CVE-2025-25615 – Unifiedtransform Attendance List Disclosure

The following table lists the changes that have been made to the CVE-2025-25615 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 10, 2025 Action […]

CVE-2025-1497 – PlotAI Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-1497 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 10, 2025 Action […]

CVE-2024-57492 – RedoxOS Relibc Denial of Service

The following table lists the changes that have been made to the CVE-2024-57492 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 10, 2025 Action […]

CVE-2025-2151 – Assimp Stack-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-2151 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 10, 2025 Action Type […]

CVE-2025-2149 – Apache PyTorch Quantized Sigmoid Module Improper Initialization Vulnerability

The following table lists the changes that have been made to the CVE-2025-2149 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Mar. 10, 2025 Action Type […]

CVE-2025-2148 – PyTorch Tuple Handler Memory Corruption Remote Critical Vulnerability

The following table lists the changes that have been made to the CVE-2025-2148 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 10, 2025 Action […]

CVE-2025-1945 – PickleScan before Python/PyTorch ZIP File Corruption Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-1945 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 103e4ec9-0a87-450b-af77-479448ddef11 Mar. 10, 2025 Action […]

CVE-2025-1944 – PickleScan PyTorch ZIP Archive Corruption Vulnerability

The following table lists the changes that have been made to the CVE-2025-1944 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 103e4ec9-0a87-450b-af77-479448ddef11 Mar. 10, 2025 Action […]

CVE-2025-2147 – Beijing Zhide Intelligent Internet Technology Modern Farm Digital Integrated Management System Remote File Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-2147 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 10, 2025 Action […]

CVE-2025-24387 – “OTRS Session Hijacking Vulnerability”

The following table lists the changes that have been made to the CVE-2025-24387 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 10, 2025 Action […]