CVE-2025-30483 – Dell ECS Insertion of Sensitive Information into Log File Vulnerability

The following table lists the changes that have been made to the CVE-2025-30483 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]

CVE-2025-0831 – SOLIDWORKS eDrawings JT File Out-Of-Bounds Read Arbitrary Code Execution

The following table lists the changes that have been made to the CVE-2025-0831 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]

CVE-2025-4919: Corruption via Math Space in Mozilla Firefox

CVE-2025-4919: Corruption via Math Space in Mozilla Firefox In recent years, there has been an increase in interest in JavaScript engine vulnerabilities in order to compromise web browsers. Notably, vulnerabilities in JIT engines are among the most favorite on … Read more Published Date: Jul 15, 2025 (1 hour, 43 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-6965 – SQLite Aggregate Overflow

The following table lists the changes that have been made to the CVE-2025-6965 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]

CVE-2025-52376 – Nexxt Solutions NCM-X1800 Mesh Router Telnet Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-52376 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation UEFI firmware running on 100+ Gigabyte motherboard models is affected by memory corruption vulnerabilities that may allow attackers to install persistent and difficult-to-detect bootkits (i.e., malwar … Read more Published Date: Jul 15, 2025 (2 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article.

CVE-2025-34116 – IPFire Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-34116 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by [email protected] Jul. 15, 2025 Action Type […]

CVE-2025-34115 – OP5 Monitor Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-34115 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by [email protected] Jul. 15, 2025 Action Type […]

CVE-2025-34113 – Tiki Wiki CMS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-34113 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by [email protected] Jul. 15, 2025 Action Type […]

CVE-2025-34112 – Riverbed SteelCentral NetProfiler/NetExpress Remote Code Execution

The following table lists the changes that have been made to the CVE-2025-34112 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 15, 2025 Action […]