9.8

CVSS3.1

CVE-2025-12380 - Use-after-free in WebGPU internals triggered from a compromised child process

Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability was fixed in Firefox 144.0.2.

πŸ“… Published: Oct. 28, 2025, 2:06 p.m. πŸ”„ Last Modified: April 20, 2026, 7:15 p.m.

7.8

CVSS3.1

CVE-2025-53855 -

An out-of-bounds write vulnerability exists in the XML parser functionality of GCC Productions Inc. Fade In 4.2.0. A specially crafted .fadein file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“… Published: Oct. 28, 2025, 1:45 p.m. πŸ”„ Last Modified: Dec. 2, 2025, 4:04 p.m.

7.8

CVSS3.1

CVE-2025-53814 -

A use-after-free vulnerability exists in the XML parser functionality of GCC Productions Inc. Fade In 4.2.0. A specially crafted .xml file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“… Published: Oct. 28, 2025, 1:45 p.m. πŸ”„ Last Modified: Dec. 2, 2025, 4:04 p.m.

0.0

CVE-2025-64162 -

Not used

πŸ“… Published: Oct. 28, 2025, 12:26 p.m. πŸ”„ Last Modified: Oct. 29, 2025, 3:55 a.m.

0.0

CVE-2025-64159 -

Not used

πŸ“… Published: Oct. 28, 2025, 12:26 p.m. πŸ”„ Last Modified: Oct. 29, 2025, 3:55 a.m.

0.0

CVE-2025-64161 -

Not used

πŸ“… Published: Oct. 28, 2025, 12:26 p.m. πŸ”„ Last Modified: Oct. 29, 2025, 3:55 a.m.

0.0

CVE-2025-64160 -

Not used

πŸ“… Published: Oct. 28, 2025, 12:26 p.m. πŸ”„ Last Modified: Oct. 29, 2025, 3:55 a.m.

0.0

CVE-2025-64158 -

Not used

πŸ“… Published: Oct. 28, 2025, 12:26 p.m. πŸ”„ Last Modified: Oct. 29, 2025, 3:55 a.m.

7.5

CVSS4.0

CVE-2025-1038 -

The β€œDiagnostics Tools” page of the web-based configuration utility does not properly validate user-controlled input, allowing an authenticated user with high privileges to inject commands into the command shell of the TropOS 4th Gen device. The injected commands can be exploited to execute several…

πŸ“… Published: Oct. 28, 2025, 12:17 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.5

CVSS4.0

CVE-2025-1037 -

By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particular set of scripts and executables that allo…

πŸ“… Published: Oct. 28, 2025, 12:16 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 349182
Page 3239 of 34,919
Β« previous page Β» next page
Filters