CVE-2025-29774 – Apache xml-crypto Signature Bypass Vulnerability

xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed […]

CVE-2025-29387 – Tenda AC9 Stack Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-29387 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-29386 – Tenda AC9 Stack Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-29386 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-29385 – Tenda AC9 Stack Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-29385 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-29384 – Tenda AC9 Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the CVE-2025-29384 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-27606 – Element Android PIN Guessing Vulnerability (Physical)

The following table lists the changes that have been made to the CVE-2025-27606 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-26216 – Apache None – Non-Vulnerability

The following table lists the changes that have been made to the CVE-2025-26216 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-26215 – Microsoft Not a Security Issue

The following table lists the changes that have been made to the CVE-2025-26215 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1888 – Leica Aperio Eslide Manager Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-1888 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2024-55594 – Fortinet FortiWeb HTTP/S Command Injection

The following table lists the changes that have been made to the CVE-2024-55594 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.