A vulnerability classified as problematic was found in Arista EOS up to 4.31.0/4.31.8M/4.32.7M/4.33.4M/4.34.1F. This affects an unknown part of the component OSPFv3 Packet Handler. Executing manipulation can lead to resource consumption.
This vulnerability is registered as CVE-2025-8872. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as critical has been found in vitejs vite-plugin-react up to 0.5.7. Affected by this issue is the function __vite_rsc_findSourceMapURL of the component React Server Component. Performing manipulation of the argument filename results in path traversal.
This vulnerability is cataloged as CVE-2025-68155. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in parse-server up to 8.6.1/9.1.0. Affected by this vulnerability is the function authData of the component Instagram Graph API. Such manipulation of the argument apiURL leads to server-side request forgery.
This vulnerability is listed as CVE-2025-68150. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Ampere AmpereOne AC03, AmpereOne AC04 and AmpereOne M. Affected is an unknown function of the component SMC Call Handler. This manipulation causes out-of-bounds write.
This vulnerability is tracked as CVE-2025-62862. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability labeled as very critical has been found in NVIDIA NeMo Framework. This impacts an unknown function of the component Model Loading. The manipulation results in deserialization.
This vulnerability is identified as CVE-2025-33212. The attack can be executed remotely. There is not any exploit available.
A vulnerability identified as critical has been detected in PimpMyLog 1.7.14. This affects an unknown function of the component Configuration Endpoint. The manipulation leads to improper authorization.
This vulnerability is referenced as CVE-2023-53895. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability categorized as critical has been discovered in NVIDIA Resiliency Extension on Linux. The impacted element is an unknown function of the component Checkpointing Core. Executing manipulation can lead to race condition.
The identification of this vulnerability is CVE-2025-33235. The attack can only be executed locally. There is no exploit available.
A vulnerability was found in NVIDIA NeMo Framework. It has been rated as critical. The affected element is an unknown function. Performing manipulation results in deserialization.
This vulnerability was named CVE-2025-33226. The attack needs to be approached locally. There is no available exploit.
A vulnerability was found in NVIDIA Resiliency Extension on Linux. It has been declared as critical. Impacted is an unknown function. Such manipulation leads to symlink following.
This vulnerability is uniquely identified as CVE-2025-33225. Local access is required to approach this attack. No exploit exists.
A vulnerability was found in Dulldusk phpfm 1.7.9. It has been classified as critical. This issue affects some unknown processing. This manipulation causes weak authentication.
This vulnerability is handled as CVE-2023-53894. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability was found in WebsiteBaker 2.13.3 and classified as critical. This vulnerability affects unknown code of the file /admin/media/delete.php of the component GET Handler. The manipulation of the argument path results in path traversal.
This vulnerability is known as CVE-2023-53902. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability has been found in Claris FileMaker Server up to 22.0.3 and classified as critical. This affects an unknown part of the component Apache Commons Text. The manipulation leads to code injection.
This vulnerability is traded as CVE-2025-46295. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in facelessuser pymdown-extensions up to 10.16.0. Affected by this issue is some unknown functionality of the component pymdownx.blocks.caption. Executing manipulation can lead to inefficient regular expression complexity.
This vulnerability appears as CVE-2025-68142. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in tox-dev filelock up to 3.20.0 on Python. Affected by this vulnerability is the function os.open of the component UnixFileLock/WindowsFileLock. Performing manipulation results in time-of-check time-of-use.
This vulnerability is reported as CVE-2025-68146. The attack requires a local approach. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Claris FileMaker Server up to 22.0.3. Affected is an unknown function of the component IIS Short Filename Enumeration. Such manipulation leads to information disclosure.
This vulnerability is documented as CVE-2025-46294. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability has been found in Linux Kernel up to 5.15.182/6.1.138/6.6.90/6.12.28/6.14.6 and classified as problematic. Affected by this issue is the function kobject_put. Performing manipulation results in uninitialized pointer.
This vulnerability is cataloged as CVE-2025-37995. The attack must originate from the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.14.8. It has been declared as critical. This issue affects the function hfsc_enqueue of the component sch_hfsc. The manipulation results in use after free.
This vulnerability is identified as CVE-2025-38000. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 5.15.183/6.1.139/6.6.91/6.12.29/6.14.7. This affects the function Change of the component net_sched. Executing manipulation can lead to null pointer dereference.
This vulnerability appears as CVE-2025-37992. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.