CVE-2025-36520 – A null pointer dereference vulnerability exists in

The following table lists the changes that have been made to the CVE-2025-36520 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-36512 – A denial of service vulnerability exists in the Bl

The following table lists the changes that have been made to the CVE-2025-36512 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-35966 – A null pointer dereference vulnerability exists in

The following table lists the changes that have been made to the CVE-2025-35966 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups

Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups Jul 22, 2025Ravie LakshmananVulnerability / Threat Intelligence Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking g … Read more Published Date: Jul 22, 2025 (5 hours, 30 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53771 […]

Microsoft pins on-prem SharePoint attacks on Chinese threat actors

Microsoft pins on-prem SharePoint attacks on Chinese threat actors As Microsoft continues to update its customer guidance for protecting on-prem SharePoint servers against the latest in-the-wild attacks, more security firms have begun sharing details about the ones t … Read more Published Date: Jul 22, 2025 (3 hours, 51 minutes ago) Vulnerabilities has been mentioned in this […]

CVE-2025-8018 – A vulnerability was found in code-projects Food Or

The following table lists the changes that have been made to the CVE-2025-8018 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-8015 – The WP Shortcodes Plugin — Shortcodes Ultimate plu

CVE ID : CVE-2025-8015 Published : July 22, 2025, 3:15 p.m. | 1 hour, 25 minutes ago Description : The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an uploaded image’s ‘Title’ and ‘Slide link’ fields in all versions up to, and including, 7.4.2 due to insufficient input sanitization […]

CVE-2025-51865 – Ai2 playground web service (playground.allenai.org

The following table lists the changes that have been made to the CVE-2025-51865 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-51863 – Self Cross Site Scripting (XSS) vulnerability in C

The following table lists the changes that have been made to the CVE-2025-51863 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-51864 – A reflected cross-site scripting (XSS) vulnerabili

The following table lists the changes that have been made to the CVE-2025-51864 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.