NA - CVE-2025-7027 - A vulnerability in the Software SMI handler...
A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control both the read and write addresses used by the CommandRcx1 function. The write target is derived...
NA - CVE-2025-7028 - A vulnerability in the Software SMI handler...
A vulnerability in the Software SMI handler (SwSmiInputValue 0x20) allows a local attacker to supply a crafted pointer (FuncBlock) through RBX and RCX register values. This pointer is passed...
NA - CVE-2025-7029 - A vulnerability in the Software SMI handler...
A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and...
NA - CVE-2024-47065 - Meshtastic is an open source mesh networking...
Meshtastic is an open source mesh networking solution. Prior to 2.5.1, traceroute responses from the remote node are not rate limited. Given that there are SNR measurements attributed to each...
NA - CVE-2025-43856 - immich is a high performance self-hosted photo...
immich is a high performance self-hosted photo and video management solution. Prior to 1.132.0, immich is vulnerable to account hijacking through oauth2, because the state parameter is not being...
NA - CVE-2025-45582 - GNU Tar through 1.35 allows file overwrite via...
GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to...
Medium - CVE-2025-7450 - A vulnerability was found in letseeqiji gorobbs...
A vulnerability was found in letseeqiji gorobbs up to 1.0.8. It has been classified as critical. This affects the function ResetUserAvatar of the file controller/api/v1/user.go of the component...