CVE-2025-40911 – Apache Net::CIDR::Set IP CIDR Leading Zero Vulnerability
The following table lists the changes that have been made to the CVE-2025-40911 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 9b29abf9-4ab0-4765-b253-1875cd9b441e May. 27, 2025 Action […]
CVE-2025-32440 – NetAlertX Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-32440 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 27, 2025 Action […]
CVE-2025-5283 – Google Chrome libvpx Use-After-Free Heap Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2025-5283 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 27, 2025 Action […]
CVE-2025-5281 – Google Chrome BFCache User Information Disclosure
The following table lists the changes that have been made to the CVE-2025-5281 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 27, 2025 Action […]
CVE-2025-5280 – Google Chrome V8 Out-of-Bounds Heap Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2025-5280 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 27, 2025 Action […]
CVE-2025-5279 – Amazon Redshift Python Connector AzureOAuth2CredentialsProvider SSL Certificate Validation Bypass
The following table lists the changes that have been made to the CVE-2025-5279 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by ff89ba41-3aa1-4d27-914a-91399e9639e5 May. 27, 2025 Action […]
CVE-2025-5278 – “GNU Coreutils Sort Utility Heap Buffer Under-Read Vulnerability”
The following table lists the changes that have been made to the CVE-2025-5278 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 27, 2025 Action […]
CVE-2025-5222 – ICU Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-5222 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 27, 2025 Action […]
CVE-2025-5198 – Stackrox XSS Vulnerability in Role Object Name
The following table lists the changes that have been made to the CVE-2025-5198 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 27, 2025 Action […]
CVE-2025-5067 – Inappropriate implementation in Tab Strip in Googl
The following table lists the changes that have been made to the CVE-2025-5067 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 27, 2025 Action […]