CVE-2025-1919 – Google Chrome Media Out-of-Bounds Read Vulnerability

The following table lists the changes that have been made to the CVE-2025-1919 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1918 – Google Chrome PDFium Out-of-Bounds Read Vulnerability

The following table lists the changes that have been made to the CVE-2025-1918 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1917 – Google Chrome Android Browser UI Spoofing Vulnerability

The following table lists the changes that have been made to the CVE-2025-1917 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1916 – Google Chrome Use After Free Vulnerability

The following table lists the changes that have been made to the CVE-2025-1916 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1915 – Google Chrome DevTools Directory Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-1915 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1914 – Google Chrome V8 Out-of-Bounds Read Vulnerability

The following table lists the changes that have been made to the CVE-2025-1914 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

HPE Insight RS Flaw: CVE-2024-53676 PoC Exploit Published, RCE Risk Looms

HPE Insight RS Flaw: CVE-2024-53676 PoC Exploit Published, RCE Risk Looms Security researcher Robin has published technical details and a proof-of-concept (PoC) exploit for CVE-2024-53676, a critical vulnerability in Hewlett Packard Enterprise Insight Remote Support (Insigh … Read more Published Date: Mar 05, 2025 (3 hours, 7 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-1723 […]

CVE-2025-1723: Zoho Patches Account Takeover Vulnerability in ADSelfService Plus

CVE-2025-1723: Zoho Patches Account Takeover Vulnerability in ADSelfService Plus Zoho Corporation has released a security advisory addressing a critical account takeover vulnerability in its ADSelfService Plus identity security solution. The vulnerability, tracked as CVE-2025-1723 … Read more Published Date: Mar 05, 2025 (3 hours, 14 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-1723 CVE-2024-0252 CVE-2021-44757 […]

Vim Users Warned: Crafted TAR Files Could Trigger Code Execution (CVE-2025-27423)

Vim Users Warned: Crafted TAR Files Could Trigger Code Execution (CVE-2025-27423) A newly discovered vulnerability in the popular text editor Vim could allow malicious actors to execute arbitrary code on unsuspecting users’ systems. The flaw, tracked as CVE-2025-27423, resides with … Read more Published Date: Mar 05, 2025 (3 hours, 33 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-1967 – Blood Bank Management System Cross Site Scripting

The following table lists the changes that have been made to the CVE-2025-1967 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.