Latest CVE Feed
-
0.0
NACVE-2025-55551
An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2025-46153
PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-46152
In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-46150
In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-46149
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-46148
In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
6.2
MEDIUMCVE-2025-43346
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 26, watchOS 26, iOS 18.7 and iPadOS 18.7, visionOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. Processing a maliciously crafted media file may lead to une... Read more
- Published: Sep. 15, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Memory Corruption
-
5.1
MEDIUMCVE-2025-40838
Ericsson Indoor Connect 8855 contains a vulnerability where server-side security can be bypassed in the client which if exploited can lead to unauthorized disclosure of user accounts.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2025-40837
Ericsson Indoor Connect 8855 contains a missing authorization vulnerability which if exploited can allow access to the system as a user with higher privileges than intended.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authorization
-
8.7
HIGHCVE-2025-40836
Ericsson Indoor Connect 8855 contains an improper input validation vulnerability which if exploited can lead to loss of integrity and confidentiality, as well as unauthorized disclosure and modification of of user and configuration data. It may also be... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Injection
-
3.3
LOWCVE-2025-36857
Rapid7 Appspider Pro versions below 7.5.021, suffer from a broken access control vulnerability in the application's configuration file loading mechanism, whereby an attacker can place files in directories belonging to other users or projects. Affected ver... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authorization
-
4.0
MEDIUMCVE-2025-36601
Dell PowerScale OneFS, versions 9.5.0.0 through 9.11.0.0, contains an exposure of sensitive information to an unauthorized actor vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to Information disclos... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Information Disclosure
-
8.5
HIGHCVE-2025-27262
Ericsson Indoor Connect 8855 contains a command injection vulnerability which if exploited can lead to loss of integrity and confidentiality, as well as unauthorized disclosure and modification of user and configuration data. It may also be possible to ex... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2025-10951
A vulnerability was identified in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected by this vulnerability is the function log_handler of the file ml_logger/server.py. Such manipulation of the argument File leads to path traversal. ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Path Traversal
-
4.8
MEDIUMCVE-2025-10949
A vulnerability was found in Changsha Developer Technology iView Editor up to 1.1.1. This impacts an unknown function of the component Markdown Handler. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Cross-Site Scripting
-
9.0
HIGHCVE-2025-10948
A vulnerability has been found in MikroTik RouterOS 7. This affects the function parse_json_element of the file /rest/ip/address/print of the component libjson.so. The manipulation leads to buffer overflow. The attack is possible to be carried out remotel... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-10542
iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authentication
-
0.0
NACVE-2025-10541
iMonitor EAM 9.6394 installs a system service (eamusbsrv64.exe) that runs with NT AUTHORITY\SYSTEM privileges. This service includes an insecure update mechanism that automatically loads files placed in the C:\sysupdate\ directory during startup. Because ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
9.5
CRITICALCVE-2020-36851
Rob -- W / cors-anywhere instances configured as an open proxy allow unauthenticated external users to induce the server to make HTTP requests to arbitrary targets (SSRF). Because the proxy forwards requests and headers, an attacker can reach internal-onl... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Server-Side Request Forgery
-
9.8
CRITICALCVE-2025-34186
Ilevia EVE X1/X5 Server version ≤ 4.7.18.0.eden contains a vulnerability in its authentication mechanism. Unsanitized input is passed to a system() call for authentication, allowing attackers to inject special characters and manipulate command parsing. Du... Read more
- Published: Sep. 16, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authentication