CVE-2025-2644 – PHPGurukul Art Gallery Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2644 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]
CVE-2025-2643 – PHPGurukul Art Gallery Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2643 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]
CVE-2025-2642 – PHPGurukul Art Gallery Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2642 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]
CVE-2025-1446 – “Pods SQL Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2025-1446 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]
CVE-2025-0718 – WordPress Nested Pages Stored Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-0718 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]
CVE-2025-2641 – PHPGurukul Art Gallery Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-2641 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]
CVE-2025-2640 – PHPGurukul Doctor Appointment Management System SQL Injection
The following table lists the changes that have been made to the CVE-2025-2640 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]
CVE-2025-2639 – JIZHICMS Remote Unauthorized Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-2639 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]
CVE-2025-2638 – JIZHICMS Article Handler Remote Authorization Bypass
The following table lists the changes that have been made to the CVE-2025-2638 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]
CVE-2025-2637 – JIZHICMS Remote Improper Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-2637 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Mar. 23, 2025 Action […]