| CVE-2026-5926 | IBM多款产品 加密问题漏洞 | IBM | Verify Identity Access Container | 中危 | 6.5 | 2026-04-22 23:38:47 | 深度分析 |
| CVE-2026-2450 | upKeeper Instant Privilege Access 安全漏洞 | upKeeper Solutions | upKeeper Instant Privilege Access | 中危 | - | 2026-04-14 12:07:44 | 深度分析 |
| CVE-2026-2449 | upKeeper Instant Privilege Access 安全漏洞 | upKeeper Solutions | upKeeper Instant Privilege Access | 中危 | - | 2026-04-14 11:56:05 | 深度分析 |
| CVE-2026-27668 | Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary 安全漏洞 | Siemens | RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) | 高危 | 8.8 | 2026-04-14 08:40:46 | 深度分析 |
| CVE-2026-1346 | IBM多款产品 安全漏洞 | IBM | Verify Identity Access Container | 超危 | 9.3 | 2026-04-08 00:15:24 | 深度分析 |
| CVE-2026-1343 | IBM多款产品 代码问题漏洞 | IBM | Verify Identity Access Container | 高危 | 7.2 | 2026-04-08 00:10:19 | 深度分析 |
| CVE-2026-1342 | IBM多款产品 安全漏洞 | IBM | Verify Identity Access Container | 高危 | 8.5 | 2026-04-07 23:21:17 | 深度分析 |
| CVE-2026-2475 | IBM Verify Identity Access Container和IBM Verify Identity Access 输入验证错误漏洞 | IBM | Verify Identity Access Container | 低危 | 3.1 | 2026-04-01 20:56:22 | 深度分析 |
| CVE-2026-1491 | IBM多款产品 环境问题漏洞 | IBM | Verify Identity Access Container | 中危 | 5.3 | 2026-04-01 20:44:24 | 深度分析 |
| CVE-2026-2862 | IBM Verify Identity Access Container和IBM Verify Identity Access 环境问题漏洞 | IBM | Verify Identity Access Container | 中危 | 5.3 | 2026-04-01 20:41:05 | 深度分析 |
| CVE-2026-1345 | IBM Verify Identity Access Container和IBM Verify Identity Access 操作系统命令注入漏洞 | IBM | Verify Identity Access Container | 高危 | 7.3 | 2026-04-01 20:39:27 | 深度分析 |
| CVE-2026-4101 | IBM Verify Identity Access Container和IBM Verify Identity Access 授权问题漏洞 | IBM | Verify Identity Access Container | 高危 | 8.1 | 2026-04-01 20:35:57 | 深度分析 |
| CVE-2026-4364 | IBM Security Verify Access和IBM Verify Identity Access Container 跨站脚本漏洞 | IBM | Verify Identity Access Container | 中危 | 5.4 | 2026-04-01 20:34:30 | 深度分析 |
| CVE-2026-3526 | Drupal File Access Fix 安全漏洞 | Drupal | File Access Fix (deprecated) | - | - | 2026-03-26 20:02:55 | 深度分析 |
| CVE-2026-3525 | Drupal File Access Fix 安全漏洞 | Drupal | File Access Fix (deprecated) | - | - | 2026-03-26 20:02:25 | 深度分析 |
| CVE-2021-4474 | Ruckus Wireless多款产品 安全漏洞 | Ruckus Wireless | RUCKUS Access Point | 中危 | 4.9 | 2026-03-26 19:28:25 | 深度分析 |
| CVE-2026-26948 | Dell Integrated Dell Remote Access Controller 安全漏洞 | Dell | Integrated Dell Remote Access Controller | 中危 | 4.9 | 2026-03-18 17:40:25 | 深度分析 |
| CVE-2026-26945 | Dell Integrated Dell Remote Access Controller 安全漏洞 | Dell | Integrated Dell Remote Access Controller | 中危 | 5.3 | 2026-03-18 17:27:24 | 深度分析 |
| CVE-2025-22850 | Intel Processors 安全漏洞 | - | Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | - | - | 2026-03-10 22:49:27 | 深度分析 |
| CVE-2025-22444 | Intel Processors 安全漏洞 | - | Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | - | - | 2026-03-10 22:49:26 | 深度分析 |