6.5
CVE-2025-68267 -
In JetBrains TeamCity before 2025.11.1 excessive privileges were possible due to storing GitHub personal access token instead of an installation token
5.4
CVE-2025-68166 -
In JetBrains TeamCity before 2025.11 a DOM-based XSS was possible on the OAuth connections tab
5.4
CVE-2025-68165 -
In JetBrains TeamCity before 2025.11 reflected XSS was possible on VCS Root setup
2.7
CVE-2025-68164 -
In JetBrains TeamCity before 2025.11 port enumeration was possible via the Perforce connection test
3.5
CVE-2025-68163 -
In JetBrains TeamCity before 2025.11 stored XSS was possible on agentpushInstall page
2.7
CVE-2025-68162 -
In JetBrains TeamCity before 2025.11 maven embedder allowed loading extensions via project configuration
8.1
CVE-2025-14432 - Poly Video - Sensitive Data Might Be Written to Log File
In limited scenarios, sensitive data might be written to the log file if an admin uses Microsoft Teams Admin Center (TAC) to make device configuration changes. The affected log file is visible only to users with admin credentials. This is limited to Microsoft TAC and does not affect configuration cβ¦
5
CVE-2025-62329 - HCL DevOps Deploy / HCL Launch is susceptible to an insufficient session expiration vulnerability
HCL DevOps Deploy / HCL Launch is susceptible to a race condition in http-session client-IP binding enforcement which may allow a session to be briefly reused from a new IP address before it is invalidated. This could lead to unauthorized access under certain network conditions.
0.0
CVE-2025-68262 - crypto: zstd - fix double-free in per-CPU stream cleanup
In the Linux kernel, the following vulnerability has been resolved: crypto: zstd - fix double-free in per-CPU stream cleanup The crypto/zstd module has a double-free bug that occurs when multiple tfms are allocated and freed. The issue happens because zstd_streams (per-CPU contexts) are freed inβ¦
5.3
CVE-2025-14780 - Xiongwei Smart Catering Cloud Platform dish_trade_detail_get sql injection
A vulnerability was detected in Xiongwei Smart Catering Cloud Platform 2.1.6446.28761. The affected element is an unknown function of the file /dishtrade/dish_trade_detail_get. The manipulation of the argument filter results in sql injection. The attack can be executed remotely. The exploit is now β¦