0.0

CVE-2025-67512 -

The vulnerability is dependency-based.

πŸ“… Published: Dec. 8, 2025, 9:46 p.m. πŸ”„ Last Modified: Dec. 10, 2025, 11:27 p.m.

6.5

CVSS3.1

CVE-2025-36017 - IBM Controller Information Disclosure

IBM Controller 11.1.0 through 11.1.1 and IBM Cognos Controller 11.0.0 through 11.0.1 FP6Β stores unencrypted sensitive information in environmental variables files which can be obtained by an authenticated user.

πŸ“… Published: Dec. 8, 2025, 9:37 p.m. πŸ”„ Last Modified: Dec. 10, 2025, 6:08 p.m.

6.3

CVSS4.0

CVE-2025-14276 - Ilevia EVE X1 Server leaf_search.php command injection

A vulnerability was determined in Ilevia EVE X1 Server up to 4.6.5.0.eden. Impacted is an unknown function of the file /ajax/php/leaf_search.php. This manipulation of the argument line causes command injection. The attack can be initiated remotely. A high degree of complexity is needed for the atta…

πŸ“… Published: Dec. 8, 2025, 9:32 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

2.7

CVSS3.1

CVE-2025-36102 - IBM Controller Validation Bypass

IBM Controller 11.1.0 through 11.1.1 and IBM Cognos Controller 11.0.0 through 11.0.1 FP6 could allow a privileged user to bypass validation, passing user input into the application as trusted data, due to client-side enforcement of server-side security.

πŸ“… Published: Dec. 8, 2025, 9:30 p.m. πŸ”„ Last Modified: Dec. 10, 2025, 6:14 p.m.

4.3

CVSS3.1

CVE-2025-33111 - IBM Controller Information Disclosure

IBM Controller 11.1.0 through 11.1.1 and IBM Cognos Controller 11.0.0 through 11.0.1 FP6 is vulnerable to creation of temporary files without atomic operations which may expose sensitive information to an authenticated user due to race condition attacks.

πŸ“… Published: Dec. 8, 2025, 9:28 p.m. πŸ”„ Last Modified: Dec. 10, 2025, 6:13 p.m.

6.5

CVSS3.1

CVE-2025-36015 - IBM Controller Denial of Service

IBM Controller 11.1.0 through 11.1.1 and IBM Cognos Controller 11.0.0 through 11.0.1 FP6 could allow an authenticated user to cause a denial of service due to improper validation of a specified quantity size input.

πŸ“… Published: Dec. 8, 2025, 9:22 p.m. πŸ”„ Last Modified: Dec. 10, 2025, 6:11 p.m.

0.0

CVE-2025-67503 -

This CVE is a duplicate of another CVE.

πŸ“… Published: Dec. 8, 2025, 9:19 p.m. πŸ”„ Last Modified: Dec. 10, 2025, 12:01 a.m.

0.0

CVE-2025-67497 -

Further research determined the issue is not a vulnerability.

πŸ“… Published: Dec. 8, 2025, 8:58 p.m. πŸ”„ Last Modified: Dec. 9, 2025, 10:54 p.m.

0.0

CVE-2025-67498 -

Further research determined the issue is not a vulnerability.

πŸ“… Published: Dec. 8, 2025, 8:58 p.m. πŸ”„ Last Modified: Dec. 9, 2025, 10:58 p.m.

7.1

CVSS3.1

CVE-2025-14261 - Lack of entropy allows registered low-privileged users of Litmus to crack valid JWT tokens and gain…

The Litmus platform uses JWT for authentication and authorization, but the secret being used for signing the JWT is only 6 bytes long at its core, which makes it extremely easy to crack.

πŸ“… Published: Dec. 8, 2025, 6:12 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 346616
Page 2512 of 34,662
Β« previous page Β» next page
Filters