Vulnerability Details
The Computer Network Defence Alert State is designed to give a granular and more dynamic visualisation of the current cyber security threat. Any increase in an alert state will occur immediately an issue is detected and it will drop again by one level each working day.
Our rationale for this agility is that vulnerabilities often occur in clusters, therefore reducing the alert state again quickly, will increase your visibility of new threats to the same product. Daily reductions in alert state occur at approximately 1900 GMT/UTC. Significant vulnerabilities may remain for longer. Vulnerabilities on this page are predominantly remotely executable, very few local server exploits will be shown.
Friday 13 June 2025
GitLab

Patch
The latest GitLab release includes 10 security fixes, 4 rated High, 5 rated Medium, 1 rated Low. Highest CVSSv4 score of 8.7
More info.
PTZOptics

Patch
PTZOptics and other Pan-Tilt-Zoom Camera providers contain several vulnerabilities including Hardcoded Credentials and Improper Authentication. CVSSv4 score of 9.3
PTZOptics has patched, but others have not.
More info.
Mitel

Patch
A path traversal vulnerability in the NuPoint Unified Messaging component of Mitel MiCollab could allow a remote attacker to conduct a path traversal attack due to insufficient input validation. CVSSv3 score of 9.8
More info.
Ricoh

Patch
Siemens

Patch
Mendix Studio Pro contains a vulnerability in the module installation process, that could allow a remote attacker to write or modify arbitrary files in directories outside a developer’s project directory. CVSSv4 score of 6.1
More info.
XWiki

Patch
Thursday 12 June 2025
Palo Alto
Networks

Patch
Moxa

Patch
Moxa PT-G7728 and PT-G7828 series are affected by a high-severity vulnerability that could allow a remote attacker to cause a DoS. CVSSv4 score of 8.7
More info.
Meinberg

Patch
The LANTIME Firmware has been updated to fix security vulnerabilities in third-party software included. Highest CVSSv3 score of 7.5
More info.
Mozilla

Patch
Mozilla has published security bulletins for Thunderbird and Firefox, rated High.
More info.
SinoTrack

Patch
SinoTrack Devices have two vulnerabilities, including Weak Authentication and Observable Response Discrepency. Highest CVSSv4 score of 8.8
More info.
MicroDicom

Patch
DICOM Viewer contains an out-of-bounds write vulnerability. A remote attacker can exploit this to execute arbitrary code. CVSSv4 score of 8.6
More info.
Linux

Patch
Wednesday 11 June 2025
Microsoft

Patch
Adobe

Patch
Monthly Patches from Adobe include updates for InCopy, Experience Manager, Commerce, InDesign, Substance 3D Sampler, Acrobat Reader, and Substance 3D Painter. Highest CVSSv3 score of 9.1
More info.
Fortinet

Patch
Fortinet Monthly Patch day includes 14 bulletins, 13 new and 1 updated, with updates for FortiOS, FortiClient, FortiClientEMS, FortiPAM and FortiSRA GUI, FortiOS SSL-VPN, FortiPortal, FortiADC, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb. Highest CVSSv3 score of 9.6
More info.

Patch
GFI

Patch
Trend
Micro

Patch
Trend Micro has released a new Critical Patch for Trend Micro Apex Central that resolves two critical vulnerabilities. Highest CVSSv3 score of 9.8
More info.
Tuesday 10 June 2025
Siemens

Patch
Siemens Monthly Patches include 6 new bulletins and 19 updated bulletins. Of the new bulletins Highest CVSSv4 score of 9.5 Three of the new bulletins are remotely exploitable, in Elspec G5DVR, Sematics S7-1500, and RUGGEDCOM APE1808 products.
More info.
Schneider
Electric

Patch
Monthly Patches for Schneider Electric include 3 new bulletins for Insight Home and Insight Facility, Modicon Controllers, and EVLink WallBox. Highest CVSSv4 score of 7.1
More info.
SAP

Patch
SAP Monthly Patch day includes 14 new Security Notes, 1 rated Critical, 5 rated High, 6 rated Medium, and 2 rated Low. Highest CVSSv3 score of 9.6
More info.
Bosch

Patch
A security vulnerability has been uncovered in Telex Remote Dispatch Console Server and the RTS VLink Virtual Matrix Software that allows a remote attacker to achieve RCE. CVSSv3 score of 10
More info.
Hitachi

Patch
JP1/IT Desktop Management 2 has been updated to fix a vulnerability in Apache XMLBeans. CVSSv3 score of 9.1
Note that this vulnerability is from 2021.
More info.
SolarWinds

Patch
SolarWinds Platform 2025.2 contains multiple vulnerabilities, including a DoS from OpenSSH. Highest CVSSv3 score of 7.5
More info.
CoreDNS

Patch
A Denial of Service (DoS) vulnerability was discovered in the CoreDNS DNS-over-QUIC (DoQ) server implementation.
More info.
Trend
Micro

Patch
Trend Micro Apex One updates fix several security vulnerabilities, including an uncontrolled search path vulnerability that allows a remote attacker to inject malicious code leading to arbitrary code execution on affected installations. Highest CVSSv3 score of 8.8
More info.
HuggingFace

New
The LLaVA-NeXT project suffers from a sensitive information disclosure due to a hardcoded HuggingFace token with privileged permissions exposed. By exploiting this information, a remote attacker could conduct supply chain attacks and compromise the affected HuggingFace's organizations to perform malicious operations.
More info.
Linux

Patch
Monday 09 June 2025
Hongding
Technology

Patch
Hongding Technology Smart Parking Management System contains an exposure of sensitive information vulnerability. CVSSv4 score of 9.3
More info.
QNAP

Patch
QNAP has identified vulnerabilities in OpenSSH that affect QTS and QuTShero. Highest CVSSv3 score of 6.8
More info.
Linux

Patch
Friday 06 June 2025
CyberData

Patch
CyberData 011209 SIP Emergency Intercom contains several vulnerabilities, including Authentication Bypass, Missing Authentication, SQL Injection, Insufficiently Protected Credentials, and Path Traversal. Highest CVSSv4 score of 9.3
More info.
ZIV

Patch
Eight vulnerabilities have been identified in ZIV's IDF and ZLF protections, 2 of rated High and 6 rated Medium. Highest CVSSv3 score of 8.7
More info.
NetApp

Patch
NetApp has published 10 bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 9.8
Five have patches.
More info.
Dell

Patch
Dell has published a Critical bulletin for SmartFabric Manager.
More info.
IBM

Patch
IBM has published a Critical bulletin for Db2.
More info.
Linux

Patch
Amazon Linux 2023 have updated the microcode. More info.
Thursday 05 June 2025
Cisco

Patch
Cisco has published 10 new bulletins, 1 rated Critical, 2 rated High, and 7 rated Medium.
More info.
A vulnerability in AWS, Microsoft Azure, and OCI cloud deployments of Cisco ISE could allow a remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. CVSSv3 score of 9.9
More info.
A vulnerability in the SSH implementation of Cisco NDFC could allow a remote attacker to impersonate Cisco NDFC-managed devices. CVSSv3 score of 8.7
More info.
HPE

Patch
HPE has published an update for Insight Remote Support that fixes previously reported zero-day vulnerabilities. Highest CVSSv3 score of 9.8
More info.
NetApp

Patch
NetApp has published 10 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CSSv3 score of 9.8
More info.
IBM

Patch
IBM has published Critical bulletins for Concert Software, Maximo AI Service, QRadar Suite, Storage Software, Guardium Data Security, Knowledge Catalog,
More info.
Django

Patch
Internal HTTP response logging allows control characters to be written unescaped into logs. This could enable log injection or forgery, letting attackers manipulate log appearance or structure. CVSSv3 score of 4.0
More info.
Wednesday 04 June 2025
Samsung

Patch
Samsung has published Monthly Patches for Android with 19 vulnerabilities, plus Google Android and Samsung Semiconductor vulnerability patches.
More info.
Microsoft

Patch
Microsoft has updated Edge with the latest chromium updates.
More info.
HPE

Patch
Two security vulnerabilities had been identified in HPE Telco Service Orchestrator software that could be remotely exploited causing DoS and Access Restriction Bypas.. Highest CVSSv3 score of 9.8
More info.
Acronis

Patch
Acronis has published 8 security bulletins for Acronis CyberProtect, 4 rated Critical, 1 rated High, and 3 rated Medium. Highest CVSSv3 score of 10
More info.
Python

Patch
Mailman 3 contains multiple advisories affecting the CPython tarfile module, 1 rated Critical, 3 rated High, and 1 rated Moderate. Highest CVSSv3 score of 9.4
More info.
HP

Patch
HP ThinPro contains dozens of security vulnerabilities that have been patched in the latest version. Highest CVSSv3 score of 10.
More info.
Linux

Patch
Tuesday 03 June 2025

Patch
Splunk

Patch
Splunk Quarterly Patches have been published with 2 vulnerabilities, one rated High and one rated Medium, and 2 third-party software updates rated Critical. Of the 2 vulnerabilities, Highest CVSSv3 score of 8.
More info.
ABB

Patch
ABB Welcome IP-Gateway products contain several security vulnerabilities. Highest CVSSv3 score of 9.8
More info.
Pilz

Patch
Pilz has published 4 new bulletins, identifying vulnerabilities in PiCtory, IndustrialPI Webstatus, and Node-RED integration. Highest CVSSv3 score of 9.8
More info.
HPE

Patch
Security vulnerabilities have been identified in HPE StoreOnce Software thatcould allow a remote attacker to achieve RCE, disclosure of information, server-side request forgery, authentication bypass, arbitrary file deletion, and directory traversal information disclosure. Highest CVSSv3 score of 9.8
More info.
ModSecurity

New
A DoS vulnerability has been identified ModSecurity. Patches will be published soon. CVSSv3 score of 7.5
More info.
Linux

Patch
Monday 02 June 2025
Qualcomm

Patch
Qualcomm Monthly Patches include 10 new bulletins, 2 rated Critical and 8 rated High. Highest CVSSv3 score of 8.6
More info.
MediaTek

Patch
MediaTek Monthly Patches include 7 vulnerabilities, 1 rated High and 6 rated Medium.
More info.
Samsung

Patch
Samsung Semiconductor Monthly Patches include 14 vulnerabilities, 10 rated High, 4 rated Medium.
More info.
HPE

New
HPE Insight Remote Support contains several unpatched vulnerabilities, including an unauthenticated DoS.
More info.
Moxa

Patch
Moxa products contain a resource exhaustion vulnerability in the implementation of the Diffie-Hellman key exchange protocol. CVSSv3 score of 7.5
Note this is a 2002 vulnerability.
More info.
NetApp

Patch
Multiple NetApp products incorporate Apache Zookeeper which is susceptible to a vulnerability that could lead to disclosure of sensitive information or addition or modification of data. CVSSv3 score of 9.1
More info.
Linux

Patch
PRODUCT

GUARDED
This alert state represents the return towards normalisation of an alert state, indicating that there was a higher alert state due to a product vulnerability during the previous few days.
PRODUCT

INCREASED
This alert state indicates that a product vulnerability has been identified within the last few days. The vulnerability is either difficult to exploit, or if exploited, results in reduced impact to the target system.
PRODUCT

HIGH
This alert state indicates a more serious vulnerability which is exploitable.
PRODUCT

CRITICAL
This alert state indicates a significant threat to the product, where exploits exist or where the vulnerability is potentially devastating.

NEW
NEW
This bottom descriptor is used with a vulnerability which has been identified in the last 24 hours, with no patch or exploit. It will typically be paired with Increased.

+24hrs
+24hrs
This bottom descriptor is used with Indicates an alert state which has been present for more than 24 hours. It will typically be paired with Guarded, and could be changed to +48hr for an item that came out as Critical.

Patch
PATCH
This bottom descriptor indicates that patches are available for vulnerabilities, whether it is the initial report or a patch of a vulnerability that had been previously reported. It could be paired with Increased or High, and on rare occasions Critical.

Exploit
EXPLOIT
This bottom descriptor indicates that an Exploit has been made public for a vulnerability, whether it is the initial report or an indication of an exploit for a vulnerability that had been previously reported. It could be paired with High or Critical.

ZERO
ZERO DAY
This bottom descriptor indicates that a vulnerability has been announced without the opportunity for the vendor to patch it before the details are made known. It could be paired with High or Critical.