Browse all 159029 CVE security advisories affecting N/A. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-70330 | Orbis Easy Grade Pro 安全漏洞 — n/a | 5.5AI | MediumAI | 2026-03-11 |
| CVE-2025-67298 | ClassroomIO.com 安全漏洞 — n/a | 8.8AI | HighAI | 2026-03-11 |
| CVE-2026-30741 | OpenClaw 安全漏洞 — n/a | 8.8AI | HighAI | 2026-03-11 |
| CVE-2025-67041 | Lantronix EDS3000PS 安全漏洞 — n/a | 9.8AI | CriticalAI | 2026-03-11 |
| CVE-2025-67035 | Lantronix EDS5000 安全漏洞 — n/a | 9.8AI | CriticalAI | 2026-03-11 |
| CVE-2025-67038 | Lantronix EDS5000 安全漏洞 — n/a | 9.8AI | CriticalAI | 2026-03-11 |
| CVE-2025-67034 | Lantronix EDS5000 安全漏洞 — n/a | 7.2AI | HighAI | 2026-03-11 |
| CVE-2025-67036 | Lantronix EDS5000 安全漏洞 — n/a | 8.8AI | HighAI | 2026-03-11 |
| CVE-2025-67037 | Lantronix EDS5000 安全漏洞 — n/a | 7.2AI | HighAI | 2026-03-11 |
| CVE-2025-67039 | Lantronix EDS3000PS 安全漏洞 — n/a | 9.8AI | CriticalAI | 2026-03-11 |
| CVE-2025-68623 | Microsoft DirectX End-User Runtime Web Installer 安全漏洞 — n/a | 7.3AI | HighAI | 2026-03-11 |
| CVE-2025-70082 | Lantronix EDS3000PS 安全漏洞 — n/a | 9.8AI | CriticalAI | 2026-03-11 |
| CVE-2025-66956 | Asseco SEE Live 安全漏洞 — n/a | 9.4AI | CriticalAI | 2026-03-11 |
| CVE-2025-70024 | generatedata 安全漏洞 — n/a | 9.8AI | CriticalAI | 2026-03-11 |
| CVE-2025-70041 | ThermaKube 安全漏洞 — n/a | 9.8AI | CriticalAI | 2026-03-11 |
| CVE-2025-22850 | Intel Processors 安全漏洞 — Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | 4.1AI | MediumAI | 2026-03-10 |
| CVE-2025-22444 | Intel Processors 安全漏洞 — Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | 6.0AI | MediumAI | 2026-03-10 |
| CVE-2025-20105 | Intel Processors 输入验证错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts. | 8.8AI | HighAI | 2026-03-10 |
| CVE-2025-20073 | Intel Processors 缓冲区错误漏洞 — Intel(R) Reference Platforms | 6.0AI | MediumAI | 2026-03-10 |
| CVE-2025-20068 | Intel Processors 输入验证错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | 8.8AI | HighAI | 2026-03-10 |
| CVE-2025-20064 | Intel Processors 输入验证错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts. | 8.2AI | HighAI | 2026-03-10 |
| CVE-2025-20028 | Intel Processors 安全漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | 7.8AI | HighAI | 2026-03-10 |
| CVE-2025-20027 | Intel Processors 输入验证错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | 8.8AI | HighAI | 2026-03-10 |
| CVE-2025-20005 | Intel Processors 缓冲区错误漏洞 — Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable data manipulation. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | 8.2AI | HighAI | 2026-03-10 |
| CVE-2025-20096 | Intel Processors 输入验证错误漏洞 — Intel Reference Platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable data manipulation. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (high) and availability (high) impacts. | 7.3AI | HighAI | 2026-03-10 |
| CVE-2026-26738 | Uderzo SpaceSniffer 安全漏洞 — n/a | 7.8AI | HighAI | 2026-03-10 |
| CVE-2025-70025 | generatedata 安全漏洞 — n/a | 6.3AI | MediumAI | 2026-03-10 |
| CVE-2025-69614 | Deutsche Telekom Account Management Portal 安全漏洞 — n/a | 9.8AI | CriticalAI | 2026-03-10 |
| CVE-2025-69615 | Deutsche Telekom Account Management Portal 安全漏洞 — n/a | 10.0AI | CriticalAI | 2026-03-10 |
| CVE-2026-26801 | pdfmake 安全漏洞 — n/a | 7.5AI | HighAI | 2026-03-10 |
This page lists every published CVE security advisory associated with N/A. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.