NA - CVE-2025-40914 - Perl CryptX before version 0.087 contains a...
Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX embeds a version of the libtommath library that is susceptible to an integer overflow...
Medium - CVE-2025-4605 - A maliciously crafted .usdc file, when loaded...
A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability. A malicious actor may leverage this vulnerability to cause a...
NA - CVE-2025-4922 - Nomad Community and Nomad Enterprise (“Nomad”)...
Nomad Community and Nomad Enterprise (“Nomad”) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in...
Medium - CVE-2025-0163 - IBM Security Verify Access Appliance and Docker...
IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate usernames due to an observable response discrepancy of disabled accounts.
Medium - CVE-2025-3473 - IBM Security Guardium 12.1 could allow a local...
IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due to insecure inherited permissions created by the program.