Filter and search through 196,925 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-52569 | GitForge.jl is a unified interface for interacting with Git "forges." Versions prior to 5.9.1 lack input validation of input validation for user-provi... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2025-52568 | NeKernal is a free and open-source operating system stack. Prior to version 0.0.3, there are several memory safety issues that can lead to memory corr... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52561 | HTMLSanitizer.jl is a Whitelist-based HTML sanitizer. Prior to version 0.2.1, when adding the style tag to the whitelist, content inside the tag is in... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52558 | ### Impact XSS - Errors in filters from website page change detection watches were not being filtered. ### Patches 0.50.4 | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-52557 | Mail-0's Zero is an open-source email solution. In version 0.8 it's possible for an attacker to craft an email that executes javascript leading to ses... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52556 | ### Impact `rfc3161-client` 1.0.2 and earlier contain a flaw in their timestamp response signature verification logic. In particular, it performs cha... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-52551 | E2 Facility Management Systems use a proprietary protocol that allows for unauthenticated file operations on any file in the file system. | 0.0 | 0 | Neutral | No | No |
| CVE-2025-5255 | The Phoenix Code's configuration on macOS, specifically the presence of entitlements: "com.apple.security.cs.allow-dyld-environment-variables" and "co... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-52542 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52484 | Due to a missing constraint in the rv32im circuit, any 3-register RISC-V instruction (including remu and divu) in risc0-zkvm 2.0.0, 2.0.1, and 2.0.2 a... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-52479 | HTTP.jl provides HTTP client and server functionality for Julia, and URIs.jl parses and works with Uniform Resource Identifiers (URIs). URIs.jl prior ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52472 | ### Impact The REST search URL is vulnerable to HQL injection via the `orderField` parameter. The specified value is added twice in the query, though... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-52463 | Cross-site request forgery vulnerability exists in Active! mail 6 BuildInfo: 6.60.06008562 and earlier. If this vulnerability is exploited, unintended... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52462 | Cross-site scripting vulnerability exists in Active! mail 6 BuildInfo: 6.30.01004145 to 6.60.06008562. If this vulnerability is exploited, an arbitrar... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52460 | Files or directories accessible to external parties issue exists in SS1 Ver.16.0.0.10 and earlier (Media version:16.0.0a and earlier). If exploited, u... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52445 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52444 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52443 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52442 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-52441 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |