Логотип exploitDog
source:"msrc"
Консоль
Логотип exploitDog

exploitDog

source:"msrc"

Количество 19 607

Количество 19 607

msrc логотип

CVE-2025-4664

11 месяцев назад

Chromium: CVE-2025-4664 Insufficient policy enforcement in Loader

EPSS: Низкий
msrc логотип

CVE-2025-46569

9 месяцев назад

OPA server Data API HTTP path injection of Rego

EPSS: Низкий
msrc логотип

CVE-2025-46421

11 месяцев назад

Libsoup: information disclosure may leads libsoup client sends authorization header to a different host when being redirected by a server

CVSS3: 6.8
EPSS: Низкий
msrc логотип

CVE-2025-46420

11 месяцев назад

Libsoup: memory leak on soup_header_parse_quality_list() via soup-headers.c

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2025-46394

4 месяца назад

In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences.

EPSS: Низкий
msrc логотип

CVE-2025-46334

9 месяцев назад

GitHub: CVE-2025-46334 Git Malicious Shell Vulnerability

EPSS: Низкий
msrc логотип

CVE-2025-46327

3 месяца назад

Go Snowflake Driver has race condition when checking access to Easy Logging configuration file

EPSS: Низкий
msrc логотип

CVE-2025-46153

6 месяцев назад

PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True.

EPSS: Низкий
msrc логотип

CVE-2025-46152

5 месяцев назад

In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2025-46150

6 месяцев назад

In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results.

EPSS: Низкий
msrc логотип

CVE-2025-46149

6 месяцев назад

In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.

EPSS: Низкий
msrc логотип

CVE-2025-46148

6 месяцев назад

In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.

EPSS: Низкий
msrc логотип

CVE-2025-4609

11 месяцев назад

Chromium: CVE-2025-4609 Incorrect handle provided in unspecified circumstances in Mojo

EPSS: Низкий
msrc логотип

CVE-2025-4598

7 месяцев назад

Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump

CVSS3: 4.7
EPSS: Низкий
msrc логотип

CVE-2025-45768

7 месяцев назад

pyjwt v2.10.1 was discovered to contain weak encryption. NOTE: this is disputed by the Supplier because the key length is chosen by the application that uses the library (admittedly, library users may benefit from a minimum value and a mechanism for opting in to strict enforcement).

EPSS: Низкий
msrc логотип

CVE-2025-4575

около 1 месяца назад

The x509 application adds trusted use instead of rejected use

EPSS: Низкий
msrc логотип

CVE-2025-4574

9 месяцев назад

Crossbeam-channel: crossbeam-channel vulnerable to double free on drop

CVSS3: 4.8
EPSS: Низкий
msrc логотип

CVE-2025-4565

8 месяцев назад

Unbounded recursion in Python Protobuf

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2025-4563

7 месяцев назад

Nodes can bypass dynamic resource allocation authorization checks

CVSS3: 2.7
EPSS: Низкий
msrc логотип

CVE-2025-45582

7 месяцев назад

GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in wh

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
msrc логотип
CVE-2025-4664

Chromium: CVE-2025-4664 Insufficient policy enforcement in Loader

0%
Низкий
11 месяцев назад
msrc логотип
CVE-2025-46569

OPA server Data API HTTP path injection of Rego

0%
Низкий
9 месяцев назад
msrc логотип
CVE-2025-46421

Libsoup: information disclosure may leads libsoup client sends authorization header to a different host when being redirected by a server

CVSS3: 6.8
1%
Низкий
11 месяцев назад
msrc логотип
CVE-2025-46420

Libsoup: memory leak on soup_header_parse_quality_list() via soup-headers.c

CVSS3: 6.5
1%
Низкий
11 месяцев назад
msrc логотип
CVE-2025-46394

In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences.

0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-46334

GitHub: CVE-2025-46334 Git Malicious Shell Vulnerability

0%
Низкий
9 месяцев назад
msrc логотип
CVE-2025-46327

Go Snowflake Driver has race condition when checking access to Easy Logging configuration file

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-46153

PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True.

0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-46152

In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument.

CVSS3: 5.3
0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-46150

In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results.

0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-46149

In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.

0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-46148

In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.

0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-4609

Chromium: CVE-2025-4609 Incorrect handle provided in unspecified circumstances in Mojo

0%
Низкий
11 месяцев назад
msrc логотип
CVE-2025-4598

Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump

CVSS3: 4.7
0%
Низкий
7 месяцев назад
msrc логотип
CVE-2025-45768

pyjwt v2.10.1 was discovered to contain weak encryption. NOTE: this is disputed by the Supplier because the key length is chosen by the application that uses the library (admittedly, library users may benefit from a minimum value and a mechanism for opting in to strict enforcement).

0%
Низкий
7 месяцев назад
msrc логотип
CVE-2025-4575

The x509 application adds trusted use instead of rejected use

0%
Низкий
около 1 месяца назад
msrc логотип
CVE-2025-4574

Crossbeam-channel: crossbeam-channel vulnerable to double free on drop

CVSS3: 4.8
0%
Низкий
9 месяцев назад
msrc логотип
CVE-2025-4565

Unbounded recursion in Python Protobuf

CVSS3: 5.3
0%
Низкий
8 месяцев назад
msrc логотип
CVE-2025-4563

Nodes can bypass dynamic resource allocation authorization checks

CVSS3: 2.7
0%
Низкий
7 месяцев назад
msrc логотип
CVE-2025-45582

GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in wh

0%
Низкий
7 месяцев назад

Уязвимостей на страницу