CVE Alert: CVE-2025-2998
Vulnerability Summary: CVE-2025-2998 A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability...
Vulnerability Summary: CVE-2025-2998 A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability...
Vulnerability Summary: CVE-2025-27095 JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to...
Vulnerability Summary: CVE-2025-30203 Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site...
Vulnerability Summary: CVE-2025-30209 Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can...
Vulnerability Summary: CVE-2025-29929 Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing...
Vulnerability Summary: CVE-2025-29766 Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap has missing...
Vulnerability Summary: CVE-2025-30155 Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap does not...
Vulnerability Summary: CVE-2025-3002 A vulnerability, which was classified as critical, has been found in Digital China DCME-520 up to 20250320....
Vulnerability Summary: CVE-2025-30149 OpenEMR is a free and open source electronic health records and medical practice management application. OpenEMR allows...
Vulnerability Summary: CVE-2025-3047 When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and...
Vulnerability Summary: CVE-2025-3048 After completing a build with AWS Serverless Application Model Command Line Interface (SAM CLI) which include symlinks,...
Vulnerability Summary: CVE-2025-2794 An unsafe reflection vulnerability in Kentico Xperience allows an unauthenticated attacker to kill the current process, leading...
Vulnerability Summary: CVE-2025-30005 Xorcom CompletePBX is vulnerable to a path traversal via the Diagnostics reporting module, which will allow reading...
Vulnerability Summary: CVE-2025-2292 Xorcom CompletePBX is vulnerable to an authenticated path traversal, allowing for arbitrary file reads via the Backup...
Vulnerability Summary: CVE-2025-30004 Xorcom CompletePBX is vulnerable to command injection in the administrator Task Scheduler functionality, allowing for attackers to...
Vulnerability Summary: CVE-2025-3001 A vulnerability classified as critical was found in PyTorch 2.6.0. This vulnerability affects the function torch.lstm_cell. The...
Vulnerability Summary: CVE-2025-30368 Zulip is an open-source team collaboration tool. The API for deleting an organization export is supposed to...
Vulnerability Summary: CVE-2025-30223 Beego is an open-source web framework for the Go programming language. Prior to 2.3.6, a Cross-Site Scripting...
Vulnerability Summary: CVE-2025-31116 Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static...
Vulnerability Summary: CVE-2025-30369 Zulip is an open-source team collaboration tool. The API for deleting an organization custom profile field is...
Vulnerability Summary: CVE-2025-30006 Xorcom CompletePBX is vulnerable to a reflected cross-site scripting (XSS) in the administrative control panel. This issue...
Vulnerability Summary: CVE-2025-3003 A vulnerability, which was classified as critical, was found in ESAFENET CDG 3. Affected is an unknown...
Vulnerability Summary: CVE-2025-3005 A vulnerability was found in Sayski ForestBlog up to 20250321 and classified as problematic. Affected by this...
Vulnerability Summary: CVE-2025-3006 A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been declared as critical. This...