Filter and search through 196,750 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-48793 | Rejected reason: Not used | 0.0 | 0 | Neutral | No |
| No |
| CVE-2025-48792 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48791 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48790 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48789 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48788 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48787 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48786 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48745 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-49113. Reason: This candidate is a reservation duplicate of CVE-2025-49113. No... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48741 | A Broken Access Control vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, and 5.4.0 before 5.4.10 allows remote, authentic... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48740 | A Cross-Site Request Forgery (CSRF) vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 befor... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48739 | A Server-Side Request Forgery (SSRF) vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 befo... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48738 | An e-mail flooding vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, 5.4.0 before 5.4.10, and 5.5.0 before 5.5.1 allows un... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48699 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidat... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48507 | The security state of the calling processor into Arm® Trusted Firmware (TF-A) is not used and could potentially allow non-secure processors access to ... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2025-48501 | An OS command injection issue exists in Nimesa Backup and Recovery v2.3 and v2.4. If this vulnerability is exploited, an arbitrary OS commands may be ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48497 | Cross-site request forgery vulnerability exists in iroha Board versions v0.10.12 and earlier. If a user accesses a specially crafted URL while being l... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48491 | Project AI is a platform designed to create AI agents. Prior to the pre-beta version, a hardcoded API key was present in the source code. This issue h... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-48490 | A validation bypass vulnerability was discovered prior to version 2.13.0, where multiple validations defined for the same attribute could be silently... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-48427 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |