9.8
CVE-2025-12380 - Use-after-free in WebGPU internals triggered from a compromised child process
Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability was fixed in Firefox 144.0.2.
7.8
CVE-2025-53855 -
An out-of-bounds write vulnerability exists in the XML parser functionality of GCC Productions Inc. Fade In 4.2.0. A specially crafted .fadein file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.
7.8
CVE-2025-53814 -
A use-after-free vulnerability exists in the XML parser functionality of GCC Productions Inc. Fade In 4.2.0. A specially crafted .xml file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
0.0
CVE-2025-64162 -
Not used
0.0
CVE-2025-64159 -
Not used
0.0
CVE-2025-64161 -
Not used
0.0
CVE-2025-64160 -
Not used
0.0
CVE-2025-64158 -
Not used
7.5
CVE-2025-1038 -
The βDiagnostics Toolsβ page of the web-based configuration utility does not properly validate user-controlled input, allowing an authenticated user with high privileges to inject commands into the command shell of the TropOS 4th Gen device. The injected commands can be exploited to execute severalβ¦
7.5
CVE-2025-1037 -
By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particular set of scripts and executables that alloβ¦