CVE-2025-2295 – EDK2 BIOS Integer Overflow Denial of Service

The following table lists the changes that have been made to the CVE-2025-2295 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-2310 – HDF5 Heap-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-2310 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-2309 – HDF5 Type Conversion Logic Heap Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-2309 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-2308 – HDF5 Scale-Offset Filter Heap-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-2308 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-29771 – HtmlSanitizer Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-29771 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-29780 – Post-Quantum Secure Feldman’s Verifiable Secret Sharing Timing Side-Channel Vulnerability

Post-Quantum Secure Feldman’s Verifiable Secret Sharing provides a Python implementation of Feldman’s Verifiable Secret Sharing (VSS) scheme. In versions 0.7.6b0 and prior, the `feldman_vss` library contains timing side-channel vulnerabilities in its matrix operations, specifically within the `_find_secure_pivot` function and potentially other parts of `_secure_matrix_solve`. These vulnerabilities are due to Python’s execution model, which does not […]

CVE-2025-29779 – Apache Post-Quantum Secure Feldman’s Verifiable Secret Sharing Fault Injection Attacks

Post-Quantum Secure Feldman’s Verifiable Secret Sharing provides a Python implementation of Feldman’s Verifiable Secret Sharing (VSS) scheme. In versions 0.7.6b0 and prior, the `secure_redundant_execution` function in feldman_vss.py attempts to mitigate fault injection attacks by executing a function multiple times and comparing results. However, several critical weaknesses exist. Python’s execution environment cannot guarantee true isolation between […]

CVE-2025-29775 – Apache xml-crypto Signature Bypass Vulnerability

xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed […]