A vulnerability was found in Meta ExecuTorch. It has been rated as critical. This issue affects some unknown processing of the component Model Loader. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2025-54950. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in astral-sh uv up to 0.8.5 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to interpretation conflict.
This vulnerability is known as CVE-2025-54368. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in withastro astro up to 5.12.7 and classified as problematic. This issue affects some unknown processing. The manipulation leads to open redirect.
The identification of this vulnerability is CVE-2025-54793. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Easy Hosting Control Panel EHCP 20.04.1.b. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument ftpusername leads to cross site scripting.
This vulnerability is handled as CVE-2025-50927. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Mitel MiCollab up to 10.0 SP1 FP1 and classified as critical. This vulnerability affects unknown code of the component Suite Applications Services. The manipulation leads to sql injection.
This vulnerability was named CVE-2025-52914. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Mitel MiCollab up to 9.8 SP2. This affects an unknown part of the component NuPoint Unified Messaging. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2025-52913. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in International Components for Unicode. It has been rated as critical. Affected by this issue is the function utext_setNativeIndex. The manipulation leads to out-of-bounds write.
This vulnerability is handled as CVE-2017-7867. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in International Components for Unicode. This affects the function utext_moveIndex32. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2017-7868. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in libblockdev and classified as critical. This issue affects some unknown processing of the component udisks. The manipulation leads to execution with unnecessary privileges.
The identification of this vulnerability is CVE-2025-6019. Local access is required to approach this attack. There is no exploit available.
Sixty malicious Ruby gems containing credential-stealing code have been downloaded over 275,000 times since March 2023, targeting developer accounts. [...]
A vulnerability was found in FoxCMS up to 1.2.5 and classified as critical. This issue affects some unknown processing of the file admin/template_file/editFile.html. The manipulation leads to code injection.
The identification of this vulnerability is CVE-2025-50692. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in XODA 0.4.5 and classified as critical. Affected by this issue is the function Upload of the component POST Request Handler. The manipulation leads to unrestricted upload. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is handled as CVE-2012-10045. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Zenoss Core 3.x. It has been declared as critical. Affected by this vulnerability is the function Popen of the file ZenossInfo.py of the component showdaemonXMLConfig Endpoint. The manipulation of the argument daemon leads to path traversal. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is known as CVE-2012-10048. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in WPO WebPageTest up to 2.6. Affected is an unknown function of the file resultimage.php. The manipulation leads to unrestricted upload.
This vulnerability is traded as CVE-2012-10049. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Imagination Graphics DDK up to 1.15 RTM/1.17 RTM/1.18 RTM/25.1 RTM1. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to use after free.
This vulnerability is handled as CVE-2025-46709. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Imagination Graphics DDK up to 1.15 RTM/1.17 RTM/1.18 RTM/24.3 RTM/25.1 RTM0. This affects an unknown part of the component Trusted Execution Environment. The manipulation leads to improper handling of insufficient permissions or privileges.
This vulnerability is uniquely identified as CVE-2025-6573. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.