CVE-2025-51481 – Local File Inclusion in dagster._grpc.impl.get_not
The following table lists the changes that have been made to the CVE-2025-51481 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
Cloudflare protects against critical SharePoint vulnerability, CVE-2025-53770
Cloudflare protects against critical SharePoint vulnerability, CVE-2025-53770 2025-07-223 min readOn July 19, 2025, Microsoft disclosed CVE-2025-53770, a critical zero-day Remote Code Execution (RCE) vulnerability. Assigned a CVSS 3.1 base score of 9.8 (Critical), the vulnerabi … Read more Published Date: Jul 22, 2025 (4 hours, 45 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53771 CVE-2025-53770 […]
CVE-2025-53770 & CVE-2025-53771: Critical On-Prem SharePoint Vulnerabilities
CVE-2025-53770 & CVE-2025-53771: Critical On-Prem SharePoint Vulnerabilities Cybereason is actively investigating exploitation of these vulnerabilities. Check the Cybereason blog for additional updates. Key Takeaways Two zero-day vulnerabilities discovered in on-premise Micros … Read more Published Date: Jul 22, 2025 (9 hours, 16 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53771 CVE-2025-53770 CVE-2025-49706 CVE-2025-49704 CVE-2025-23006 CVE-2024-55956
CVE-2025-8019 – A vulnerability was found in Shenzhen Libituo Tech
The following table lists the changes that have been made to the CVE-2025-8019 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-5042 – A maliciously crafted RFA file, when parsed throug
The following table lists the changes that have been made to the CVE-2025-5042 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-7371 – Okta On-Premises Provisioning (OPP) agents log cer
The following table lists the changes that have been made to the CVE-2025-7371 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-51480 – Path Traversal vulnerability in onnx.external_data
The following table lists the changes that have been made to the CVE-2025-51480 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-51463 – Path Traversal in restore_run_backup() in AIM 3.28
The following table lists the changes that have been made to the CVE-2025-51463 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-48498 – A null pointer dereference vulnerability exists in
The following table lists the changes that have been made to the CVE-2025-48498 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-46354 – A denial of service vulnerability exists in the Di
The following table lists the changes that have been made to the CVE-2025-46354 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.