9.1

CVSS3.1

CVE-2025-55130 - nodejs: Nodejs file permissions bypass

A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive fil…

📅 Published: Jan. 20, 2026, 8:41 p.m. 🔄 Last Modified: Feb. 26, 2026, 2:44 p.m.

5.3

CVSS3.1

CVE-2025-55132 - nodejs: Nodejs filesystem permissions bypass

A flaw in Node.js's permission model allows a file's access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in rea…

📅 Published: Jan. 20, 2026, 8:41 p.m. 🔄 Last Modified: Feb. 3, 2026, 9:27 p.m.

7.5

CVSS3.1

CVE-2025-59464 - nodejs: Nodejs memory leak

A memory leak in Node.js’s OpenSSL integration occurs when converting `X.509` certificate fields to UTF-8 without freeing the allocated buffer. When applications call `socket.getPeerCertificate(true)`, each certificate field leaks memory, allowing remote clients to trigger steady memory growth thro…

📅 Published: Jan. 20, 2026, 8:41 p.m. 🔄 Last Modified: Jan. 30, 2026, 8:26 p.m.

6.5

CVSS3.1

CVE-2026-0622 - Open 5GS WebUI uses a hard-coded JWT signing key

Open 5GS WebUI uses a hard-coded JWT signing key (change-me) whenever the environment variable JWT_SECRET_KEY is unset

📅 Published: Jan. 20, 2026, 7:56 p.m. 🔄 Last Modified: April 18, 2026, 4:45 a.m.

6.5

CVSS3.1

CVE-2026-1245 - CVE-2026-1245

A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. The library directly interpolates these values into dynamically generated code without sanitizat…

📅 Published: Jan. 20, 2026, 6:50 p.m. 🔄 Last Modified: April 18, 2026, 5 a.m.

6.7

CVSS3.1

CVE-2025-33231 -

NVIDIA Nsight Systems for Windows contains a vulnerability in the application’s DLL loading mechanism where an attacker could cause an uncontrolled search path element by exploiting insecure DLL search paths. A successful exploit of this vulnerability might lead to code execution, escalation of pri…

📅 Published: Jan. 20, 2026, 5:55 p.m. 🔄 Last Modified: Feb. 26, 2026, 2:44 p.m.

7.3

CVSS3.1

CVE-2025-33230 - nsight-systems: NVIDIA Nsight Systems for Linux: Privilege escalation and code execution via OS com…

NVIDIA Nsight Systems for Linux contains a vulnerability in the .run installer, where an attacker could cause an OS command injection by supplying a malicious string to the installation path. A successful exploit of this vulnerability might lead to escalation of privileges, code execution, data tam…

📅 Published: Jan. 20, 2026, 5:55 p.m. 🔄 Last Modified: Feb. 26, 2026, 2:44 p.m.

7.3

CVSS3.1

CVE-2025-33229 - nsight-systems: NVIDIA Nsight Visual Studio for Windows: Arbitrary Code Execution and Privilege Esc…

NVIDIA Nsight Visual Studio for Windows contains a vulnerability in Nsight Monitor where an attacker can execute arbitrary code with the same privileges as the NVIDIA Nsight Visual Studio Edition Monitor application. A successful exploit of this vulnerability may lead to escalation of privileges, c…

📅 Published: Jan. 20, 2026, 5:44 p.m. 🔄 Last Modified: Feb. 26, 2026, 2:44 p.m.

7.3

CVSS3.1

CVE-2025-33228 - nsight-systems: Nsight Systems: Arbitrary code execution via OS command injection

NVIDIA Nsight Systems contains a vulnerability in the gfx_hotspot recipe, where an attacker could cause an OS command injection by supplying a malicious string to the process_nsys_rep_cli.py script if the script is invoked manually. A successful exploit of this vulnerability might lead to code exec…

📅 Published: Jan. 20, 2026, 5:44 p.m. 🔄 Last Modified: Feb. 26, 2026, 2:44 p.m.

7.8

CVSS3.1

CVE-2025-33233 -

NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability where an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

📅 Published: Jan. 20, 2026, 5:43 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 347725
Page 1909 of 34,773
« previous page » next page
Filters