High - CVE-2025-1067 - There is an untrusted search path vulnerability...
There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious...
High - CVE-2025-1068 - There is an untrusted search path vulnerability...
There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious...
NA - CVE-2025-1204 - The "update" binary in the firmware of the...
The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers...
NA - CVE-2024-12368 - Improper access control in the auth_oauth...
Improper access control in the auth_oauth module of Odoo Community 15.0 and Odoo Enterprise 15.0 allows an internal user to export the OAuth tokens of other users.
NA - CVE-2025-23046 - GLPI is a free asset and IT management software...
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.18, if a "Mail servers" authentication provider is configured to use an Oauth connection...
NA - CVE-2025-25192 - GLPI is a free asset and IT management software...
GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 contains a patch. As...
NA - CVE-2024-36259 - Improper access control in mail module of Odoo...
Improper access control in mail module of Odoo Community 17.0 and Odoo Enterprise 17.0 allows remote authenticated attackers to extract sensitive information via an oracle-based (yes/no response)...
NA - CVE-2025-27135 - RAGFlow is an open-source RAG...
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and...
NA - CVE-2024-45417 - Uncontrolled resource consumption in the...
Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access.
NA - CVE-2024-45418 - Symlink following in the installer for some...
Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access.