Search

Search Results (325339 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-22185 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22184 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22183 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22182 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22181 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22180 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22155 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22154 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-69412 1 Kde 1 Messagelib 2026-01-01 3.4 Low
KDE messagelib before 25.11.90 ignores SSL errors for threatMatches:find in the Google Safe Browsing Lookup API (aka phishing API), which might allow spoofing of threat data. NOTE: this Lookup API is not contacted in the messagelib default configuration.
CVE-2025-67711 2025-12-31 6.1 Medium
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
CVE-2025-67710 2025-12-31 6.1 Medium
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
CVE-2025-67709 2025-12-31 6.1 Medium
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
CVE-2025-67708 2025-12-31 6.1 Medium
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
CVE-2025-67707 2025-12-31 5.6 Medium
ArcGIS Server version 11.5 and earlier on Windows and Linux does not properly validate uploaded files file, which allows remote attackers to upload arbitrary files.
CVE-2025-67706 2025-12-31 5.6 Medium
ArcGIS Server version 11.5 and earlier on Windows and Linux does not properly validate uploaded files file, which allows remote attackers to upload arbitrary files.
CVE-2025-67705 2025-12-31 6.1 Medium
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
CVE-2025-67704 2025-12-31 6.1 Medium
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
CVE-2025-67703 2025-12-31 6.1 Medium
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
CVE-2025-15107 2 Actionsky, Actiontech 2 Sqle, Sqle 2025-12-31 3.7 Low
A security vulnerability has been detected in actiontech sqle up to 4.2511.0. The impacted element is an unknown function of the file sqle/utils/jwt.go of the component JWT Secret Handler. The manipulation of the argument JWTSecretKey leads to use of hard-coded cryptographic key . The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report and is planning to fix this flaw in an upcoming release.
CVE-2025-68943 1 Gitea 1 Gitea 2025-12-31 5.3 Medium
Gitea before 1.21.8 inadvertently discloses users' login times by allowing (for example) the lastlogintime explore/users sort order.