CVE-2025-2263 – Sante PACS Server.exe OpenSSL Stack-Based Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-2263 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2264 – Sante PACS Server Path Traversal Information Disclosure
The following table lists the changes that have been made to the CVE-2025-2264 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2081 – Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-2081 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2080 – Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-2080 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2079 – Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-2079 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2265 – Sante PACS Server.exe Password Hash Truncation Vulnerability
The following table lists the changes that have been made to the CVE-2025-2265 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-29773 – Froxlor Email Account Confusion Vulnerability
Froxlor is open-source server administration software. A vulnerability in versions prior to 2.2.6 allows users (such as resellers or customers) to create accounts with the same email address as an existing account. This creates potential issues with account identification and security. This vulnerability can be exploited by authenticated users (e.g., reseller, customer) who can create […]
CVE-2025-29768 – Vim Zip File Data Loss Vulnerability
The following table lists the changes that have been made to the CVE-2025-29768 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-28011 – PHPGurukul User Registration & Login and User Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-28011 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27138 – DataEase Unauthenticated Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-27138 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.