Blog
- The Risks of Email Forwarding May 1, 2025Mutiple sources periodically receives reports of users implementing mailbox forwarding rules that automatically forward messages from their work email to an external mailbox that is not monitored by their organization. Email forwarding to external non-work accounts via automatic forwarding rules or by manually forwarding messages poses several significant privacy and security risks to an organization’s […]blogmirnet
- Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – PATCH: NOW April 29, 2025Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create […]blogmirnet
- Vulnerability in SonicWall Secure Mobile Access (SMA) 100 Series Management Interface Could Allow for Remote Code Execution April 27, 2025This Multi-State Information Sharing and Analysis Center (MS-ISAC) Advisory is being provided to assist agencies and organizations in guarding against the persistent malicious actions of cybercriminals. A vulnerability has been discovered in SonicWall Secure Mobile Access (SMA) 100 Management Interface, which could allow for remote code execution. SonicWall Secure Mobile Access (SMA) is a unified […]blogmirnet
- CSF 2.0 Webinar Series: Deep-Dive into the Govern Function April 27, 2025Register Today! Deep-Dive into the CSF 2.0 Govern Function to Improve Cybersecurity One of the major updates to CSF 2.0 is the creation of the Govern Function, highlighting the importance of ensuring cybersecurity capabilities support the broader mission through Enterprise Risk Management (ERM). Governance is the process of determining enterprise objectives, setting direction to achieve […]blogmirnet
- Social Security Administration Phishing Emails April 27, 2025The NJCCIC received reports of Social Security Administration (SSA) phishing emails, consistent with the SSA’s scam alert earlier this month. The emails contain SSA branding to appear legitimate and claim to be from the SSA. However, upon further inspection, they were sent from non-.gov top-level domains (TLDs) with the sender’s display name as “Social Security […]blogmirnet
- Direct Deposit Scams Continue April 27, 2025In direct deposit or payroll diversion scams, threat actors research the targeted organization and identify an employee to impersonate. They typically register a free email address using the employee’s name and utilizing display name spoofing in the messages. In some cases, they compromise the employee’s email account to avoid suspicion. Then the threat actors email […]blogmirnet
- Vulnerability in SAP NetWeaver Visual Composer Could Allow for Remote Code Execution April 27, 2025This Multi-State Information Sharing and Analysis Center (MS-ISAC) Advisory is being provided to assist agencies and organizations in guarding against the persistent malicious actions of cybercriminals. A vulnerability has been discovered in SAP NetWeaver Visual Composer, which could allow for remote code execution. SAP NetWeaver Visual Composer is SAP’s web-based software modelling tool. It enables […]blogmirnet
- Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution – PATCH NOW April 18, 2025Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install […]blogmirnet
- Microsoft Phishing Refresher April 18, 2025Over the past several weeks, the NJCCIC received reports of unauthorized account access facilitated by phishing campaigns. While the targeted accounts varied, the images in this post originate from a campaign that aims to access users’ Microsoft 365 accounts and uses tactics and techniques similar to other phishing campaigns. The initial phishing email typically directs […]blogmirnet
- Oracle Quarterly Critical Patches Issued April 15th, 2025 – PATCH: NOW April 16, 2025Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution. SYSTEMS AFFECTED: RISK:Government: Businesses: Home users: Low RECOMMENDATIONS:We recommend the following actions be taken: REFERENCES: Oracle:https://www.oracle.com/security-alerts/cpuapr2025.html CVE:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000027https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1935https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11996https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13936https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25649https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36518https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36843https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23450https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25122https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28170https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30640https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31684https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33037https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37714https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41079https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41184https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41973https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42575https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43980https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46877https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25762https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34381https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36033https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42003https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42004https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42252https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45047https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1370https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5685https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25399https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26464https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28708https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34053https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35116https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35887https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36479https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37536https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39410https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40167https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40743https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41080https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42795https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45648https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49582https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51074https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51441https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52428https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1135https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4227https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5206https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6119https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6763https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8176https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8184https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8775https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9143https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9902https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11612https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12797https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12798https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12801https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13176https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21538https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22243https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23672https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23807https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24549https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25638https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25710https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26308https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28168https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28219https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29025https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29131https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29133https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29736https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29857https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30172https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31141https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32007https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34064https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36114https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38357https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38816https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38819https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38820https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38827https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38828https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38998https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38999https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39338https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39884https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40725https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40896https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42367https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43044https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43045https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43709https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43796https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45337https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45338https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45613https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47072https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47197https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47535https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47554https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47561https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49767https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49771https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52046https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52303https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52316https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52317https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53122https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53382https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54677https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56128https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56201https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56326https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56337https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57699https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1974https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21573https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21574https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21575https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21576https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21577https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21578https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21579https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21580https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21581https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21582https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21583https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21584https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21585https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21586https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21588https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22228https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23022https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23083https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23084https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23085https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23184https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24813https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24970https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25193https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26466https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26791https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27113https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27516https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27789https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30681https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30682https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30683https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30684https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30685https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30686https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30687https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30688https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30689https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30690https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30692https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30694https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30695https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30696https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30697https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30699https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30700https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30701https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30702https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30703https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30704https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30705https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30706https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30707https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30708https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30709https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30710https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30711https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30712https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30713https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30714https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30715https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30716https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30717https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30718https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30719https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30720https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30721https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30723https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30724https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30725https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30726https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30727https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30728https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30729https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30730https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30731https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30732https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30733https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30735https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30736https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30737https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30740https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31720https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31721blogmirnet