up to 15.1.10/16.1.6/17.1.2/17.5.1 Traffic Management Microkernel allocation of resources (K000156741 / Nessus ID 270605)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability described as problematic has been identified in F5 BIG-IP APM up to 15.1.10/16.1.6/17.1.2/17.5.1. The impacted element is an unknown function of the component Traffic Management Microkernel. Such manipulation leads to allocation of resources. This vulnerability is documented as CVE-2025-53521. The attack can be executed remotely. Additionally, an exploit exists. Upgrading the affected component is recommended.
- CVE-2025-53860 | F5 F5OS-A up to 1.5.2/1.8.0 FIPS Hardware Security information disclosure (K000148625 / Nessus ID 272121)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability was found in F5 F5OS-A up to 1.5.2/1.8.0. It has been classified as problematic. This vulnerability affects unknown code of the component FIPS Hardware Security Module. Performing a manipulation results in information disclosure. This vulnerability was named CVE-2025-53860. The attack may be initiated remotely. There is no available exploit. Upgrading the affected component is recommended.
- CVE-2025-53856 | F5 BIG-IP up to 15.1.10/16.1.6/17.1.2/17.5.1 PVA Feature incorrect control flow scoping (K000156707 / Nessus ID 270622)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability identified as critical has been detected in F5 BIG-IP up to 15.1.10/16.1.6/17.1.2/17.5.1. The impacted element is an unknown function of the component PVA Feature. This manipulation causes incorrect control flow scoping. This vulnerability is tracked as CVE-2025-53856. The attack is possible to be carried out remotely. No exploit exists. You should upgrade the affected component.
- CVE-2025-48008 | F5 BIG-IP/BIG-IP Next SPK/BIG-IP Next CNF MPTCP use after free (K000150614 / Nessus ID 270617)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability, which was classified as critical, has been found in F5 BIG-IP, BIG-IP Next SPK and BIG-IP Next CNF. Affected is an unknown function of the component MPTCP. The manipulation leads to use after free. This vulnerability is traded as CVE-2025-48008. It is possible to initiate the attack remotely. There is no exploit available. It is advisable to upgrade the affected component.
- CVE-2025-47150 | F5 F5OS-A/F5OS-C SNMP resource consumption (K000149820 / Nessus ID 272118)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability marked as critical has been reported in F5 F5OS-A and F5OS-C. This vulnerability affects unknown code of the component SNMP. The manipulation leads to resource consumption. This vulnerability is documented as CVE-2025-47150. The attack can be initiated remotely. There is not any exploit available. It is suggested to upgrade the affected component.
- CVE-2025-46706 | F5 BIG-IP Next SPK/BIG-IP Next CNF iRule HTTP::respond resource consumption (K000151611 / Nessus ID 270608)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability labeled as problematic has been found in F5 BIG-IP Next SPK and BIG-IP Next CNF. Impacted is the function HTTP::respond of the component iRule Handler. The manipulation results in resource consumption. This vulnerability is cataloged as CVE-2025-46706. The attack may be launched remotely. There is no exploit available. The affected component should be upgraded.
- CVE-2025-41430 | F5 BIG-IP SSL Orchestrator up to 15.1.9/16.1.3/17.1.2/17.5.0 Traffic Management Microkernel allocation of resources (K000150667 / Nessus ID 270614)by vuldb.com on March 30, 2026 at 9:30 am
A vulnerability categorized as problematic has been discovered in F5 BIG-IP SSL Orchestrator up to 15.1.9/16.1.3/17.1.2/17.5.0. The affected element is an unknown function of the component Traffic Management Microkernel. The manipulation results in allocation of resources. This vulnerability is identified as CVE-2025-41430. The attack can be executed remotely. There is not any exploit available. It is advisable to upgrade the affected component.
- CVE-2026-23349 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc2 HID null pointer dereferenceby vuldb.com on March 30, 2026 at 8:38 am
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.18.16/6.19.6/7.0-rc2. The affected element is an unknown function of the component HID. The manipulation results in null pointer dereference. This vulnerability is known as CVE-2026-23349. Access to the local network is required for this attack. No exploit is available. You should upgrade the affected component.






