Vulnerabilities (CVE)

Total 312886 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-46817 2025-10-03 N/A 7.0 HIGH
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.
CVE-2025-44007 2025-10-03 N/A N/A
An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
CVE-2025-44006 2025-10-03 N/A N/A
An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
CVE-2025-33040 2025-10-03 N/A N/A
An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
CVE-2025-33039 2025-10-03 N/A N/A
An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
CVE-2025-33034 2025-10-03 N/A N/A
A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
CVE-2024-56804 2025-10-03 N/A N/A
An SQL injection vulnerability has been reported to affect Video Station. If a remote attacker gains a user account, they can then exploit the vulnerability to execute unauthorized code or commands. We have already fixed the vulnerability in the following version: Video Station 5.8.4 and later
CVE-2014-2358 1 Fox-it 1 Fox Datadiode 2025-10-03 4.3 MEDIUM N/A
Multiple cross-site request forgery (CSRF) vulnerabilities in the administrative web interface in the proxy server on Fox-IT Fox DataDiode appliances before 1.7.2 allow remote attackers to hijack the authentication of administrators for requests that (1) create administrative users, (2) remove administrative users, or (3) change permissions.
CVE-2014-2357 1 Subnet 1 Substation Server 2025-10-03 8.3 HIGH N/A
The GPT library in the Telegyr 8979 Master Protocol application in SUBNET SubSTATION Server 2 before SSNET 2.12 HF18808 allows remote attackers to cause a denial of service (persistent service crash) via a long RTU-to-Master message.
CVE-2014-2356 1 Innominate 1 Mguard Firmware 2025-10-03 4.3 MEDIUM N/A
Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request.
CVE-2025-55552 1 Linuxfoundation 1 Pytorch 2025-10-03 N/A 7.5 HIGH
pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together.
CVE-2025-55553 1 Linuxfoundation 1 Pytorch 2025-10-03 N/A 7.5 HIGH
A syntax error in the component proxy_tensor.py of pytorch v2.7.0 allows attackers to cause a Denial of Service (DoS).
CVE-2025-55554 1 Linuxfoundation 1 Pytorch 2025-10-03 N/A 5.3 MEDIUM
pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long().
CVE-2025-55556 1 Google 1 Tensorflow 2025-10-03 N/A 6.5 MEDIUM
TensorFlow v2.18.0 was discovered to output random results when compiling Embedding, leading to unexpected behavior in the application.
CVE-2025-55557 1 Linuxfoundation 1 Pytorch 2025-10-03 N/A 7.5 HIGH
A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS).
CVE-2025-55558 1 Linuxfoundation 1 Pytorch 2025-10-03 N/A 7.5 HIGH
A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS).
CVE-2025-55559 1 Google 1 Tensorflow 2025-10-03 N/A 7.5 HIGH
An issue was discovered TensorFlow v2.18.0. A Denial of Service (DoS) occurs when padding is set to 'valid' in tf.keras.layers.Conv2D.
CVE-2025-46148 1 Linuxfoundation 1 Pytorch 2025-10-03 N/A 5.3 MEDIUM
In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.
CVE-2025-46149 1 Linuxfoundation 1 Pytorch 2025-10-03 N/A 5.3 MEDIUM
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.
CVE-2025-46150 1 Linuxfoundation 1 Pytorch 2025-10-03 N/A 5.3 MEDIUM
In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results.