Latest CVE Feed
-
6.5
MEDIUMCVE-2025-20362
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are r... Read more
- Actively Exploited
- Published: Sep. 25, 2025
- Modified: Oct. 21, 2025
- Vuln Type: Authentication
-
9.9
CRITICALCVE-2025-20333
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device... Read more
- Actively Exploited
- Published: Sep. 25, 2025
- Modified: Oct. 21, 2025
- Vuln Type: Injection
-
9.0
HIGHCVE-2025-10953
A security vulnerability has been detected in UTT 1200GW and 1250GW up to 3.0.0-170831/3.2.2-200710. This vulnerability affects unknown code of the file /goform/formApMail. The manipulation of the argument senderEmail leads to buffer overflow. The attack ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 26, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-10952
A security flaw has been discovered in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected by this issue is the function stream_handler of the file ml_logger/server.py of the component File Handler. Performing manipulation of the arg... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 26, 2025
- Vuln Type: Information Disclosure
-
5.5
MEDIUMCVE-2025-10911
A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 26, 2025
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2024-48014
Dell BSAFE Micro Edition Suite, versions prior to 5.0.2.3 contain an Out-of-bounds Write vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service.... Read more
Affected Products : bsafe_micro-edition-suite- Published: Sep. 25, 2025
- Modified: Sep. 26, 2025
- Vuln Type: Memory Corruption
-
5.4
MEDIUMCVE-2025-59838
Monkeytype is a minimalistic and customizable typing test. In versions 25.36.0 and prior, improper handling of user input when loading a saved custom text results in XSS. This issue has been patched via commit f025b12.... Read more
Affected Products : monkeytype- Published: Sep. 25, 2025
- Modified: Oct. 03, 2025
- Vuln Type: Cross-Site Scripting
-
9.9
CRITICALCVE-2025-59832
Horilla is a free and open source Human Resource Management System (HRMS). Prior to version 1.4.0, there is a stored XSS vulnerability in the ticket comment editor. A low-privilege authenticated user could run arbitrary JavaScript in an admin’s browser, e... Read more
Affected Products : horilla- Published: Sep. 25, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-59830
Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &, while still splitting on both & and ;. As a result, attackers could use ; separators to bypass the parame... Read more
Affected Products : rack- Published: Sep. 25, 2025
- Modified: Oct. 10, 2025
- Vuln Type: Denial of Service
-
9.9
CRITICALCVE-2025-59823
Project Gardener implements the automated management and operation of Kubernetes clusters as a service. Code injection may be possible in Gardener Extensions for AWS providers prior to version 1.64.0, Azure providers prior to version 1.55.0, OpenStack pro... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 26, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2025-55551
An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation.... Read more
Affected Products : pytorch- Published: Sep. 25, 2025
- Modified: Oct. 03, 2025
- Vuln Type: Denial of Service
-
5.3
MEDIUMCVE-2025-46153
PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True.... Read more
Affected Products : pytorch- Published: Sep. 25, 2025
- Modified: Oct. 03, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-46152
In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument.... Read more
Affected Products : pytorch- Published: Sep. 25, 2025
- Modified: Oct. 03, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-46150
In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results.... Read more
Affected Products : pytorch- Published: Sep. 25, 2025
- Modified: Oct. 03, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-46149
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.... Read more
Affected Products : pytorch- Published: Sep. 25, 2025
- Modified: Oct. 03, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-46148
In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.... Read more
Affected Products : pytorch- Published: Sep. 25, 2025
- Modified: Oct. 03, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-40838
Ericsson Indoor Connect 8855 contains a vulnerability where server-side security can be bypassed in the client which if exploited can lead to unauthorized disclosure of certain information.... Read more
- Published: Sep. 25, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2025-40837
Ericsson Indoor Connect 8855 contains a missing authorization vulnerability which if exploited can allow access to the system as a user with higher privileges than intended.... Read more
- Published: Sep. 25, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-40836
Ericsson Indoor Connect 8855 contains an improper input validation vulnerability which if exploited can allow an attacker to execute commands with escalated privileges.... Read more
- Published: Sep. 25, 2025
- Modified: Oct. 02, 2025
- Vuln Type: Injection
-
3.3
LOWCVE-2025-36857
Rapid7 Appspider Pro versions below 7.5.021, suffer from a broken access control vulnerability in the application's configuration file loading mechanism, whereby an attacker can place files in directories belonging to other users or projects. Affected ver... Read more
Affected Products : appspider_pro- Published: Sep. 25, 2025
- Modified: Sep. 26, 2025
- Vuln Type: Authorization