Skip to main content

Vulnerability Details

The Computer Network Defence Alert State is designed to give a granular and more dynamic visualisation of the current cyber security threat.  Any increase in an alert state will occur immediately an issue is detected and it will drop again by one level each working day

Our rationale for this agility is that vulnerabilities often occur in clusters, therefore reducing the alert state again quickly, will increase your visibility of new threats to the same product. Significant vulnerabilities may remain for longer. Vulnerabilities on this page are remotely executable.

Friday 05 December 2025


WatchGuard

Security

Security Product - Firewall - Multiple Vulnerabilities (10).
More Info....

CVSS Score - Multi


Cisco

Patch

Remote Code Execution Vulnerability in React and Next.js Frameworks, Cisco investigating effected products.
More Info....

CVSS Score v3 - 10


Advantech

Patch

WebAccess/VPN - command injection vulnerability that allows an authenticated system administrator to execute arbitrary commands as the web server user.
More info....

CVSS Score v4 - 8.6


MAXHUB

OT

MAXHUB Pivot is a cloud-based device management platform. Successful exploitation of this vulnerability could allow an attacker to request a password reset and gain unauthorized access to the account.
More Info....

CVSS Score v4 - 8.7


Synology

Patch

Published 27 Nov. Cross-Site Request Forgery (CSRF) vulnerability in WebAPI Framework in Synology DiskStation Manager (DSM) and Synology Unified Controller (DSMUC) allows remote attackers to execute arbitrary code via unspecified vectors.
More Info....

CVSS Score v3 - 9.6


Apache

Patch

Content analysis toolkit for extracting metadata; XXE flaw in PDF parsing lets attackers inject XML via crafted XFA files in multiple Tika modules.
More Info....

CVSS Score v4 - 10





Thursday 04 December 2025


Amazon

Patch

AWS:  This issue may permit unauthorized remote code execution on React Server Components.
More Info....

CVSS Score v3 - 10


Splunk

Patch

Multiple vulnerabilities (10).
More Info....

CVSS Score Multi


Anthropics

Patch

Claude Code.  It was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window.
More info....

CVSS Score v4 - 8.7


AVTECH

Patch

Network video recorder for surveillance systems – Authenticated command injection in Machine.cgi lets attackers run arbitrary commands via crafted input. 
More Info....

CVSS Score v4 - 8.7






Definitions

Severity

GUARDED 

This alert state represents the return towards normalisation of an alert state, indicating that there was a higher alert state due to a product vulnerability during the previous few days.

INCREASED 

This alert state indicates that a product vulnerability has been identified within the last few days. The vulnerability is either difficult to exploit, or if exploited, results in reduced impact to the target system.


HIGH 

This alert state indicates a more serious vulnerability which is exploitable.

CRITICAL 

This alert state indicates a significant threat to the product, where exploits exist or where the vulnerability is potentially devastating. This is also used where the CVSS value is 10.


Type

Security

Vendors of cyber security products should know better and given their importance they are highlighted when vulnerable, often combined with critival severity

+24hrs

This bottom descriptor is used with Indicates an alert state which has been present for more than 24 hours. 


Patch

This bottom descriptor indicates that patches are available for vulnerabilities, whether it is the initial report or a patch of a vulnerability that had been previously reported. 

Exploit

This bottom descriptor indicates that an Exploit has been made public for a vulnerability, whether it is the initial report or an indication of an exploit for a vulnerability that had been previously reported. 


OT

This bottom descriptor indicates that the vulnerable product is Operational Technology (OT) such as an Industrial Control System (ICS). OT is not to be confused with Information Technology (IT)

ZERO

This bottom descriptor indicates that a vulnerability has been announced without the opportunity for the vendor to patch it before the details are made known.