CVE-2025-32705 – Microsoft Office Outlook Out-of-bounds Read Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-32705 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]

CVE-2025-32704 – Microsoft Office Excel Buffer Over-read Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-32704 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]

CVE-2025-32703 – Visual Studio Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-32703 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]

CVE-2025-30397 – Microsoft Scripting Engine Type Confusion Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-30397 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]

CVE-2025-30393 – Microsoft Office Excel Use-After-Free Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-30393 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]

CVE-2025-32702 – Visual Studio Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-32702 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]

CVE-2025-32701 – Windows Common Log File System Driver Use-After-Free Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-32701 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]

CVE-2025-30400 – Microsoft Windows DWM Use-After-Free Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-30400 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]

CVE-2025-30394 – Citrix Remote Desktop Gateway Service Denial of Service

The following table lists the changes that have been made to the CVE-2025-30394 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]

CVE-2025-30388 – Windows Win32K GRFX Heap-based Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-30388 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 13, 2025 Action […]