VulDB Updates Updates
- CVE-2025-68806 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 ksmbd smb2_set_ea buffer overflow (Nessus ID 298659)by vuldb.com on February 12, 2026 at 6:22 am
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1. This impacts the function smb2_set_ea of the component ksmbd. Such manipulation leads to buffer overflow. This vulnerability is documented as CVE-2025-68806. The attack requires being on the local network. There is not any exploit available. Upgrading the affected component is recommended.
- CVE-2025-68803 | Linux Kernel up to 6.1.159/6.12.63/6.18.2/6.19-rc2 NFSv4 nfsd_create_setattr privilege escalation (EUVD-2026-2303 / Nessus ID 298659)by vuldb.com on February 12, 2026 at 6:22 am
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.159/6.12.63/6.18.2/6.19-rc2. The impacted element is the function nfsd_create_setattr of the component NFSv4. Performing a manipulation results in privilege escalation. This vulnerability is reported as CVE-2025-68803. The attacker must have access to the local network to execute the attack. No exploit exists. It is advisable to upgrade the affected component.
- CVE-2025-68804 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2 use after free (Nessus ID 298659)by vuldb.com on February 12, 2026 at 6:22 am
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2. This affects an unknown function. Executing a manipulation can lead to use after free. This vulnerability appears as CVE-2025-68804. The attacker needs to be present on the local network. There is no available exploit. You should upgrade the affected component.
- CVE-2025-68801 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 mlxsw spectrum_router reference count (Nessus ID 298659)by vuldb.com on February 12, 2026 at 6:22 am
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1. Impacted is the function spectrum_router of the component mlxsw. Executing a manipulation can lead to improper update of reference count. This vulnerability is tracked as CVE-2025-68801. The attack is only possible within the local network. No exploit exists. It is advisable to upgrade the affected component.
- CVE-2023-43000 | Apple macOS/iOS/iPadOS/Safari Web Content use after free (Nessus ID 276570 / WID-SEC-2025-2657)by vuldb.com on February 12, 2026 at 5:44 am
A vulnerability has been found in Apple macOS, iOS, iPadOS and Safari and classified as critical. This issue affects some unknown processing of the component Web Content Handler. The manipulation leads to use after free. This vulnerability is listed as CVE-2023-43000. The attack may be initiated remotely. There is no available exploit. The affected component should be upgraded.
- CVE-2021-29425 | Oracle Insurance Rules Palette 11.0.2/11.1.0/11.2.8/11.3.0/11.3.1 Architecture path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 4:01 am
A vulnerability identified as problematic has been detected in Oracle Insurance Rules Palette 11.0.2/11.1.0/11.2.8/11.3.0/11.3.1. Affected by this issue is some unknown functionality of the component Architecture. This manipulation causes path traversal. This vulnerability is tracked as CVE-2021-29425. The attack is possible to be carried out remotely. No exploit exists. You should upgrade the affected component.
- CVE-2021-29425 | Oracle Agile PLM 9.3.6 Security path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 4:01 am
A vulnerability labeled as problematic has been found in Oracle Agile PLM 9.3.6. This issue affects some unknown processing of the component Security. The manipulation results in path traversal. This vulnerability is known as CVE-2021-29425. It is possible to launch the attack remotely. No exploit is available. The affected component should be upgraded.
- CVE-2021-29425 | Oracle Solaris Cluster 4 Tools path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 4:01 am
A vulnerability, which was classified as problematic, has been found in Oracle Solaris Cluster 4. Affected by this issue is some unknown functionality of the component Tools. This manipulation causes path traversal. The identification of this vulnerability is CVE-2021-29425. It is possible to initiate the attack remotely. There is no exploit available. It is advisable to upgrade the affected component.
- CVE-2021-29425 | Oracle Health Sciences Information Manager 3.0.1/3.0.2/3.0.3/3.0.4 Health Policy Engine path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 4:01 am
A vulnerability labeled as problematic has been found in Oracle Health Sciences Information Manager 3.0.1/3.0.2/3.0.3/3.0.4. The impacted element is an unknown function of the component Health Policy Engine. Executing a manipulation can lead to path traversal. This vulnerability is registered as CVE-2021-29425. It is possible to launch the attack remotely. No exploit is available. The affected component should be upgraded.
- CVE-2021-29425 | Oracle Healthcare Data Repository 8.1.0 FHIR Comandline path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 4:01 am
A vulnerability marked as problematic has been reported in Oracle Healthcare Data Repository 8.1.0. This affects an unknown function of the component FHIR Comandline. The manipulation leads to path traversal. This vulnerability is documented as CVE-2021-29425. The attack can be initiated remotely. There is not any exploit available. It is suggested to upgrade the affected component.
- CVE-2021-29425 | Oracle Insurance Policy Administration 11.0.2/11.1.0/11.2.8/11.3.0/11.3.1 Architecture path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 4:01 am
A vulnerability categorized as problematic has been discovered in Oracle Insurance Policy Administration 11.0.2/11.1.0/11.2.8/11.3.0/11.3.1. Affected by this vulnerability is an unknown functionality of the component Architecture. The manipulation results in path traversal. This vulnerability is identified as CVE-2021-29425. The attack can be executed remotely. There is not any exploit available. It is advisable to upgrade the affected component.
- CVE-2021-29425 | Oracle WebCenter Portal 12.2.1.3.0/12.2.1.4.0 Security Framework path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 4:01 am
A vulnerability marked as problematic has been reported in Oracle WebCenter Portal 12.2.1.3.0/12.2.1.4.0. Impacted is an unknown function of the component Security Framework. Performing a manipulation results in path traversal. This vulnerability is reported as CVE-2021-29425. The attack is possible to be carried out remotely. No exploit exists. It is suggested to upgrade the affected component.
- CVE-2025-58077 | TP-Link Archer AX53 v1.0 up to 1.3.1 tmpserver Modules heap-based overflowby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability marked as critical has been reported in TP-Link Archer AX53 v1.0 up to 1.3.1. This impacts an unknown function of the component tmpserver Modules. This manipulation causes heap-based buffer overflow. The identification of this vulnerability is CVE-2025-58077. The attack needs to be done within the local network. There is no exploit available.
- CVE-2025-59482 | TP-Link Archer AX53 v1.0 up to 1.3.1 heap-based overflowby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability was found in TP-Link Archer AX53 v1.0 up to 1.3.1 and classified as critical. Impacted is an unknown function. Such manipulation leads to heap-based buffer overflow. This vulnerability is documented as CVE-2025-59482. The attack requires being on the local network. There is not any exploit available.
- CVE-2025-58455 | TP-Link Archer AX53 v1.0 up to 1.3.1 tmpserver heap-based overflowby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability has been found in TP-Link Archer AX53 v1.0 up to 1.3.1 and classified as critical. This issue affects some unknown processing of the component tmpserver Module. This manipulation causes heap-based buffer overflow. This vulnerability is registered as CVE-2025-58455. The attack requires access to the local network. No exploit is available.
- CVE-2025-61944 | TP-Link Archer AX53 v1.0 up to 1.3.1 heap-based overflowby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability was found in TP-Link Archer AX53 v1.0 up to 1.3.1. It has been declared as critical. The impacted element is an unknown function. Executing a manipulation can lead to heap-based buffer overflow. This vulnerability appears as CVE-2025-61944. The attacker needs to be present on the local network. There is no available exploit.
- CVE-2025-59487 | TP-Link Archer AX53 v1.0 up to 1.3.1 heap-based overflowby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability was found in TP-Link Archer AX53 v1.0 up to 1.3.1. It has been classified as critical. The affected element is an unknown function. Performing a manipulation results in heap-based buffer overflow. This vulnerability is reported as CVE-2025-59487. The attacker must have access to the local network to execute the attack. No exploit exists.
- CVE-2025-62501 | TP-Link Archer AX53 v1.0 up to 1.3.1 tmpserver key exchange without entity authenticationby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability marked as problematic has been reported in TP-Link Archer AX53 v1.0 up to 1.3.1. The affected element is an unknown function of the component tmpserver Module. The manipulation leads to key exchange without entity authentication. This vulnerability is referenced as CVE-2025-62501. The attack needs to be initiated within the local network. No exploit is available.
- CVE-2025-62404 | TP-Link Archer AX53 v1.0 up to 1.3.1 tmpserver heap-based overflowby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability categorized as critical has been discovered in TP-Link Archer AX53 v1.0 up to 1.3.1. This impacts an unknown function of the component tmpserver Module. The manipulation results in heap-based buffer overflow. This vulnerability is known as CVE-2025-62404. Access to the local network is required for this attack. No exploit is available.
- CVE-2025-62405 | TP-Link Archer AX53 v1.0 up to 1.3.1 tmpserver heap-based overflowby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability identified as critical has been detected in TP-Link Archer AX53 v1.0 up to 1.3.1. Affected is an unknown function of the component tmpserver Module. This manipulation causes heap-based buffer overflow. This vulnerability is handled as CVE-2025-62405. The attack can only be done within the local network. There is not any exploit available.
- CVE-2025-62673 | TP-Link Archer AX53 v1.0 up to 1.3.1 tdpserver heap-based overflowby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability labeled as critical has been found in TP-Link Archer AX53 v1.0 up to 1.3.1. Affected by this vulnerability is an unknown functionality of the component tdpserver Module. Such manipulation leads to heap-based buffer overflow. This vulnerability is uniquely identified as CVE-2025-62673. The attack can only be initiated within the local network. No exploit exists.
- CVE-2025-65875 | FPDF up to 1.86 AddFont unrestricted uploadby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability classified as critical has been found in FPDF up to 1.86. The affected element is the function AddFont. This manipulation causes unrestricted upload. The identification of this vulnerability is CVE-2025-65875. It is possible to initiate the attack remotely. There is no exploit available.
- CVE-2025-61983 | TP-Link Archer AX53 v1.0 up to 1.3.1 heap-based overflowby vuldb.com on February 12, 2026 at 4:00 am
A vulnerability was found in TP-Link Archer AX53 v1.0 up to 1.3.1. It has been rated as critical. This affects an unknown function. The manipulation leads to heap-based buffer overflow. This vulnerability is traded as CVE-2025-61983. Access to the local network is required for this attack to succeed. There is no exploit available.
- CVE-2025-68799 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1 cffrml_receive length integer underflow (Nessus ID 298659)by vuldb.com on February 12, 2026 at 3:50 am
A vulnerability was found in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1. It has been rated as critical. This issue affects the function cffrml_receive. Performing a manipulation of the argument length results in integer underflow. This vulnerability is identified as CVE-2025-68799. The attack can only be performed from the local network. There is not any exploit available. Upgrading the affected component is advised.
- CVE-2025-68796 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2 f2fs fs/f2fs/extent_cache.c f2fs_zero_range allocation of resources (Nessus ID 298659)by vuldb.com on February 12, 2026 at 3:50 am
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2. The impacted element is the function f2fs_zero_range of the file fs/f2fs/extent_cache.c of the component f2fs. Such manipulation leads to allocation of resources. This vulnerability is uniquely identified as CVE-2025-68796. The attack can only be initiated within the local network. No exploit exists. You should upgrade the affected component.
- CVE-2025-68798 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2 NMI x86_pmu_stop null pointer dereference (Nessus ID 298659)by vuldb.com on February 12, 2026 at 3:50 am
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2. The affected element is the function x86_pmu_stop of the component NMI Handler. The manipulation results in null pointer dereference. This vulnerability is reported as CVE-2025-68798. The attacker must have access to the local network to execute the attack. No exploit exists. Upgrading the affected component is recommended.
- CVE-2025-68797 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2 char ac_ioctl null pointer dereference (Nessus ID 298659)by vuldb.com on February 12, 2026 at 3:50 am
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2. The impacted element is the function ac_ioctl of the component char. The manipulation results in null pointer dereference. This vulnerability is cataloged as CVE-2025-68797. The attack must originate from the local network. There is no exploit available. The affected component should be upgraded.
- CVE-2021-29425 | Oracle Communications Diameter Intelligence Hub up to 8.1.0/8.2.3 Database path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 3:28 am
A vulnerability was found in Oracle Communications Diameter Intelligence Hub up to 8.1.0/8.2.3 and classified as problematic. The impacted element is an unknown function of the component Database. Executing a manipulation can lead to path traversal. This vulnerability appears as CVE-2021-29425. The attack may be performed from remote. There is no available exploit. It is suggested to upgrade the affected component.
- CVE-2021-29425 | Oracle Communications Policy Management 12.5.0.0.0 CMP path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 3:28 am
A vulnerability was found in Oracle Communications Policy Management 12.5.0.0.0. It has been classified as problematic. This affects an unknown function of the component CMP. The manipulation leads to path traversal. This vulnerability is traded as CVE-2021-29425. It is possible to initiate the attack remotely. There is no exploit available. Upgrading the affected component is recommended.
- CVE-2021-29425 | Oracle Helidon 1.4.7/2.2.0 CDI support path traversal (WID-SEC-2023-1359)by vuldb.com on February 12, 2026 at 3:28 am
A vulnerability labeled as problematic has been found in Oracle Helidon 1.4.7/2.2.0. This issue affects some unknown processing of the component CDI support. Such manipulation leads to path traversal. This vulnerability is documented as CVE-2021-29425. The attack can be executed remotely. There is not any exploit available. The affected component should be upgraded.








