Direct Check - CyberPanel Incorrect Default Permissions Vulnerability (CVE-2024-51378) | CVE-2024-51378 | 2025/7/21 | development |
oracle CPUJul2025: Primavera P6 Enterprise Project Portfolio Management | CVE-2025-48734, CVE-2025-50061 | 2025/7/15 | development |
oracle CPUJul2025: WebCenter Portal | CVE-2024-38477, CVE-2024-26308, CVE-2024-25710, CVE-2024-52046, CVE-2024-8176, CVE-2024-38472, CVE-2024-56171, CVE-2025-30065, CVE-2024-38819, CVE-2024-57699, CVE-2025-48734, CVE-2025-27553, CVE-2024-12801, CVE-2024-21131, CVE-2025-31651, CVE-2025-50073, CVE-2025-30759, CVE-2025-27113, CVE-2025-30474, CVE-2024-8184, CVE-2022-45693, CVE-2024-21094, CVE-2024-38820, CVE-2025-30762, CVE-2025-50061, CVE-2024-38828, CVE-2025-27818, CVE-2025-32415, CVE-2025-27819, CVE-2025-50060, CVE-2024-24795, CVE-2024-47072, CVE-2025-50064, CVE-2023-39017, CVE-2024-47561, CVE-2024-6763, CVE-2025-31650, CVE-2025-49146, CVE-2025-50072, CVE-2025-31672, CVE-2025-0725, CVE-2025-30753, CVE-2023-42917, CVE-2024-47554, CVE-2024-39884, CVE-2025-24928, CVE-2024-12798, CVE-2025-32414, CVE-2025-23184, CVE-2025-29482, CVE-2025-27817, CVE-2024-13176, CVE-2024-9143 | 2025/7/15 | development |
oracle CPUJul2025: NoSQL Database | CVE-2023-44483, CVE-2025-30748, CVE-2020-13936, CVE-2025-24970, CVE-2024-57699, CVE-2025-50062, CVE-2025-23083, CVE-2025-23085, CVE-2025-23084, CVE-2025-25193, CVE-2025-27820, CVE-2025-30747, CVE-2024-13176, CVE-2024-9143, CVE-2024-26143 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Cluster 9.3.1 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-23016, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Cluster 9.2.1 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-30760, CVE-2024-37891, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-23016, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
oracle CPUJul2025: Oracle E-Business Suite | CVE-2025-30743, CVE-2025-50090, CVE-2025-30744, CVE-2025-30739, CVE-2025-30746, CVE-2025-50105, CVE-2025-50071, CVE-2025-30745, CVE-2025-50107 | 2025/7/15 | development |
oracle CPUJul2025: Business Intelligence Enterprise Edition | CVE-2025-50060, CVE-2025-30065, CVE-2025-48734, CVE-2025-23184, CVE-2025-50061, CVE-2025-30759 | 2025/7/15 | development |
oracle CPUJul2025: Identity Manager | CVE-2024-38477, CVE-2024-26308, CVE-2024-25710, CVE-2024-52046, CVE-2024-8176, CVE-2024-38472, CVE-2024-56171, CVE-2025-30065, CVE-2024-38819, CVE-2024-57699, CVE-2025-48734, CVE-2025-27553, CVE-2024-12801, CVE-2024-21131, CVE-2025-31651, CVE-2025-50073, CVE-2025-30759, CVE-2025-27113, CVE-2025-30474, CVE-2024-8184, CVE-2022-45693, CVE-2024-21094, CVE-2024-38820, CVE-2025-30762, CVE-2025-50061, CVE-2024-38828, CVE-2025-27818, CVE-2025-32415, CVE-2025-27819, CVE-2025-50060, CVE-2024-24795, CVE-2024-47072, CVE-2025-50064, CVE-2023-39017, CVE-2024-47561, CVE-2024-6763, CVE-2025-31650, CVE-2025-49146, CVE-2025-50072, CVE-2025-31672, CVE-2025-0725, CVE-2025-30753, CVE-2023-42917, CVE-2024-47554, CVE-2024-39884, CVE-2025-24928, CVE-2024-12798, CVE-2025-32414, CVE-2025-23184, CVE-2025-29482, CVE-2025-27817, CVE-2024-13176, CVE-2024-9143 | 2025/7/15 | development |
oracle CPUJul2025: Oracle Analytics Server | CVE-2025-50060, CVE-2025-30065, CVE-2025-48734, CVE-2025-23184, CVE-2025-50061, CVE-2025-30759 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Server 9.2.1 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-30760, CVE-2024-37891, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-23016, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Cluster 8.4.6 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Server 8.0.42 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2024-37891, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Server 8.4.6 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Server 8.4.5 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2024-37891, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Server 9.1.1 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Server 9.3.1 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-23016, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
oracle CPUJul2025: MySQL Cluster 8.0.43 | CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-32415, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2024-9287, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-32414, CVE-2025-50081, CVE-2025-50099 | 2025/7/15 | development |
juniper JSA100098: JSA100098 : 2025-07 Security Bulletin: Junos OS: SRX Series: J-Web can be exposed on additional interfaces (CVE-2025-6549) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100078: JSA100078 : 2025-07 Security Bulletin: Junos OS: A low-privileged user can disable an interface (CVE-2025-52963) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100092: JSA100092 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is executed RPD memory leaks (CVE-2025-52986) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100057: JSA100057 : 2025-07 Security Bulletin: Junos OS: Low-privileged user can cause script to run as root, leading to privilege escalation (CVE-2025-30661) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100060: JSA100060 : 2025-07 Security Bulletin: Junos OS Evolved: A low-privileged user can execute CLI commands and modify the configuration compromise the system (CVE-2025-52954) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100080: JSA100080 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on devices with BGP multipa | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100088: JSA100088 : 2025-07 Security Bulletin: Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash (CVE-2025-52982) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100096: JSA100096 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Annotate configuration command can be used for privilege escalation (CVE-2025-52989) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100058: JSA100058 : 2025-07 Security Bulletin: Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a malformed packet causes one or more FPCs to crash (CVE- | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100087: JSA100087 : 2025-07 Security Bulletin:Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash (CVE-2025-52981) | CVE-2025-52988, CVE-2025-52951, CVE-2024-47503, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52964, CVE-2025-52952, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100055: JSA100055 : 2025-07 Security Bulletin: Junos OS: IPv6 firewall filter fails to match payload-protocol (CVE-2025-52951) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100050: JSA100050 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH causes RPD crash (CVE-2025-52946) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2024-39549, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100089: JSA100089 : 2025-07 Security Bulletin: Junos OS: After removing ssh public key authentication root can still log in (CVE-2025-52983) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100095: JSA100095 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Privilege escalation via CLI command 'request system logout' (CVE-2025-52988) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100060: JSA100060 : 2025-07 Security Bulletin: Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system (CV | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100095: JSA100095 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout' (CVE-2025-52988) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
juniper JSA100051: JSA100051 : 2025-07 Security Bulletin: Junos OS: ACX Series: When 'hot-standby' mode is configured for an L2 circuit, interface flap causes the FEB to crash (CVE-2025-52947) | CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-52958 | 2025/7/15 | development |
Adobe - APSB25-61 - and EPPM metadata add | CVE-2025-27203 | 2025/7/11 | testing |
Multiple Vulnerabilities in Siemens Totally Integrated Automation (TIA) Products - TIA Administrator | CVE-2025-27127, CVE-2025-23364, CVE-2025-23365 | 2025/7/10 | development |
Multiple Vulnerabilities in Schneider Electric EcoStruxure IT Data Center Expert | CVE-2025-50125, CVE-2025-50123, CVE-2025-50121, CVE-2025-50122, CVE-2025-6438, CVE-2025-50124 | 2025/7/9 | development |
PT - Microsoft Teams | CVE-2025-49731, CVE-2025-49737 | 2025/7/9 | development |
Security Update for Rubygems REXML | CVE-2024-43398 | 2025/6/30 | development |
vendor_unpatched cve-2015-1283: Unpatched CVEs for Debian Linux (cve-2015-1283) | CVE-2015-1283 | 2025/6/18 | development |
vendor_unpatched cve-2011-10007: Unpatched CVEs for Red Hat Enterprise Linux (cve-2011-10007) | CVE-2011-10007 | 2025/6/18 | development |
SAP NetWeaver Visual Composer Metadata Uploader Local Detection (CVE-2025-42999) | CVE-2025-43006, CVE-2025-43009, CVE-2025-42997, CVE-2025-43010, CVE-2025-30012, CVE-2025-42999, CVE-2025-43007, CVE-2025-43003, CVE-2025-30009, CVE-2025-30010, CVE-2025-26662, CVE-2025-31329, CVE-2025-43008, CVE-2025-43011, CVE-2025-30018, CVE-2025-30011, CVE-2025-43000, CVE-2025-43002, CVE-2025-43004, CVE-2025-31324, CVE-2025-43005 | 2025/5/19 | development |
FA plugin updates for vendor_unpatched: 2025/04/06 13:17 chunk 1/1 | CVE-2025-32365, CVE-2025-32364 | 2025/4/10 | development |