Search CVE reports


Toggle filters

1 – 10 of 47 results


CVE-2026-40489

Medium priority
Needs evaluation

editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any...

1 affected package

editorconfig-core

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
editorconfig-core Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-4538

Medium priority
Needs evaluation

A vulnerability was identified in PyTorch 2.10.0. The affected element is an unknown function of the component pt2 Loading Handler. The manipulation leads to deserialization. The attack can only be performed from a...

1 affected package

pytorch

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pytorch Needs evaluation Not in release Needs evaluation
Show less packages

CVE-2026-24747

Medium priority
Needs evaluation

PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with...

1 affected package

pytorch

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pytorch Not in release Needs evaluation
Show less packages

CVE-2025-63396

Medium priority
Needs evaluation

An issue was discovered in PyTorch v2.5 and v2.7.1. Omission of profiler.stop() can cause torch.profiler.profile (PythonTracer) to crash or hang during finalization, leading to a Denial of Service (DoS).

1 affected package

pytorch

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pytorch Not in release Needs evaluation
Show less packages

CVE-2025-55560

Medium priority
Needs evaluation

An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor.

1 affected package

pytorch

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pytorch Not in release Needs evaluation
Show less packages

CVE-2025-55558

Medium priority
Needs evaluation

A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS).

1 affected package

pytorch

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pytorch Not in release Needs evaluation
Show less packages

CVE-2025-55557

Medium priority
Needs evaluation

A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS).

1 affected package

pytorch

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pytorch Needs evaluation Not in release Needs evaluation
Show less packages

CVE-2025-55554

Medium priority
Needs evaluation

pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long().

1 affected package

pytorch

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pytorch Not in release Needs evaluation
Show less packages

CVE-2025-55553

Medium priority
Needs evaluation

A syntax error in the component proxy_tensor.py of pytorch v2.7.0 allows attackers to cause a Denial of Service (DoS).

1 affected package

pytorch

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pytorch Needs evaluation Not in release Needs evaluation
Show less packages

CVE-2025-55552

Medium priority
Needs evaluation

pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together.

1 affected package

pytorch

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
pytorch Not in release Needs evaluation
Show less packages