CVE Alert: CVE-2025-27406
Vulnerability Summary: CVE-2025-27406 Icinga Reporting is the central component for reporting related functionality in the monitoring web frontend and framework...
Vulnerability Summary: CVE-2025-27406 Icinga Reporting is the central component for reporting related functionality in the monitoring web frontend and framework...
Vulnerability Summary: CVE-2025-27405 Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in...
Vulnerability Summary: CVE-2025-2499 Client side access control bypass in the permission component in Devolutions Remote Desktop Manager on Windows. An...
Vulnerability Summary: CVE-2025-30350 Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting...
Vulnerability Summary: CVE-2025-2562 Insufficient logging in the autotyping feature in Devolutions Remote Desktop Manager on Windows allows an authenticated user...
Vulnerability Summary: CVE-2025-30351 Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.10.0...
Vulnerability Summary: CVE-2025-30164 Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in...
Vulnerability Summary: CVE-2025-30352 Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0-alpha.4...
Vulnerability Summary: CVE-2025-2528 Improper authorization in application password policy in Devolutions Remote Desktop Manager on Windows allows an authenticated user...
Vulnerability Summary: CVE-2025-31160 atop through 2.11.0 allows local users to cause a denial of service (e.g., assertion failure and application...
Vulnerability Summary: CVE-2025-30353 Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0...
Vulnerability Summary: CVE-2025-20229 In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.104, 9.2.2406.108,...
Vulnerability Summary: CVE-2025-20226 In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.107,...
Vulnerability Summary: CVE-2025-20227 In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.107,...
Vulnerability Summary: CVE-2025-2838 Silicon Labs Gecko OS DNS Response Processing Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to...
Vulnerability Summary: CVE-2025-30407 Local privilege escalation due to a binary hijacking vulnerability. The following products are affected: Acronis Cyber Protect...
Vulnerability Summary: CVE-2025-20228 In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.2.2403.108, and...
Vulnerability Summary: CVE-2025-20232 In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.103, 9.2.2406.108,...
Vulnerability Summary: CVE-2025-20233 In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used...
Vulnerability Summary: CVE-2025-20231 In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of...
Vulnerability Summary: CVE-2025-2837 Silicon Labs Gecko OS HTTP Request Handling Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows...
Vulnerability Summary: CVE-2025-20230 In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of...
Palo Alto Networks Security Advisories /PAN-SA-2025-0003PAN-SA-2025-0003 Informational: PAN-OS BIOS and Bootloader Security BulletinInformationalJSONCSAF Published2025-01-23 Updated2025-03-26DescriptionPalo Alto Networks is aware of...
Vulnerability Summary: CVE-2025-2510 The Frndzk Expandable Bottom Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'text' parameter...