Filter and search through 199,058 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-9160 | A code execution security issue exists in the affected product. An attacker with physical access could abuse the maintenance menu of the controller wi... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2025-9158 | The Request Tracker software is vulnerable to a Stored XSS vulnerability in calendar invitation parsing feature, which displays invitation data withou... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-9141 | ### Summary An unsafe deserialization vulnerability allows any authenticated user to execute arbitrary code on the server if they are able to get the ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-9127 | A vulnerability exists in PX Enterprise whereby sensitive information may be logged under specific conditions. | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9124 | A denial-of-service security issue in the affected product. The security issue stems from a fault occurring when a crafted CIP unconnected explicit me... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9118 | A path traversal vulnerability in the NPM package installation process of Google Cloud Dataform allows a remote attacker to read and write files in ot... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9092 | Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0 bc-fips (API modules) allows... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9074 | A vulnerability was identified in Docker Desktop that allows local running Linux containers to access the Docker Engine API via the configured Docker ... | 0.0 | 0 | Viral | Yes | No |
| CVE-2025-9071 | Erroneously using an all-zero seed for RSA-OEAP padding instead of the generated random bytes, in Oberon microsystems AG’s Oberon PSA Crypto library i... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9066 | A security issue was discovered within FactoryTalk® ViewPoint, allowing unauthenticated attackers to achieve XXE. Certain SOAP requests can be abused ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9059 | The Altiris Core Agent Updater package (AeXNSC.exe) is prone to an elevation of privileges vulnerability through DLL hijacking. | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9043 | The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnera... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9042 | A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IY8 device. It causes the module to ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9041 | A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IF8 device. It causes the module to ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9038 | Improper Privilege Management vulnerability in GE Vernova S1 Agile Configuration Software on Windows allows Privilege Escalation.This issue affects S1... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-9036 | A security issue in the runtime event system allows unauthenticated connections to receive a reusable API token. This token is broadcasted over a WebS... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-8997 | An Information Exposure vulnerability has been identified in OpenText Enterprise Security Manager. The vulnerability could be remotely exploited. | 0.0 | 0 | Neutral | No | No |
| CVE-2025-8917 | A vulnerability in clearml versions before 2.0.2 allows for path traversal due to improper handling of symbolic and hard links in the `safe_extract` f... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-8916 | Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java bcpkix, bcprov, bcpkix-f... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-8915 | Hardcoded TLS private key and certificate in firmware in Kiloview N30 2.02.246 allows malicious adversary to do a Mann-in-the-middle attack via the ne... | 0.0 | 0 | Neutral | No | No |