Latest CVE Feed
-
0.0
NACVE-2022-50542
In the Linux kernel, the following vulnerability has been resolved: media: si470x: Fix use-after-free in si470x_int_in_callback() syzbot reported use-after-free in si470x_int_in_callback() [1]. This indicates that urb->context, which contains struct si... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50538
In the Linux kernel, the following vulnerability has been resolved: vme: Fix error not catched in fake_init() In fake_init(), __root_device_register() is possible to fail but it's ignored, which can cause unregistering vme_root fail when exit. general... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
-
0.0
NACVE-2022-50535
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix potential null-deref in dm_resume [Why] Fixing smatch error: dm_resume() error: we previously assumed 'aconnector->dc_link' could be null [How] Check if dc_link nu... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
-
0.0
NACVE-2022-50529
In the Linux kernel, the following vulnerability has been resolved: test_firmware: fix memory leak in test_firmware_init() When misc_register() failed in test_firmware_init(), the memory pointed by test_fw_config->name is not released. The memory leak i... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50518
In the Linux kernel, the following vulnerability has been resolved: parisc: Fix locking in pdc_iodc_print() firmware call Utilize pdc_lock spinlock to protect parallel modifications of the iodc_dbuf[] buffer, check length to prevent buffer overflow of i... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50509
In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kmalloc As the kmalloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
5.4
MEDIUMCVE-2025-37728
Insufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from a Crowdstrike connector in another space by creating and running a Crowdstrike connecto... Read more
Affected Products : kibana- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Information Disclosure
-
9.3
CRITICALCVE-2025-61774
PyVista provides 3D plotting and mesh analysis through an interface for the Visualization Toolkit (VTK). Version 0.46.3 of the PyVista Project is vulnerable to remote code execution via dependency confusion. Two pieces of code use`--extra-index-url`. But ... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Supply Chain
-
5.8
MEDIUMCVE-2025-59452
The YoSmart YoLink API through 2025-10-02 uses an endpoint URL that is derived from a device's MAC address along with an MD5 hash of non-secret information, such as a key that begins with cf50.... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
2.2
LOWCVE-2025-59447
The YoSmart YoLink Smart Hub device 0382 exposes a UART debug interface. An attacker with direct physical access can leverage this interface to read a boot log, which includes network access credentials.... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Information Disclosure
-
9.1
CRITICALCVE-2025-57247
The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList() and setSpecialAddress() ... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Authorization
-
8.5
HIGHCVE-2025-36355
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.... Read more
- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Cross-Site Scripting
-
9.6
CRITICALCVE-2025-59159
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.13.4, the web user interface for SillyTavern is s... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2023-53636
In the Linux kernel, the following vulnerability has been resolved: clk: microchip: fix potential UAF in auxdev release callback Similar to commit 1c11289b34ab ("peci: cpu: Fix use-after-free in adev_release()"), the auxiliary device is not torn down in... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53633
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Fix a leak in map_user_pages() If get_user_pages_fast() allocates some pages but not as many as we wanted, then the current code leaks those pages. Call put_page() on the p... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2023-53620
In the Linux kernel, the following vulnerability has been resolved: md: fix soft lockup in status_resync status_resync() will calculate 'curr_resync - recovery_active' to show user a progress bar like following: [============>........] resync = 61.4% ... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Denial of Service
-
0.0
NACVE-2022-50540
In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom-adm: fix wrong sizeof config in slave_config Fix broken slave_config function that uncorrectly compare the peripheral_size with the size of the config pointer instead of... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50539
In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: omap4-common: Fix refcount leak bug In omap4_sram_init(), of_find_compatible_node() will return a node pointer with refcount incremented. We should use of_node_put() when i... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
-
0.0
NACVE-2022-50515
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix memory leak in hpd_rx_irq_create_workqueue() If construction of the array of work queues to handle hpd_rx_irq offload work fails, we need to unwind. Destroy all the crea... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50513
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() In rtw_init_cmd_priv(), if `pcmdpriv->rsp_allocated_buf` is allocated in failure, then `pcmdpriv->cmd_allocated_bu... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption