CVE-2025-54582 – Netty Deserialization Vulnerability
The following table lists the changes that have been made to the CVE-2025-54582 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Jul. 30, 2025 Action Type […]
CVE-2025-54576 – OAuth2-Proxy Regex Pattern Bypass Authentication Vulnerability
OAuth2-Proxy is an open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balancer setups. In versions 7.10.0 and below, oauth2-proxy deployments are vulnerable when using the skip_auth_routes configuration option with regex patterns. Attackers can bypass authentication by crafting URLs with query parameters […]
CVE-2025-54581 – Vproxy HTTP Proxy-Authorization Header DoS Vulnerability
The following table lists the changes that have been made to the CVE-2025-54581 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]
CVE-2025-54575 – ImageSharp GIF Denial of Service
The following table lists the changes that have been made to the CVE-2025-54575 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]
CVE-2025-53022 – TrustedFirmware-M Stack Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-53022 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]
CVE-2025-51954 – ElectronHub AI Playground XSS
The following table lists the changes that have been made to the CVE-2025-51954 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]
CVE-2025-52187 – Apache GetProjectsIdea School Management System XSS
The following table lists the changes that have been made to the CVE-2025-52187 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]
CVE-2024-48916 – Ceph JWT Algorithm Validation Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2024-48916 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]
Response to CISA Alert: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities
Response to CISA Alert: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities On July 8, 2025, vulnerabilities CVE-2025-49704 (Remote Code Execution) and CVE-2025-49706 (Network Spoofing), affecting on-premises Microsoft SharePoint servers, were officially reported. On the same … Read more Published Date: Jul 30, 2025 (1 hour, 43 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-53771 […]
CVE-2025-51951 – Andisearch Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-51951 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]