CVE-2025-50130 – FUJI ELECTRIC CO., LTD. V-SFT/TELLUS Heap-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-50130 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-27061 – Cisco Video Firmware Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the CVE-2025-27061 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-27058 – Cisco IOS Denial of Service

The following table lists the changes that have been made to the CVE-2025-27058 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-27052 – Juniper Networks NetScreen Debug Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-27052 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-27050 – Apache Kafka Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-27050 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-27057 – Aruba Networks Wireless DOS Vulnerability

The following table lists the changes that have been made to the CVE-2025-27057 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-27056 – Apache Tomcat Use-After-Free Memory Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-27056 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-27055 – Adobe Photoshop Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-27055 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-27051 – Cisco WLAN Host Buffer Overflow

The following table lists the changes that have been made to the CVE-2025-27051 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]

CVE-2025-27047 – Apache Tomcat Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the CVE-2025-27047 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 08, 2025 Action […]