CVE-2025-46149
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error. More information : https://gist.github.com/shaoyuyoung/4bcefba4004f8271e64b5185c95a248a
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error. More information : https://gist.github.com/shaoyuyoung/4bcefba4004f8271e64b5185c95a248a
In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results. More information : https://gist.github.com/shaoyuyoung/4bcefba4004f8271e64b5185c95a248a
In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the “other” argument. More information : https://gist.github.com/shaoyuyoung/4bcefba4004f8271e64b5185c95a248a
Rapid7 Appspider Pro versions below 7.5.021, suffer from a broken access control vulnerability in the application’s configuration file loading mechanism, whereby an attacker can place files in directories belonging to other users or projects. Affected...
Ericsson Indoor Connect 8855 contains an improper input validation vulnerability which if exploited can allow an attacker to execute commands with escalated privileges. More information : https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25
Ericsson Indoor Connect 8855 contains a missing authorization vulnerability which if exploited can allow access to the system as a user with higher privileges than intended. More information : https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25
Ericsson Indoor Connect 8855 contains a vulnerability where server-side security can be bypassed in the client which if exploited can lead to unauthorized disclosure of certain information. More information : https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25
A vulnerability was determined in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected is the function log_handler of the file ml_logger/server.py of the component Ping Handler. This manipulation of the argument data causes deserialization. It is...
A vulnerability was identified in geyang ml-logger up to acf255bade5be6ad88d90735c8367b28cbe3a743. Affected by this vulnerability is the function log_handler of the file ml_logger/server.py. Such manipulation of the argument File leads to path traversal. It is...
Ericsson Indoor Connect 8855 contains a command injection vulnerability which if exploited can result in an escalation of privileges. More information : https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25
Dell PowerScale OneFS, versions 9.5.0.0 through 9.11.0.0, contains an exposure of sensitive information to an unauthorized actor vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to Information disclosure. More information :...
iMonitor EAM 9.6394 installs a system service (eamusbsrv64.exe) that runs with NT AUTHORITYSYSTEM privileges. This service includes an insecure update mechanism that automatically loads files placed in the C:sysupdate directory during startup. Because any...
iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM...
A vulnerability was found in Changsha Developer Technology iView Editor up to 1.1.1. This impacts an unknown function of the component Markdown Handler. The manipulation results in cross site scripting. The attack may be...