Vulnerabilities
Vulnerable Software
Security Vulnerabilities
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-09-25
In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-09-25
In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-09-25
PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-09-25
An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation.
CVSS Score
7.5
EPSS Score
0.0
Published
2025-09-25
Ericsson Indoor Connect 8855 contains an improper input validation vulnerability which if exploited can allow an attacker to execute commands with escalated privileges.
CVSS Score
9.8
EPSS Score
0.002
Published
2025-09-25
Ericsson Indoor Connect 8855 contains a missing authorization vulnerability which if exploited can allow access to the system as a user with higher privileges than intended.
CVSS Score
8.8
EPSS Score
0.0
Published
2025-09-25
Ericsson Indoor Connect 8855 contains a vulnerability where server-side security can be bypassed in the client which if exploited can lead to unauthorized disclosure of certain information.
CVSS Score
7.5
EPSS Score
0.0
Published
2025-09-25
Ericsson Indoor Connect 8855 contains a command injection vulnerability which if exploited can result in an escalation of privileges.
CVSS Score
7.8
EPSS Score
0.0
Published
2025-09-25
git-commiters is a Node.js function module providing committers stats for their git repository. Prior to version 0.1.2, there is a command injection vulnerability in git-commiters. This vulnerability manifests with the library's primary exported API: gitCommiters(options, callback) which allows specifying options such as cwd for current working directory and revisionRange as a revision pointer, such as HEAD. However, the library does not sanitize for user input or practice secure process execution API to separate commands from their arguments and as such, uncontrolled user input is concatenated into command execution. This issue has been patched in version 0.1.2.
CVSS Score
8.8
EPSS Score
0.005
Published
2025-09-25


Contact Us

Shodan ® - All rights reserved