| CVE-2025-12554 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | 超危 | - | 2025-10-31 15:52:29 | 深度分析 |
| CVE-2025-12553 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | 超危 | - | 2025-10-31 15:48:29 | 深度分析 |
| CVE-2025-12552 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | 超危 | - | 2025-10-31 15:43:45 | 深度分析 |
| CVE-2025-4952 | ESET NOD32 Antivirus 安全漏洞 | ESET | ESET NOD32 Antivirus | 中危 | - | 2025-10-31 12:28:15 | 深度分析 |
| CVE-2025-12517 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-30 15:47:04 | 深度分析 |
| CVE-2025-12516 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-30 15:42:22 | 深度分析 |
| CVE-2025-12515 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-30 15:38:45 | 深度分析 |
| CVE-2025-12479 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-29 16:50:09 | 深度分析 |
| CVE-2025-12478 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-29 16:37:47 | 深度分析 |
| CVE-2025-12477 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-29 16:33:48 | 深度分析 |
| CVE-2025-12476 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-29 16:31:47 | 深度分析 |
| CVE-2025-64140 | Jenkins Azure CLI Plugin 安全漏洞 | Jenkins Project | Jenkins Azure CLI Plugin | - | - | 2025-10-29 13:29:46 | 深度分析 |
| CVE-2025-12425 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-28 18:21:49 | 深度分析 |
| CVE-2025-12424 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-28 18:18:47 | 深度分析 |
| CVE-2025-12423 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-28 18:14:58 | 深度分析 |
| CVE-2025-12422 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-28 18:09:40 | 深度分析 |
| CVE-2025-12365 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-27 18:12:36 | 深度分析 |
| CVE-2025-12364 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-27 18:09:08 | 深度分析 |
| CVE-2025-12363 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | - | - | 2025-10-27 18:04:45 | 深度分析 |
| CVE-2025-12285 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 | Azure Access Technology | BLU-IC2 | 中危 | - | 2025-10-26 16:24:09 | 深度分析 |