CVE-2025-7319 – IrfanView CADImage Plugin DWG File Parsing Out-Of-

The following table lists the changes that have been made to the CVE-2025-7319 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-7318 – IrfanView CADImage Plugin DWG File Parsing Memory

The following table lists the changes that have been made to the CVE-2025-7318 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-52362 – PHProxy SSRF

The following table lists the changes that have been made to the CVE-2025-52362 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 21, 2025 Action […]

SharePoint vulnerability with 9.8 severity rating under exploit across globe

SharePoint vulnerability with 9.8 severity rating under exploit across globe ASSUME COMPROMISE Ongoing attacks are allowing hackers to steal credentials giving privileged access. Authorities and researchers are sounding the alarm over the active mass exploitation of a high-sev … Read more Published Date: Jul 21, 2025 (17 hours, 20 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2020-26799 – A reflected cross-site scripting (XSS) vulnerabili

The following table lists the changes that have been made to the CVE-2020-26799 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-44654 – Linksys E2500 vsftpd Unauthenticated Remote Command Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-44654 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 21, 2025 Action […]

CVE-2025-36846 – An issue was discovered in Eveo URVE Web Manager 2

The following table lists the changes that have been made to the CVE-2025-36846 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-36845 – An issue was discovered in Eveo URVE Web Manager 2

The following table lists the changes that have been made to the CVE-2025-36845 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-7393 – Drupal Mail Login Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-7393 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 21, 2025 Action […]

CVE-2025-44658 – Netgear RAX30 PHP-FPM Misconfigured Extension Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-44658 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jul. 22, 2025 Action Type […]