| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-0966 | IBM InfoSphere Information Server SQL injection | IBM | InfoSphere Information Server | High | 7.6 | 2025-06-25 02:40:40 | Deep Dive |
| CVE-2025-5318 | Libssh: out-of-bounds read in sftp_handle() | - | - | High | 8.1 | 2025-06-24 14:10:07 | Deep Dive |
| CVE-2024-3511 | Incorrect Authorization in Multiple WSO2 Products Allows Unauthorized Access to Registry Versioned Files | WSO2 | WSO2 Enterprise Integrator | Medium | 4.3 | 2025-06-23 08:47:55 | Deep Dive |
| CVE-2025-3629 | IBM InfoSphere Information Server file manipulation | IBM | InfoSphere Information Server | Medium | 4.3 | 2025-06-21 12:45:58 | Deep Dive |
| CVE-2025-3221 | IBM InfoSphere Information Server denial of service | IBM | InfoSphere Information Server | High | 7.5 | 2025-06-21 12:44:27 | Deep Dive |
| CVE-2025-3319 | IBM Spectrum Protect Server authentication bypass | IBM | Spectrum Protect Server | High | 8.1 | 2025-06-20 14:50:46 | Deep Dive |
| CVE-2025-50200 | RabbitMQ Node can log Basic Auth header from an HTTP request | rabbitmq | rabbitmq-server | - | - | 2025-06-19 16:14:25 | Deep Dive |
| CVE-2025-31698 | Apache Traffic Server: Client IP address from PROXY protocol is not used for ACL | Apache Software Foundation | Apache Traffic Server | - | - | 2025-06-19 10:07:47 | Deep Dive |
| CVE-2025-49763 | Apache Traffic Server: Remote DoS via memory exhaustion in ESI Plugin | Apache Software Foundation | Apache Traffic Server | - | - | 2025-06-19 10:07:15 | Deep Dive |
| CVE-2025-36049 | IBM webMethods Integration Sever XML external entity injection | IBM | webMethods Integration Server | High | 8.8 | 2025-06-18 16:06:19 | Deep Dive |
| CVE-2025-36048 | IBM webMethods Integration Sever code execution | IBM | webMethods Integration Server | High | 7.2 | 2025-06-18 16:04:29 | Deep Dive |
| CVE-2025-49218 | Trend Micro Endpoint Encryption PolicyServer 安全漏洞 | Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server | High | 7.7 | 2025-06-17 20:28:22 | Deep Dive |
| CVE-2025-49217 | Trend Micro Endpoint Encryption PolicyServer 安全漏洞 | Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server | Critical | 9.8 | 2025-06-17 20:28:15 | Deep Dive |
| CVE-2025-49216 | Trend Micro Endpoint Encryption PolicyServer 安全漏洞 | Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server | Critical | 9.8 | 2025-06-17 20:28:08 | Deep Dive |
| CVE-2025-49215 | Trend Micro Endpoint Encryption PolicyServer 安全漏洞 | Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server | High | 8.8 | 2025-06-17 20:28:01 | Deep Dive |
| CVE-2025-49214 | Trend Micro Endpoint Encryption PolicyServer 安全漏洞 | Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server | High | 8.8 | 2025-06-17 20:27:53 | Deep Dive |
| CVE-2025-49213 | Trend Micro Endpoint Encryption PolicyServer 安全漏洞 | Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server | Critical | 9.8 | 2025-06-17 20:27:45 | Deep Dive |
| CVE-2025-49212 | Trend Micro Endpoint Encryption PolicyServer 安全漏洞 | Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server | Critical | 9.8 | 2025-06-17 20:27:37 | Deep Dive |
| CVE-2025-49211 | Trend Micro Endpoint Encryption PolicyServer 安全漏洞 | Trend Micro, Inc. | Trend Micro Endpoint Encryption Policy Server | High | 7.7 | 2025-06-17 20:16:38 | Deep Dive |
| CVE-2025-5964 | Path traversal in M-Files API | M-Files Corporation | M-Files Server | - | - | 2025-06-15 19:42:25 | Deep Dive |