10
CVE-2025-12424 - Privilege Escalation through SUID-bit Binary
Privilege Escalation through SUID-bit Binary.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .
10
CVE-2025-12423 - Denial of Service - Protocol Manipulation
Protocol manipulation might lead to denial of service.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .
10
CVE-2025-12422 - Vulnerable Upgrade Feature (Arbitrary File Write)
Vulnerable Upgrade Feature (Arbitrary File Write) may lead to obtaining super user permissions on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
9.8
CVE-2025-36386 - There is a vulnerability in the IBM Maximo Manage application in IBM Maximo Application Suite for Cβ¦
IBM Maximo Application Suite 9.0.0 through 9.0.15 and 9.1.0 through 9.1.4 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.
7.1
CVE-2025-34294 - Wazuh File Integrity Monitoring (FIM) & Active Response Arbitrary File Deletion as SYSTEM
Wazuh's File Integrity Monitoring (FIM), when configured with automatic threat removal, contains a time-of-check/time-of-use (TOCTOU) race condition that can allow a local, low-privileged attacker to cause the Wazuh service (running as NT AUTHORITY\SYSTEM) to delete attacker-controlled files or patβ¦
3.1
CVE-2025-12150 - org.keycloak/keycloak-services: WebAuthn Attestation Statement Verification Bypass
No description is available for this CVE.
5.4
CVE-2025-36085 - Multiple Vulnerabilities in IBM Concert Software.
IBM Concert 1.0.0 through 2.0.0 Software is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.
6.2
CVE-2025-36083 - Multiple Vulnerabilities in IBM Concert Software.
IBM Concert Software 1.0.0 through 2.0.0Β could allow a local user to obtain sensitive information from buffers due to improper clearing of heap memory before release.
5.3
CVE-2025-36081 - Multiple Vulnerabilities in IBM Concert Software.
IBM ConcertΒ Software 1.0.0 through 2.0.0 could allow a user to modify system logs due to improper neutralization of log input.
8.7
CVE-2025-34311 - IPFire < v2.29 Command Injection via Proxy Report Creation
IPFire versions prior to 2.29 (Core Update 198) containΒ a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the user 'nobody' via multiple parameters when creating a Proxy report. When a user creates a Proxy report the application issues an HTTP β¦