Filter and search through 198,092 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-65106 | ## Context A template injection vulnerability exists in LangChain's prompt template system that allows attackers to access Python object internals th... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2025-65102 | PJSIP is a free and open source multimedia communication library. Prior to version 2.16, Opus PLC may zero-fill the input frame as long as the decoder... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-65100 | Isar is an integration system for automated root filesystem generation. In versions 0.11-rc1 and 0.11, defining ISAR_APT_SNAPSHOT_DATE alone does not ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65097 | RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. Prior to 4.4.1 and 4.4.... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65096 | RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. Prior to 4.4.1 and 4.4.... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65095 | Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other. Prior to version 1.35... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65092 | ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.1, 5.4.3, and 5.3.4, when the ESP32-P4 uses its hardware JPEG... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65081 | An out-of-bounds read vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65080 | A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65079 | A heap-based buffer overflow vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be lev... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65078 | An untrusted search path vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be l... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65077 | A relative path traversal vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65072 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65071 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65070 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-6507 | A vulnerability in the h2oai/h2o-3 repository allows attackers to exploit deserialization of untrusted data, potentially leading to arbitrary code exe... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65069 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65068 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65067 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-65066 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |