CVE-2025-2295 – EDK2 BIOS Integer Overflow Denial of Service
The following table lists the changes that have been made to the CVE-2025-2295 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2320 – SpringBoot-OpenAI-ChatGPT Unauthenticated Remote Authorization Bypass
The following table lists the changes that have been made to the CVE-2025-2320 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2310 – HDF5 Heap-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-2310 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2309 – HDF5 Type Conversion Logic Heap Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-2309 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2308 – HDF5 Scale-Offset Filter Heap-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-2308 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-29782 – WeGIA Web Manager for Charitable Institutions Stored Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-29782 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-29771 – HtmlSanitizer Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-29771 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-29780 – Post-Quantum Secure Feldman’s Verifiable Secret Sharing Timing Side-Channel Vulnerability
Post-Quantum Secure Feldman’s Verifiable Secret Sharing provides a Python implementation of Feldman’s Verifiable Secret Sharing (VSS) scheme. In versions 0.7.6b0 and prior, the `feldman_vss` library contains timing side-channel vulnerabilities in its matrix operations, specifically within the `_find_secure_pivot` function and potentially other parts of `_secure_matrix_solve`. These vulnerabilities are due to Python’s execution model, which does not […]
CVE-2025-29779 – Apache Post-Quantum Secure Feldman’s Verifiable Secret Sharing Fault Injection Attacks
Post-Quantum Secure Feldman’s Verifiable Secret Sharing provides a Python implementation of Feldman’s Verifiable Secret Sharing (VSS) scheme. In versions 0.7.6b0 and prior, the `secure_redundant_execution` function in feldman_vss.py attempts to mitigate fault injection attacks by executing a function multiple times and comparing results. However, several critical weaknesses exist. Python’s execution environment cannot guarantee true isolation between […]
CVE-2025-29775 – Apache xml-crypto Signature Bypass Vulnerability
xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed […]