CVE-2025-25893 – D-Link DSL-3782 OS Command Injection
The following table lists the changes that have been made to the CVE-2025-25893 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-25892 – D-Link DSL-3782 Buffer Overflow Denial of Service
The following table lists the changes that have been made to the CVE-2025-25892 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-25891 – D-Link DSL-3782 Buffer Overflow DoS
The following table lists the changes that have been made to the CVE-2025-25891 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-25469 – FFmpeg Memory Leak in libavutil/iamf.c
The following table lists the changes that have been made to the CVE-2025-25469 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-25468 – FFmpeg Memory Leak in libavutil/mem.c
The following table lists the changes that have been made to the CVE-2025-25468 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-25467 – Libx264 Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2025-25467 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-22921 – FFmpeg JPEG2000 Decoder Segmentation Violation
The following table lists the changes that have been made to the CVE-2025-22921 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2024-56171 – Libxml2 Use-After-Free Vulnerability
The following table lists the changes that have been made to the CVE-2024-56171 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-26616 – WeGIA Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-26616 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]
CVE-2025-26617 – WeGIA SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-26617 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 18, 2025 Action […]