CVE-2025-2352 – StarSea99 starsea-mall Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-2352 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2351 – DayCloud StudentManage SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2351 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2350 – IROAD Dash Cam FX2 Unrestricted File Upload Vulnerability
The following table lists the changes that have been made to the CVE-2025-2350 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2349 – IROAD Dash Cam FX2 Password Hash Handler Insufficient Computational Effort Vulnerability
The following table lists the changes that have been made to the CVE-2025-2349 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2348 – IROAD Dash Cam FX2 HTTP/RTSP Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2025-2348 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2347 – IROAD Dash Cam FX2 Default Password Use Local Network Vulnerability (Authentication Bypass)
The following table lists the changes that have been made to the CVE-2025-2347 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2346 – IROAD Dash Cam X5 and X6 Cross-Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-2346 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2345 – “IROAD Dash Cam X5 and Dash Cam X6 Remote Unauthenticated RCE”
The following table lists the changes that have been made to the CVE-2025-2345 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2344 – IROAD Dash Cam X5 and Dash Cam X6 API Endpoint Missing Authentication Vulnerability
The following table lists the changes that have been made to the CVE-2025-2344 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2343 – IROAD Dash Cam X5 and X6 – Critical Hard-Coded Credentials Vulnerability in Device Pairing
The following table lists the changes that have been made to the CVE-2025-2343 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.