Latest CVE Feed
-
9.8
CRITICALCVE-2025-44893
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the ruleNamekey parameter in the web_acl_mgmt_Rules_Apply_post function.... Read more
- Published: May. 20, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-44883
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the tacIp parameter in the web_tacplus_serverEdit_post function.... Read more
- Published: May. 20, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
5.3
MEDIUMCVE-2025-2998
A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this att... Read more
Affected Products : pytorch- Published: Mar. 31, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-44891
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the host_ip parameter in the web_snmp_v3host_add_post function.... Read more
- Published: May. 20, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-44894
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the radDftParamKey parameter in the web_radiusSrv_dftParam_post function.... Read more
- Published: May. 20, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
5.3
MEDIUMCVE-2025-2999
A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been dis... Read more
Affected Products : pytorch- Published: Mar. 31, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-44896
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the bindEditMACName parameter in the web_acl_bindEdit_post function.... Read more
- Published: May. 20, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
5.3
MEDIUMCVE-2025-3000
A vulnerability classified as critical has been found in PyTorch 2.6.0. This affects the function torch.jit.script. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the p... Read more
Affected Products : pytorch- Published: Mar. 31, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
5.3
MEDIUMCVE-2025-3001
A vulnerability classified as critical was found in PyTorch 2.6.0. This vulnerability affects the function torch.lstm_cell. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the publi... Read more
Affected Products : pytorch- Published: Mar. 31, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-44897
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the bytftp_srvip parameter in the web_tool_upgradeManager_post function.... Read more
- Published: May. 20, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-44898
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the theauthName parameter in the web_aaa_loginAuthlistEdit function.... Read more
- Published: May. 20, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
5.4
MEDIUMCVE-2025-5064
Inappropriate implementation in Background Fetch API in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: May. 27, 2025
- Modified: May. 29, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-5065
Inappropriate implementation in FileSystemAccess API in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: May. 27, 2025
- Modified: May. 29, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2025-5066
Inappropriate implementation in Messages in Google Chrome on Android prior to 137.0.7151.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Mediu... Read more
- Published: May. 27, 2025
- Modified: May. 29, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-5067
Inappropriate implementation in Tab Strip in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: May. 27, 2025
- Modified: May. 29, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2025-5280
Out of bounds write in V8 in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: May. 27, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
5.4
MEDIUMCVE-2025-5281
Inappropriate implementation in BFCache in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially obtain user information via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: May. 27, 2025
- Modified: May. 29, 2025
- Vuln Type: Information Disclosure
-
6.2
MEDIUMCVE-2025-29918
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. A PCRE rule can be written that leads to an infinite loop when negated PCRE is used. Packet processing thread becomes stuck in infinite l... Read more
Affected Products : suricata- Published: Apr. 10, 2025
- Modified: May. 29, 2025
- Vuln Type: Denial of Service
-
6.2
MEDIUMCVE-2025-29917
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. The bytes setting in the decode_base64 keyword is not properly limited. Due to this, signatures using the keyword and setting can cause l... Read more
Affected Products : suricata- Published: Apr. 10, 2025
- Modified: May. 29, 2025
- Vuln Type: Memory Corruption
-
6.2
MEDIUMCVE-2025-29916
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Datasets declared in rules have an option to specify the `hashsize` to use. This size setting isn't properly limited, so the hash table a... Read more
Affected Products : suricata- Published: Apr. 10, 2025
- Modified: May. 29, 2025
- Vuln Type: Denial of Service