Advisories
Unseen Threats: Vulnerabilities detected by The Binarly REsearch Team
Public Disclosures
Total Products Impacted
Total Vendors Impacted
ADVISORY ID | CVSS | Severity | CVE ID | Vendors | Disclosed | |
|---|---|---|---|---|---|---|
BRLY-DVA-2025-012 | 8.2 | High | CVE-2025-10451 | HP | 2026-03-25 | |
BRLY-2025-024 | 7.2 | High | CVE-2025-6198 | Supermicro | 2026-01-26 | |
BRLY-2025-023 | 7.2 | High | CVE-2025-7937 | Supermicro | 2026-01-26 | |
BRLY-2025-021 | 7.2 | High | CVE-2025-6198 | Supermicro | 2025-09-18 | |
BRLY-2025-020 | 7.2 | High | CVE-2024-10237 | Supermicro | 2025-09-18 | |
BRLY-DVA-2025-019 | 8.2 | High | BRLY-DVA-2025-019 | Lenovo | 2025-07-29 | |
BRLY-DVA-2025-015 | 8.2 | High | CVE-2025-4423 | Lenovo | 2025-07-29 | |
BRLY-DVA-2025-013 | 8.2 | High | CVE-2025-4421 | Lenovo | 2025-07-29 | |
BRLY-2025-018 | 6.0 | Medium | CVE-2025-4426 | Lenovo | 2025-07-29 | |
BRLY-2025-017 | 6.0 | Medium | CVE-2025-4424 | Lenovo | 2025-07-29 | |
BRLY-2025-016 | 8.2 | High | CVE-2025-4425 | Lenovo | 2025-07-29 | |
BRLY-2025-014 | 8.2 | High | CVE-2025-4422 | Lenovo | 2025-07-29 | |
BRLY-DVA-2025-011 | 8.2 | High | CVE-2025-7029 | Gigabyte | 2025-07-10 | |
BRLY-DVA-2025-010 | 8.2 | High | CVE-2025-7028 | Gigabyte | 2025-07-10 | |
BRLY-DVA-2025-008 | 8.2 | High | CVE-2025-7026 | Gigabyte | 2025-07-10 | |
BRLY-2025-009 | 8.2 | High | CVE-2025-7027 | Gigabyte | 2025-07-10 | |
BRLY-DVA-2025-006 | 8.2 | High | CVE-2025-36600 | Dell | 2025-07-08 | |
BRLY-2025-001 | 8.2 | High | CVE-2025-3052 | Microsoft | 2025-06-10 | |
BRLY-DVA-2023-003 | 6.0 | Medium | CVE-2023-5912 | Lenovo | 2025-04-10 | |
BRLY-DVA-2024-023 | 8.2 | High | CVE-2024-32858 | Dell | 2025-04-04 | |
BRLY-DVA-2024-022 | 8.2 | High | CVE-2024-32858 | Dell | 2025-04-04 | |
BRLY-DVA-2024-020 | 8.2 | High | CVE-2024-32858 | Dell | 2025-04-04 | |
BRLY-DVA-2024-013 | 8.2 | High | CVE-2024-32860 | Dell | 2025-04-04 | |
BRLY-DVA-2024-012 | 8.2 | High | CVE-2024-32858 | Dell | 2025-04-04 | |
BRLY-DVA-2023-024 | 8.2 | High | CVE-2022-40516 | Qualcomm | 2025-04-04 | |
BRLY-2024-001 | 5.3 | Medium | CVE-2018-25103 | Supermicro | 2025-04-01 | |
BRLY-2025-002 | 7.6 | High | BRLY-2025-002 | Clevo | 2025-03-20 | |
BRLY-2024-023 | 9.1 | Critical | BRLY-2024-023 | Supermicro | 2024-09-18 | |
BRLY-2023-030 | 9.1 | Critical | CVE-2023-33413 | Supermicro | 2024-09-16 | |
BRLY-2023-023 | 8.6 | High | BRLY-2023-023 | Supermicro | 2024-09-16 |
Disclosure Policy
The Binarly REsearch team follows Coordinated Vulnerability Disclosure (CVD) principles on a 90+30-day deadline clock. We strive to be a trusted partner to open‑source maintainers and commercial vendors, while keeping our independent mission front and center: fix fast, disclose responsibly, and hold the ecosystem accountable with evidence and timelines.
Public Email & PGP Key
Used primarily by security researchers and vendors for secure communication.
Binarly REsearch
Binarly has led the coordinated disclosure and remediation of multiple major security flaws across the software supply chain.
Subscribe to our newsletter
Stay ahead of emerging firmware threats and supply chain vulnerabilities. Get exclusive research insights, security advisories, and expert analysis delivered directly to your inbox.

