Количество 18 769
Количество 18 769
CVE-2025-46150
In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results.
CVE-2025-46149
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.
CVE-2025-46148
In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.
CVE-2025-4609
Chromium: CVE-2025-4609 Incorrect handle provided in unspecified circumstances in Mojo
CVE-2025-4598
Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump
CVE-2025-45768
pyjwt v2.10.1 was discovered to contain weak encryption. NOTE: this is disputed by the Supplier because the key length is chosen by the application that uses the library (admittedly, library users may benefit from a minimum value and a mechanism for opting in to strict enforcement).
CVE-2025-4575
The x509 application adds trusted use instead of rejected use
CVE-2025-4574
Crossbeam-channel: crossbeam-channel vulnerable to double free on drop
CVE-2025-4565
Unbounded recursion in Python Protobuf
CVE-2025-4563
Nodes can bypass dynamic resource allocation authorization checks
CVE-2025-45582
GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in wh
CVE-2025-4517
Arbitrary writes via tarfile realpath overflow
CVE-2025-4516
Use-after-free in "unicode_escape" decoder with error handler
CVE-2025-44905
hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5Z__filter_scaleoffset function.
CVE-2025-44904
hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5VM_memcpyvv function.
CVE-2025-4476
Libsoup: null pointer dereference in libsoup may lead to denial of service
CVE-2025-4435
Tarfile extracts filtered members when errorlevel=0
CVE-2025-4432
Ring: some aes functions may panic when overflow checking is enabled in ring
CVE-2025-43857
net-imap rubygem vulnerable to possible DoS by memory exhaustion
CVE-2025-4373
Glib: buffer underflow on glib through glib/gstring.c via function g_string_insert_unichar
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-46150 In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results. | 0% Низкий | 4 месяца назад | ||
CVE-2025-46149 In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error. | 0% Низкий | 4 месяца назад | ||
CVE-2025-46148 In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results. | 0% Низкий | 4 месяца назад | ||
CVE-2025-4609 Chromium: CVE-2025-4609 Incorrect handle provided in unspecified circumstances in Mojo | 0% Низкий | 9 месяцев назад | ||
CVE-2025-4598 Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump | CVSS3: 4.7 | 0% Низкий | 5 месяцев назад | |
CVE-2025-45768 pyjwt v2.10.1 was discovered to contain weak encryption. NOTE: this is disputed by the Supplier because the key length is chosen by the application that uses the library (admittedly, library users may benefit from a minimum value and a mechanism for opting in to strict enforcement). | 0% Низкий | 5 месяцев назад | ||
CVE-2025-4575 The x509 application adds trusted use instead of rejected use | 0% Низкий | 19 дней назад | ||
CVE-2025-4574 Crossbeam-channel: crossbeam-channel vulnerable to double free on drop | CVSS3: 4.8 | 0% Низкий | 7 месяцев назад | |
CVE-2025-4565 Unbounded recursion in Python Protobuf | CVSS3: 5.3 | 0% Низкий | 7 месяцев назад | |
CVE-2025-4563 Nodes can bypass dynamic resource allocation authorization checks | CVSS3: 2.7 | 0% Низкий | 5 месяцев назад | |
CVE-2025-45582 GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in wh | 0% Низкий | 5 месяцев назад | ||
CVE-2025-4517 Arbitrary writes via tarfile realpath overflow | CVSS3: 9.4 | 0% Низкий | 7 месяцев назад | |
CVE-2025-4516 Use-after-free in "unicode_escape" decoder with error handler | 0% Низкий | 7 месяцев назад | ||
CVE-2025-44905 hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5Z__filter_scaleoffset function. | CVSS3: 7.3 | 0% Низкий | 5 месяцев назад | |
CVE-2025-44904 hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5VM_memcpyvv function. | 0% Низкий | около 2 месяцев назад | ||
CVE-2025-4476 Libsoup: null pointer dereference in libsoup may lead to denial of service | CVSS3: 4.3 | 0% Низкий | 7 месяцев назад | |
CVE-2025-4435 Tarfile extracts filtered members when errorlevel=0 | CVSS3: 6.5 | 0% Низкий | 5 месяцев назад | |
CVE-2025-4432 Ring: some aes functions may panic when overflow checking is enabled in ring | CVSS3: 3.7 | 0% Низкий | около 1 месяца назад | |
CVE-2025-43857 net-imap rubygem vulnerable to possible DoS by memory exhaustion | 0% Низкий | 3 месяца назад | ||
CVE-2025-4373 Glib: buffer underflow on glib through glib/gstring.c via function g_string_insert_unichar | CVSS3: 6.5 | 0% Низкий | 5 месяцев назад |
Уязвимостей на страницу