Latest CVE Feed
-
4.0
MEDIUMCVE-2025-36601
Dell PowerScale OneFS, versions 9.5.0.0 through 9.11.0.0, contains an exposure of sensitive information to an unauthorized actor vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to Information disclos... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Information Disclosure
-
0.0
NACVE-2025-55551
An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Denial of Service
-
5.1
MEDIUMCVE-2025-40838
Ericsson Indoor Connect 8855 contains a vulnerability where server-side security can be bypassed in the client which if exploited can lead to unauthorized disclosure of user accounts.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2025-40837
Ericsson Indoor Connect 8855 contains a missing authorization vulnerability which if exploited can allow access to the system as a user with higher privileges than intended.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-59838
Monkeytype is a minimalistic and customizable typing test. In versions 25.36.0 and prior, improper handling of user input when loading a saved custom text results in XSS. This issue has been patched via commit f025b12.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Cross-Site Scripting
-
8.7
HIGHCVE-2025-40836
Ericsson Indoor Connect 8855 contains an improper input validation vulnerability which if exploited can lead to loss of integrity and confidentiality, as well as unauthorized disclosure and modification of of user and configuration data. It may also be... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Injection
-
9.5
CRITICALCVE-2020-36851
Rob -- W / cors-anywhere instances configured as an open proxy allow unauthenticated external users to induce the server to make HTTP requests to arbitrary targets (SSRF). Because the proxy forwards requests and headers, an attacker can reach internal-onl... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Server-Side Request Forgery
-
0.0
NACVE-2025-59832
Horilla is a free and open source Human Resource Management System (HRMS). Prior to version 1.4.0, there is a stored XSS vulnerability in the ticket comment editor. A low-privilege authenticated user could run arbitrary JavaScript in an admin’s browser, e... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Cross-Site Scripting
-
8.5
HIGHCVE-2025-27262
Ericsson Indoor Connect 8855 contains a command injection vulnerability which if exploited can lead to loss of integrity and confidentiality, as well as unauthorized disclosure and modification of user and configuration data. It may also be possible to ex... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Injection
-
3.3
LOWCVE-2025-36857
Rapid7 Appspider Pro versions below 7.5.021, suffer from a broken access control vulnerability in the application's configuration file loading mechanism, whereby an attacker can place files in directories belonging to other users or projects. Affected ver... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-59830
Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &, while still splitting on both & and ;. As a result, attackers could use ; separators to bypass the parame... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2025-10542
iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authentication
-
0.0
NACVE-2025-10950
A vulnerability was determined in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected is the function log_handler of the file ml_logger/server.py of the component Ping Handler. This manipulation of the argument data causes deserializ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Information Disclosure
-
0.0
NACVE-2025-10949
A vulnerability was found in Changsha Developer Technology iView Editor up to 1.1.1. This impacts an unknown function of the component Markdown Handler. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Cross-Site Scripting
-
0.0
NACVE-2025-10541
iMonitor EAM 9.6394 installs a system service (eamusbsrv64.exe) that runs with NT AUTHORITY\SYSTEM privileges. This service includes an insecure update mechanism that automatically loads files placed in the C:\sysupdate\ directory during startup. Because ... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-46153
PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-54942
A missing authentication for critical function vulnerability in SUNNET Corporate Training Management System before 10.11 allows remote attackers to access deployment functionality without prior authentication.... Read more
- Published: Aug. 30, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Authentication
-
0.0
NACVE-2025-46152
In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-46150
In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-46149
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.... Read more
Affected Products :- Published: Sep. 25, 2025
- Modified: Sep. 25, 2025
- Vuln Type: Misconfiguration