CVE-2025-2363 – Lenve VBlog Remote Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-2363 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2362 – PHPGurukul Pre-School Enrollment System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2362 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2361 – Mercurial SCM Web Interface Remote Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-2361 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2360 – D-Link DIR-823G UPnP Service SOAPAction Improper Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-2360 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2359 – D-Link DIR-823G DDNS Service SOAPAction Authorization Bypass
The following table lists the changes that have been made to the CVE-2025-2359 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2358 – Shenzhen Mingyuan Cloud Technology Mingyuan Real Estate ERP System HTTP Header Handler SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2358 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2357 – DCMTK JPEG-LS Decoder Remote Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2025-2357 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2356 – BlackVue App Remote File Inclusion Vulnerability
The following table lists the changes that have been made to the CVE-2025-2356 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-2355 – BlackVue App API Endpoint Handler Unprotected Credentials Storage Vulnerability
The following table lists the changes that have been made to the CVE-2025-2355 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-30089 – Gurk ANSI Escape Sequence Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-30089 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.