CVE-2025-60018
glib-networking’s OpenSSL backend fails to properly check the return value of a call to BIO_write(), resulting in an out of bounds read. More information : https://access.redhat.com/security/cve/CVE-2025-60018
glib-networking’s OpenSSL backend fails to properly check the return value of a call to BIO_write(), resulting in an out of bounds read. More information : https://access.redhat.com/security/cve/CVE-2025-60018
glib-networking’s OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location. More information : https://access.redhat.com/security/cve/CVE-2025-60019
An issue was discovered TensorFlow v2.18.0. A Denial of Service (DoS) occurs when padding is set to ‘valid’ in tf.keras.layers.Conv2D. More information : https://gist.github.com/shaoyuyoung/0e7d2a586297ae9c8ed14d8706749efc
An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor. More information : https://gist.github.com/shaoyuyoung/0e7d2a586297ae9c8ed14d8706749efc
An issue in O-RAN Near Realtime RIC ric-plt-submgr in the J-Release environment, allows remote attackers to cause a denial of service (DoS) via a crafted request to the Subscription Manager API component. More information...
Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as...
Dell Cloud Disaster Recovery, version(s) prior to 19.20, contain(s) an Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability. A high privileged attacker with local access could potentially exploit...
pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together. More information : https://gist.github.com/shaoyuyoung/0e7d2a586297ae9c8ed14d8706749efc
A syntax error in the component proxy_tensor.py of pytorch v2.7.0 allows attackers to cause a Denial of Service (DoS). More information : https://gist.github.com/shaoyuyoung/0e7d2a586297ae9c8ed14d8706749efc
pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long(). More information : https://gist.github.com/shaoyuyoung/0e7d2a586297ae9c8ed14d8706749efc
TensorFlow v2.18.0 was discovered to output random results when compiling Embedding, leading to unexpected behavior in the application. More information : https://gist.github.com/shaoyuyoung/0e7d2a586297ae9c8ed14d8706749efc
A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS). More information : https://gist.github.com/shaoyuyoung/0e7d2a586297ae9c8ed14d8706749efc
A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS). More information : https://gist.github.com/shaoyuyoung/0e7d2a586297ae9c8ed14d8706749efc
Dell Crypto-J generates an error message that includes sensitive information about its environment and associated data. A remote attacker could potentially exploit this vulnerability, leading to information exposure. More information : https://www.dell.com/support/kbdoc/en-us/000296144/dsa-2025-100-dell-bsafe-crypto-j-security-update