| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-55108 | BMC Control-M/Agent default configuration does not enforce SSL/TLS allowing unauthorized actions and remote code execution | BMC | Control-M/Agent | Critical | 10.0 | 2025-11-05 09:07:30 | Deep Dive |
| CVE-2025-48982 | Veeam Agent for Microsoft Windows 安全漏洞 | Veeam | Agent for Microsoft Windows | 高危 | - | 2025-10-30 23:33:02 | Deep Dive |
| CVE-2025-61932 | MOTEX Lanscope Endpoint Manager 安全漏洞 | MOTEX Inc. | Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) | - | - | 2025-10-20 07:25:40 | Deep Dive |
| CVE-2025-58724 | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability | Microsoft | Arc Enabled Servers - Azure Connected Machine Agent | High | 7.8 | 2025-10-14 17:01:17 | Deep Dive |
| CVE-2025-47989 | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability | Microsoft | Arc Enabled Servers - Azure Connected Machine Agent | High | 7.0 | 2025-10-14 17:00:04 | Deep Dive |
| CVE-2025-9818 | Vulnerability caused by unquoted file paths of Windows services registered by the Uninterruptible Power Supply (UPS) management application | OMRON SOCIAL SOLUTIONS CO., Ltd. | PowerAttendant Standard Edition | Medium | 6.7 | 2025-09-17 03:02:21 | Deep Dive |
| CVE-2025-55118 | BMC Control-M/Agent memory corruption in SSL/TLS communication | BMC | Control-M/Agent | High | 8.9 | 2025-09-16 12:23:40 | Deep Dive |
| CVE-2025-55117 | BMC Control-M/Agent buffer overflow in SSL/TLS communication | BMC | Control-M/Agent | Medium | 5.3 | 2025-09-16 12:22:58 | Deep Dive |
| CVE-2025-55116 | BMC Control-M/Agent buffer overflow local privilege escalation | BMC | Control-M/Agent | High | 8.8 | 2025-09-16 12:22:24 | Deep Dive |
| CVE-2025-55115 | BMC Control-M/Agent path traversal local privilege escalation | BMC | Control-M/Agent | High | 8.8 | 2025-09-16 12:21:51 | Deep Dive |
| CVE-2025-55114 | BMC Control-M/Agent improper IP address filtering order | BMC | Control-M/Agent | Medium | 5.3 | 2025-09-16 12:20:31 | Deep Dive |
| CVE-2025-55113 | BMC Control-M/Agent unescaped NULL byte in access control list checks | BMC | Control-M/Agent | Critical | 9.0 | 2025-09-16 12:20:04 | Deep Dive |
| CVE-2025-55112 | BMC Control-M/Agent hardcoded Blowfish keys | BMC | Control-M/Agent | High | 7.4 | 2025-09-16 12:19:24 | Deep Dive |
| CVE-2025-55111 | BMC Control-M/Agent insecure default file permissions | BMC | Control-M/Agent | Medium | 5.5 | 2025-09-16 12:18:23 | Deep Dive |
| CVE-2025-55110 | BMC Control-M/Agent hardcoded default keystore password | BMC | Control-M/Agent | Medium | 5.5 | 2025-09-16 12:16:58 | Deep Dive |
| CVE-2025-55109 | BMC Control-M/Agent default SSL/TLS configuration authenticated bypass | BMC | Control-M/Agent | Critical | 9.0 | 2025-09-16 12:14:36 | Deep Dive |
| CVE-2025-4235 | User-ID Credential Agent: Cleartext Exposure of Service Account password | Palo Alto Networks | User-ID Credential Agent | 高危 | - | 2025-09-12 17:16:54 | Deep Dive |
| CVE-2025-10221 | Hardcoded Password Exposure in AxxonNet (C-WerkNet) ARP Agent Logs | AxxonSoft | AxxonNet ARP Agent C-WerkNet | Medium | 5.5 | 2025-09-10 12:31:53 | Deep Dive |
| CVE-2025-49692 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | Microsoft | Azure Connected Machine Agent | High | 7.8 | 2025-09-09 17:01:08 | Deep Dive |
| CVE-2025-55316 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | Microsoft | Azure Connected Machine Agent | High | 7.8 | 2025-09-09 17:01:07 | Deep Dive |