Filter and search through 197,797 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-62405 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentati... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2025-62404 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentati... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-6240 | Improper Input Validation vulnerability in Profisee on Windows (filesystem modules) allows Path Traversal after authentication to the Profisee system.... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-62381 | ### Summary `sveltekit-superforms` v2.27.3 and prior are susceptible to a prototype pollution vulnerability within the `parseFormData` function of `fo... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-62380 | ### Summary An HTML injection vulnerability in plaintext emails generated by Mailgen has been discovered. Projecta are affected if the `Mailgen.gener... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-62376 | pwn.college DOJO is an education platform for learning cybersecurity. Prior to commit 467db0b9ea0d9a929dc89b41f6eb59f7cfc68bef, the /workspace endpoin... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-62375 | ### Impact This vulnerability only affects users of the AWS attestor. Users of the AWS attestor could have unknowingly received a forged identity doc... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-6237 | ### Path Traversal Vulnerability in InvokeAI A path traversal vulnerability in **InvokeAI** (versions < 6.7.0) allows an unauthenticated remote attac... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-62366 | ### Summary An HTML injection vulnerability in plaintext emails generated by Mailgen has been discovered. Your project is affected if you use the `Ma... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-62362 | gpp-burgerportaal is a Dutch government citizen portal application. In versions before 2.0.3, 3.0.2, and 4.0.1, the name and email address of employee... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-6225 | Kieback&Peter Neutrino-GLT product is used for building management. It's web component "SM70 PHWEB" is vulnerable to shell command injection via login... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-62225 | Optical Disc Archive Software provided by Sony Corporation registers a Windows service with an unquoted file path. A user with the write permission on... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-62192 | SQL Injection vulnerability exists in GroupSession Free edition prior to ver5.3.0, GroupSession byCloud prior to ver5.3.3, and GroupSession ZION prior... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-62189 | LogStare Collector contains an incorrect authorization vulnerability in UserRegistration. If exploited, a non-administrative user may create a new use... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-62182 | Pega Customer Service Framework versions 8.7.0 through 25.1.0 are affected by a Unrestricted file upload vulnerability, where a privileged user could ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-6218 | RARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user. | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2025-62173 | ## Summary Authenticated SQL Injection Vulnerability in Endpoint Module Rest API | 0.0 | 0 | Neutral | No | No |
| CVE-2025-62172 | ### Summary An authenticated party can add a malicious name to the Energy entity, allowing for Cross-Site Scripting attacks against anyone who can see... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-6216 | Allegra calculateTokenExpDate Password Recovery Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authenticati... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2025-62159 | External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. A vulnerability was... | 0.0 | 0 | Neutral | No | No |