CVE-2025-29774 – Apache xml-crypto Signature Bypass Vulnerability
xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed […]
CVE-2025-29387 – Tenda AC9 Stack Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-29387 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-29386 – Tenda AC9 Stack Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-29386 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-29385 – Tenda AC9 Stack Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-29385 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-29384 – Tenda AC9 Out-of-Bounds Write Vulnerability
The following table lists the changes that have been made to the CVE-2025-29384 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-27606 – Element Android PIN Guessing Vulnerability (Physical)
The following table lists the changes that have been made to the CVE-2025-27606 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-26216 – Apache None – Non-Vulnerability
The following table lists the changes that have been made to the CVE-2025-26216 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-26215 – Microsoft Not a Security Issue
The following table lists the changes that have been made to the CVE-2025-26215 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1888 – Leica Aperio Eslide Manager Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-1888 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2024-55594 – Fortinet FortiWeb HTTP/S Command Injection
The following table lists the changes that have been made to the CVE-2024-55594 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.