Latest CVE Feed
-
2.4
LOWCVE-2025-59838
Monkeytype is a minimalistic and customizable typing test. In versions 25.36.0 and prior, improper handling of user input when loading a saved custom text results in XSS. This issue has been patched via commit f025b12.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Cross-Site Scripting
-
9.9
CRITICALCVE-2025-59832
Horilla is a free and open source Human Resource Management System (HRMS). Prior to version 1.4.0, there is a stored XSS vulnerability in the ticket comment editor. A low-privilege authenticated user could run arbitrary JavaScript in an admin’s browser, e... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Cross-Site Scripting
-
6.0
MEDIUMCVE-2025-59422
Dify is an open-source LLM app development platform. In version 1.8.1, a broken access control vulnerability on the /console/api/apps/<APP_ID>chat-messages?conversation_id=<CONVERSATION_ID>&limit=10 endpoint allows users in the same workspace to read chat... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-57446
An issue in O-RAN Near Realtime RIC ric-plt-submgr in the J-Release environment, allows remote attackers to cause a denial of service (DoS) via a crafted request to the Subscription Manager API component.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-57318
A Prototype Pollution vulnerability in the toCsv function of csvjson versions thru 5.1.0 allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.... Read more
Affected Products :- Published: Sep. 24, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Injection
-
0.0
NACVE-2025-55560
An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2025-55559
An issue was discovered TensorFlow v2.18.0. A Denial of Service (DoS) occurs when padding is set to 'valid' in tf.keras.layers.Conv2D.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2025-55558
A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS).... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-55557
A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS).... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2025-55556
TensorFlow v2.18.0 was discovered to output random results when compiling Embedding, leading to unexpected behavior in the application.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-55554
pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long().... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-55553
A syntax error in the component proxy_tensor.py of pytorch v2.7.0 allows attackers to cause a Denial of Service (DoS).... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2025-55552
pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
-
6.7
MEDIUMCVE-2025-43943
Dell Cloud Disaster Recovery, version(s) prior to 19.20, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vu... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Injection
-
4.4
MEDIUMCVE-2025-33116
IBM Watson Studio 4.0 through 5.2.0 on Cloud Pak for Data is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Cross-Site Scripting
-
5.9
MEDIUMCVE-2025-26333
Dell Crypto-J generates an error message that includes sensitive information about its environment and associated data. A remote attacker could potentially exploit this vulnerability, leading to information exposure.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Information Disclosure
-
9.0
CRITICALCVE-2025-20363
A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticat... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Injection
-
9.0
HIGHCVE-2025-10953
A security vulnerability has been detected in UTT 1200GW and 1250GW up to 3.0.0-170831/3.2.2-200710. This vulnerability affects unknown code of the file /goform/formApMail. The manipulation of the argument senderEmail leads to buffer overflow. The attack ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-10952
A security flaw has been discovered in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected by this issue is the function stream_handler of the file ml_logger/server.py of the component File Handler. Performing manipulation of the arg... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-10950
A vulnerability was determined in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected is the function log_handler of the file ml_logger/server.py of the component Ping Handler. This manipulation of the argument data causes deserializ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Information Disclosure