CVE-2025-1919 – Google Chrome Media Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-1919 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1918 – Google Chrome PDFium Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-1918 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1917 – Google Chrome Android Browser UI Spoofing Vulnerability
The following table lists the changes that have been made to the CVE-2025-1917 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1916 – Google Chrome Use After Free Vulnerability
The following table lists the changes that have been made to the CVE-2025-1916 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1915 – Google Chrome DevTools Directory Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-1915 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1914 – Google Chrome V8 Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-1914 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
HPE Insight RS Flaw: CVE-2024-53676 PoC Exploit Published, RCE Risk Looms
HPE Insight RS Flaw: CVE-2024-53676 PoC Exploit Published, RCE Risk Looms Security researcher Robin has published technical details and a proof-of-concept (PoC) exploit for CVE-2024-53676, a critical vulnerability in Hewlett Packard Enterprise Insight Remote Support (Insigh … Read more Published Date: Mar 05, 2025 (3 hours, 7 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-1723 […]
CVE-2025-1723: Zoho Patches Account Takeover Vulnerability in ADSelfService Plus
CVE-2025-1723: Zoho Patches Account Takeover Vulnerability in ADSelfService Plus Zoho Corporation has released a security advisory addressing a critical account takeover vulnerability in its ADSelfService Plus identity security solution. The vulnerability, tracked as CVE-2025-1723 … Read more Published Date: Mar 05, 2025 (3 hours, 14 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-1723 CVE-2024-0252 CVE-2021-44757 […]
Vim Users Warned: Crafted TAR Files Could Trigger Code Execution (CVE-2025-27423)
Vim Users Warned: Crafted TAR Files Could Trigger Code Execution (CVE-2025-27423) A newly discovered vulnerability in the popular text editor Vim could allow malicious actors to execute arbitrary code on unsuspecting users’ systems. The flaw, tracked as CVE-2025-27423, resides with … Read more Published Date: Mar 05, 2025 (3 hours, 33 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-1967 – Blood Bank Management System Cross Site Scripting
The following table lists the changes that have been made to the CVE-2025-1967 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.