CVE-2025-25293 – Ruby-SAML zlib Compression Denial of Service (DoS)
The following table lists the changes that have been made to the CVE-2025-25293 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-25292 – Apache Ruby SAML XML Parser Signature Wrapping Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-25292 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-25291 – Apache Ruby-SAML XML Parser Signature Wrapping Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-25291 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-26290 – Avid NEXIS E-series/F-series/PRO+/System Director Appliance (SDA+) Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2024-26290 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27407 – GraphQL-ruby Remote Code Execution Vulnerability
graphql-ruby is a Ruby implementation of GraphQL. Starting in version 1.11.5 and prior to versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21, loading a malicious schema definition in `GraphQL::Schema.from_introspection` (or `GraphQL::Schema::Loader.load`) can result in remote code execution. Any system which loads a schema by JSON from an untrusted source is vulnerable, including those that […]
CVE-2025-25975 – Git Parse Config Sensitive Information Disclosure
The following table lists the changes that have been made to the CVE-2025-25975 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-22870 – Apache Proxy IPv6 Hostname Matching Vulnerability
The following table lists the changes that have been made to the CVE-2025-22870 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-0118 – Palo Alto Networks GlobalProtect Windows ActiveX RCE
The following table lists the changes that have been made to the CVE-2025-0118 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-0117 – Pulse Secure GlobalProtect Windows Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-0117 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-0116 – Palo Alto Networks PAN-OS LLDP Frame Denial of Service
The following table lists the changes that have been made to the CVE-2025-0116 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.