Filter and search through 196,734 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-48497 | Cross-site request forgery vulnerability exists in iroha Board versions v0.10.12 and earlier. If a user accesses a specially crafted URL while being l... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2025-48491 | Project AI is a platform designed to create AI agents. Prior to the pre-beta version, a hardcoded API key was present in the source code. This issue h... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48490 | A validation bypass vulnerability was discovered prior to version 2.13.0, where multiple validations defined for the same attribute could be silently... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-48427 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48426 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48425 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48424 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48423 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48422 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48421 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48420 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48419 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48387 | ### Impact v3.0.8, v2.1.2, v1.16.4 and below ### Patches Has been patched in 3.0.9, 2.1.3, and 1.16.5 ### Workarounds You can use the ignore option... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-48385 | Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full acce... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-48374 | ### Summary When using Keycloak as an oidc provider, the clientsecret gets printed into the container stdout logs for an example at container startup.... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-48370 | ### Impact The library functions `getUserById`, `deleteUser`, `updateUserById`, `listFactors` and `deleteFactor` did not require the user supplied val... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-48059 | ### Impact _What kind of vulnerability is it? Who is impacted?_ This is an advisory for a **potential polynomial Regular Expression Denial of Service... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-48058 | ### Impact _What kind of vulnerability is it? Who is impacted?_ This is an advisory for a **potential polynomial Regular Expression Denial of Service... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-48054 | ### Impact This is a prototype pollution vulnerability. It impacts users of the `set` function within the Radashi library. If an attacker can control... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-4805 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS.... | 0.0 | 0 | Neutral | No | No |