NA - CVE-2025-27614 - Gitk is a Tcl/Tk based Git history browser....
Gitk is a Tcl/Tk based Git history browser. Starting with 2.41.0, a Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked...
Medium - CVE-2025-36090 - IBM Analytics Content Hub 2.0, 2.1, 2.2, and...
IBM Analytics Content Hub 2.0, 2.1, 2.2, and 2.3 could allow a remote attacker to obtain information about the application framework which could be used in reconnaissance to gather information for...
NA - CVE-2025-46334 - Git GUI allows you to use the Git source...
Git GUI allows you to use the Git source control management tools via a GUI. A malicious repository can ship versions of sh.exe or typical textconv filter programs such as astextplain. Due to the...
NA - CVE-2025-46835 - Git GUI allows you to use the Git source...
Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory...
Medium - CVE-2025-7365 - A flaw was found in Keycloak. When an...
A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be...
High - CVE-2025-7370 - A flaw was found in libsoup. A NULL pointer...
A flaw was found in libsoup. A NULL pointer dereference vulnerability occurs in libsoup's cookie parsing functionality. When processing a cookie without a domain parameter, the...
Low - CVE-2025-7408 - A vulnerability has been found in...
A vulnerability has been found in SourceCodester Zoo Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file...
NA - CVE-2025-46788 - Improper certificate validation in Zoom...
Improper certificate validation in Zoom Workplace for Linux before version 6.4.13 may allow an unauthorized user to conduct an information disclosure via network access.