| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-36853 | EOL .NET 6.0 Runtime Remote Code Execution Vulnerability | Microsoft | .NET 6.0 | High | 7.5 | 2025-09-08 13:48:43 | Deep Dive |
| CVE-2024-39954 | Apache EventMesh Runtime: SSRF | Apache Software Foundation | Apache EventMesh Runtime | 中危 | - | 2025-08-20 08:56:42 | Deep Dive |
| CVE-2025-30033 | Siemens多款产品 代码问题漏洞 | Siemens | Automation License Manager V6.0 | High | 7.8 | 2025-08-12 11:16:57 | Deep Dive |
| CVE-2025-41659 | CODESYS Control PKI Exposure Enables Remote Certificate Access | CODESYS | Control RTE (SL) | High | 8.3 | 2025-08-04 08:04:05 | Deep Dive |
| CVE-2025-41658 | CODESYS Toolkit Exposes Sensitive Files via Default Permissions | CODESYS | Runtime Toolkit | Medium | 5.5 | 2025-08-04 08:03:27 | Deep Dive |
| CVE-2025-54126 | WebAssembly Micro Runtime's `--addr-pool` option allows all IPv4 addresses when subnet mask is not specified | bytecodealliance | wasm-micro-runtime | - | - | 2025-07-29 21:52:36 | Deep Dive |
| CVE-2025-7326 | EOL ASP.NET Core Elevation of Privilege Vulnerability | Microsoft | ASP.NET Core 6.0 | High | 7.0 | 2025-07-08 14:31:46 | Deep Dive |
| CVE-2025-43853 | iwasm vulnerable to filesystem sandbox escape with symlink when using uvwasi feature | bytecodealliance | wasm-micro-runtime | - | - | 2025-05-15 17:13:12 | Deep Dive |
| CVE-2025-2900 | IBM Semeru Runtime denial of service | IBM | Semeru Runtime | High | 7.5 | 2025-05-14 18:50:27 | Deep Dive |
| CVE-2025-3115 | Spotfire Data Function Vulnerability | Spotfire | Spotfire Statistics Services | - | - | 2025-04-09 18:12:28 | Deep Dive |
| CVE-2025-3114 | Spotfire Code Execution Vulnerability | Spotfire | Spotfire Enterprise Runtime for R | - | - | 2025-04-09 17:29:49 | Deep Dive |
| CVE-2025-30280 | Siemens Mendix Runtime 安全漏洞 | Siemens | Mendix Runtime V10 | Medium | 5.3 | 2025-04-08 08:22:31 | Deep Dive |
| CVE-2025-0694 | CODESYS Control V3 removable media path traversal | CODESYS | CODESYS Control for BeagleBone SL | Medium | 6.6 | 2025-03-18 11:04:06 | Deep Dive |
| CVE-2025-1468 | CODESYS Control V3 - OPC UA Server Authentication bypass | CODESYS | CODESYS Runtime Toolkit | High | 7.5 | 2025-03-18 11:03:18 | Deep Dive |
| CVE-2025-29903 | JetBrains Runtime 代码问题漏洞 | JetBrains | Runtime | Medium | 5.2 | 2025-03-12 12:36:15 | Deep Dive |
| CVE-2025-20061 | mySCADA myPRO Manager OS Command Injection | mySCADA | myPRO Manager | Critical | 9.8 | 2025-01-29 19:52:43 | Deep Dive |
| CVE-2025-20014 | mySCADA myPRO Manager OS Command Injection | mySCADA | myPRO Manager | Critical | 9.8 | 2025-01-29 19:46:58 | Deep Dive |
| CVE-2024-8603 | B&R Automation Runtime 加密问题漏洞 | B&R Industrial Automation | Automation Runtime | High | 7.5 | 2025-01-15 15:31:01 | Deep Dive |
| CVE-2024-11999 | Schneider Electric多款产品 安全漏洞 | Schneider Electric | Harmony (Formerly Magelis) HMIST6, HMISTM6, HMIG3U, HMIG3X, HMISTO7 series with EcoStruxure Operator Terminal Expert runtime | High | 8.8 | 2024-12-17 06:13:01 | Deep Dive |
| CVE-2024-52051 | Siemens SIMATIC WinCC和Siemens SIMATIC STEP 输入验证错误漏洞 | Siemens | SIMATIC S7-PLCSIM V17 | High | 7.3 | 2024-12-10 13:53:58 | Deep Dive |