Latest CVE Feed
-
0.0
NACVE-2025-46149
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-46148
In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
6.2
MEDIUMCVE-2025-43346
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 26, watchOS 26, iOS 18.7 and iPadOS 18.7, visionOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. Processing a maliciously crafted media file may lead to une... Read more
- Published: Sep. 15, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Memory Corruption
-
5.1
MEDIUMCVE-2025-40838
Ericsson Indoor Connect 8855 contains a vulnerability where server-side security can be bypassed in the client which if exploited can lead to unauthorized disclosure of user accounts.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2025-40837
Ericsson Indoor Connect 8855 contains a missing authorization vulnerability which if exploited can allow access to the system as a user with higher privileges than intended.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authorization
-
8.7
HIGHCVE-2025-40836
Ericsson Indoor Connect 8855 contains an improper input validation vulnerability which if exploited can lead to loss of integrity and confidentiality, as well as unauthorized disclosure and modification of of user and configuration data. It may also be... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Injection
-
3.3
LOWCVE-2025-36857
Rapid7 Appspider Pro versions below 7.5.021, suffer from a broken access control vulnerability in the application's configuration file loading mechanism, whereby an attacker can place files in directories belonging to other users or projects. Affected ver... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authorization
-
4.0
MEDIUMCVE-2025-36601
Dell PowerScale OneFS, versions 9.5.0.0 through 9.11.0.0, contains an exposure of sensitive information to an unauthorized actor vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to Information disclos... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Information Disclosure
-
8.5
HIGHCVE-2025-27262
Ericsson Indoor Connect 8855 contains a command injection vulnerability which if exploited can lead to loss of integrity and confidentiality, as well as unauthorized disclosure and modification of user and configuration data. It may also be possible to ex... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2025-10951
A vulnerability was identified in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected by this vulnerability is the function log_handler of the file ml_logger/server.py. Such manipulation of the argument File leads to path traversal. ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2025-10950
A vulnerability was determined in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected is the function log_handler of the file ml_logger/server.py of the component Ping Handler. This manipulation of the argument data causes deserializ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Information Disclosure
-
4.8
MEDIUMCVE-2025-10949
A vulnerability was found in Changsha Developer Technology iView Editor up to 1.1.1. This impacts an unknown function of the component Markdown Handler. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Cross-Site Scripting
-
9.0
HIGHCVE-2025-10948
A vulnerability has been found in MikroTik RouterOS 7. This affects the function parse_json_element of the file /rest/ip/address/print of the component libjson.so. The manipulation leads to buffer overflow. The attack is possible to be carried out remotel... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-10542
iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authentication
-
0.0
NACVE-2025-10541
iMonitor EAM 9.6394 installs a system service (eamusbsrv64.exe) that runs with NT AUTHORITY\SYSTEM privileges. This service includes an insecure update mechanism that automatically loads files placed in the C:\sysupdate\ directory during startup. Because ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
9.5
CRITICALCVE-2020-36851
Rob -- W / cors-anywhere instances configured as an open proxy allow unauthenticated external users to induce the server to make HTTP requests to arbitrary targets (SSRF). Because the proxy forwards requests and headers, an attacker can reach internal-onl... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Server-Side Request Forgery
-
0.0
NACVE-2025-59841
Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even afte... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authentication
-
0.0
NACVE-2025-55557
A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS).... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Denial of Service
-
5.5
MEDIUMCVE-2025-10911
A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-55556
TensorFlow v2.18.0 was discovered to output random results when compiling Embedding, leading to unexpected behavior in the application.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration