10

CVSS4.0

CVE-2025-12424 - Privilege Escalation through SUID-bit Binary

Privilege Escalation through SUID-bit Binary.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .

πŸ“… Published: Oct. 28, 2025, 6:18 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 6:18 p.m.

10

CVSS4.0

CVE-2025-12423 - Denial of Service - Protocol Manipulation

Protocol manipulation might lead to denial of service.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .

πŸ“… Published: Oct. 28, 2025, 6:14 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 6:14 p.m.

10

CVSS4.0

CVE-2025-12422 - Vulnerable Upgrade Feature (Arbitrary File Write)

Vulnerable Upgrade Feature (Arbitrary File Write) may lead to obtaining super user permissions on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

πŸ“… Published: Oct. 28, 2025, 6:09 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 6:09 p.m.

9.8

CVSS3.1

CVE-2025-36386 - There is a vulnerability in the IBM Maximo Manage application in IBM Maximo Application Suite for C…

IBM Maximo Application Suite 9.0.0 through 9.0.15 and 9.1.0 through 9.1.4 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.

πŸ“… Published: Oct. 28, 2025, 3:56 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 3:58 p.m.

7.1

CVSS4.0

CVE-2025-34294 - Wazuh File Integrity Monitoring (FIM) & Active Response Arbitrary File Deletion as SYSTEM

Wazuh's File Integrity Monitoring (FIM), when configured with automatic threat removal, contains a time-of-check/time-of-use (TOCTOU) race condition that can allow a local, low-privileged attacker to cause the Wazuh service (running as NT AUTHORITY\SYSTEM) to delete attacker-controlled files or pat…

πŸ“… Published: Oct. 28, 2025, 3:48 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 6:21 p.m.

3.1

CVSS3.1

CVE-2025-12150 - org.keycloak/keycloak-services: WebAuthn Attestation Statement Verification Bypass

No description is available for this CVE.

πŸ“… Published: Oct. 28, 2025, 3:04 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 3:04 p.m.

5.4

CVSS3.1

CVE-2025-36085 - Multiple Vulnerabilities in IBM Concert Software.

IBM Concert 1.0.0 through 2.0.0 Software is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.

πŸ“… Published: Oct. 28, 2025, 2:58 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 2:58 p.m.

6.2

CVSS3.1

CVE-2025-36083 - Multiple Vulnerabilities in IBM Concert Software.

IBM Concert Software 1.0.0 through 2.0.0Β could allow a local user to obtain sensitive information from buffers due to improper clearing of heap memory before release.

πŸ“… Published: Oct. 28, 2025, 2:55 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 2:55 p.m.

5.3

CVSS3.1

CVE-2025-36081 - Multiple Vulnerabilities in IBM Concert Software.

IBM ConcertΒ Software 1.0.0 through 2.0.0 could allow a user to modify system logs due to improper neutralization of log input.

πŸ“… Published: Oct. 28, 2025, 2:53 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 2:53 p.m.

8.7

CVSS4.0

CVE-2025-34311 - IPFire < v2.29 Command Injection via Proxy Report Creation

IPFire versions prior to 2.29 (Core Update 198) containΒ a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the user 'nobody' via multiple parameters when creating a Proxy report. When a user creates a Proxy report the application issues an HTTP …

πŸ“… Published: Oct. 28, 2025, 2:43 p.m. πŸ”„ Last Modified: Oct. 28, 2025, 2:43 p.m.
Total resulsts: 316071
Page 3 of 31,608
Β« previous page Β» next page
Filters