Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

N/A — Vulnerabilities & Security Advisories 159029

Browse all 159029 CVE security advisories affecting N/A. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2025-70330 Orbis Easy Grade Pro 安全漏洞 — n/a 5.5AIMediumAI2026-03-11
CVE-2025-67298 ClassroomIO.com 安全漏洞 — n/a 8.8AIHighAI2026-03-11
CVE-2026-30741 OpenClaw 安全漏洞 — n/a 8.8AIHighAI2026-03-11
CVE-2025-67041 Lantronix EDS3000PS 安全漏洞 — n/a 9.8AICriticalAI2026-03-11
CVE-2025-67035 Lantronix EDS5000 安全漏洞 — n/a 9.8AICriticalAI2026-03-11
CVE-2025-67038 Lantronix EDS5000 安全漏洞 — n/a 9.8AICriticalAI2026-03-11
CVE-2025-67034 Lantronix EDS5000 安全漏洞 — n/a 7.2AIHighAI2026-03-11
CVE-2025-67036 Lantronix EDS5000 安全漏洞 — n/a 8.8AIHighAI2026-03-11
CVE-2025-67037 Lantronix EDS5000 安全漏洞 — n/a 7.2AIHighAI2026-03-11
CVE-2025-67039 Lantronix EDS3000PS 安全漏洞 — n/a 9.8AICriticalAI2026-03-11
CVE-2025-68623 Microsoft DirectX End-User Runtime Web Installer 安全漏洞 — n/a 7.3AIHighAI2026-03-11
CVE-2025-70082 Lantronix EDS3000PS 安全漏洞 — n/a 9.8AICriticalAI2026-03-11
CVE-2025-66956 Asseco SEE Live 安全漏洞 — n/a 9.4AICriticalAI2026-03-11
CVE-2025-70024 generatedata 安全漏洞 — n/a 9.8AICriticalAI2026-03-11
CVE-2025-70041 ThermaKube 安全漏洞 — n/a 9.8AICriticalAI2026-03-11
CVE-2025-22850 Intel Processors 安全漏洞 — Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. 4.1AIMediumAI2026-03-10
CVE-2025-22444 Intel Processors 安全漏洞 — Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. 6.0AIMediumAI2026-03-10
CVE-2025-20105 Intel Processors 输入验证错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts. 8.8AIHighAI2026-03-10
CVE-2025-20073 Intel Processors 缓冲区错误漏洞 — Intel(R) Reference Platforms 6.0AIMediumAI2026-03-10
CVE-2025-20068 Intel Processors 输入验证错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. 8.8AIHighAI2026-03-10
CVE-2025-20064 Intel Processors 输入验证错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts. 8.2AIHighAI2026-03-10
CVE-2025-20028 Intel Processors 安全漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. 7.8AIHighAI2026-03-10
CVE-2025-20027 Intel Processors 输入验证错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. 8.8AIHighAI2026-03-10
CVE-2025-20005 Intel Processors 缓冲区错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable data manipulation. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. 8.2AIHighAI2026-03-10
CVE-2025-20096 Intel Processors 输入验证错误漏洞 — Intel Reference Platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable data manipulation. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (high) and availability (high) impacts. 7.3AIHighAI2026-03-10
CVE-2026-26738 Uderzo SpaceSniffer 安全漏洞 — n/a 7.8AIHighAI2026-03-10
CVE-2025-70025 generatedata 安全漏洞 — n/a 6.3AIMediumAI2026-03-10
CVE-2025-69614 Deutsche Telekom Account Management Portal 安全漏洞 — n/a 9.8AICriticalAI2026-03-10
CVE-2025-69615 Deutsche Telekom Account Management Portal 安全漏洞 — n/a 10.0AICriticalAI2026-03-10
CVE-2026-26801 pdfmake 安全漏洞 — n/a 7.5AIHighAI2026-03-10

This page lists every published CVE security advisory associated with N/A. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.