Skip to content

File tree

7 files changed

+250
-0
lines changed

7 files changed

+250
-0
lines changed
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-33r8-vrx9-rmcv",
4+
"modified": "2025-08-08T00:30:26Z",
5+
"published": "2025-08-08T00:30:26Z",
6+
"aliases": [
7+
"CVE-2025-54952"
8+
],
9+
"details": "An integer overflow vulnerability in the loading of ExecuTorch models can cause smaller-than-expected memory regions to be allocated, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 8f062d3f661e20bb19b24b767b9a9a46e8359f2b.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54952"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/pytorch/executorch/commit/8f062d3f661e20bb19b24b767b9a9a46e8359f2b"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.facebook.com/security/advisories/cve-2025-54952"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2025-08-08T00:15:26Z"
32+
}
33+
}
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-84m3-f99p-cqx5",
4+
"modified": "2025-08-08T00:30:26Z",
5+
"published": "2025-08-08T00:30:26Z",
6+
"aliases": [
7+
"CVE-2025-30405"
8+
],
9+
"details": "An integer overflow vulnerability in the loading of ExecuTorch models can cause objects to be placed outside their allocated memory area, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 0830af8207240df8d7f35b984cdf8bc35d74fa73.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30405"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/pytorch/executorch/commit/0830af8207240df8d7f35b984cdf8bc35d74fa73"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.facebook.com/security/advisories/cve-2025-30405"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2025-08-07T23:15:26Z"
32+
}
33+
}
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9m39-3mf3-xwch",
4+
"modified": "2025-08-08T00:30:26Z",
5+
"published": "2025-08-08T00:30:26Z",
6+
"aliases": [
7+
"CVE-2025-54949"
8+
],
9+
"details": "A heap buffer overflow vulnerability in the loading of ExecuTorch models can potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit ede82493dae6d2d43f8c424e7be4721abe5242be",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54949"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/pytorch/executorch/commit/ede82493dae6d2d43f8c424e7be4721abe5242be"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.facebook.com/security/advisories/cve-2025-54949"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2025-08-07T23:15:26Z"
32+
}
33+
}
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-f9hx-c6jf-3qxm",
4+
"modified": "2025-08-08T00:30:26Z",
5+
"published": "2025-08-08T00:30:26Z",
6+
"aliases": [
7+
"CVE-2025-54950"
8+
],
9+
"details": "An out-of-bounds access vulnerability in the loading of ExecuTorch models can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit fb03b6f85596a8f954d97929075335255b6a58d4.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54950"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/pytorch/executorch/commit/fb03b6f85596a8f954d97929075335255b6a58d4"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.facebook.com/security/advisories/cve-2025-54950"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2025-08-07T23:15:26Z"
32+
}
33+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gm99-3cg7-mhwr",
4+
"modified": "2025-08-08T00:30:26Z",
5+
"published": "2025-08-08T00:30:26Z",
6+
"aliases": [
7+
"CVE-2025-8702"
8+
],
9+
"details": "A vulnerability classified as critical has been found in Wanzhou WOES Intelligent Optimization Energy Saving System 1.0. This affects an unknown part of the file /CommonSolution/GetVariableByOneIDNew of the component Historical Data Query Module. The manipulation of the argument ObjectID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [],
21+
"references": [
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8702"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://github.com/si12/xxx/issues/2"
29+
},
30+
{
31+
"type": "WEB",
32+
"url": "https://vuldb.com/?ctiid.319131"
33+
},
34+
{
35+
"type": "WEB",
36+
"url": "https://vuldb.com/?id.319131"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://vuldb.com/?submit.621217"
41+
}
42+
],
43+
"database_specific": {
44+
"cwe_ids": [
45+
"CWE-74"
46+
],
47+
"severity": "MODERATE",
48+
"github_reviewed": false,
49+
"github_reviewed_at": null,
50+
"nvd_published_at": "2025-08-08T00:15:26Z"
51+
}
52+
}
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hj95-mhgf-jxc4",
4+
"modified": "2025-08-08T00:30:26Z",
5+
"published": "2025-08-08T00:30:26Z",
6+
"aliases": [
7+
"CVE-2025-30404"
8+
],
9+
"details": "An integer overflow vulnerability in the loading of ExecuTorch models can cause overlapping allocations, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit d158236b1dc84539c1b16843bc74054c9dcba006.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30404"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/pytorch/executorch/commit/d158236b1dc84539c1b16843bc74054c9dcba006"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.facebook.com/security/advisories/cve-2025-30404"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2025-08-07T23:15:26Z"
32+
}
33+
}
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-xc7w-r669-48pf",
4+
"modified": "2025-08-08T00:30:26Z",
5+
"published": "2025-08-08T00:30:26Z",
6+
"aliases": [
7+
"CVE-2025-54951"
8+
],
9+
"details": "A group of related buffer overflow vulnerabilities in the loading of ExecuTorch models can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit cea9b23aa8ff78aff92829a466da97461cc7930c.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54951"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/pytorch/executorch/commit/cea9b23aa8ff78aff92829a466da97461cc7930c"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://www.facebook.com/security/advisories/cve-2025-54951"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [],
28+
"severity": null,
29+
"github_reviewed": false,
30+
"github_reviewed_at": null,
31+
"nvd_published_at": "2025-08-07T23:15:26Z"
32+
}
33+
}

0 commit comments

Comments
 (0)