CVE-2025-3152 – Caipeichao ThinkOX Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-3152 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]

CVE-2025-3151 – SourceCodester Gym Management System SQL Injection

The following table lists the changes that have been made to the CVE-2025-3151 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]

CVE-2025-22005 – Linux Kernel IPv6 Memory Leak Vulnerability

The following table lists the changes that have been made to the CVE-2025-22005 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Apr. 03, 2025 Action […]

CVE-2025-3150 – “Inting Student Homework Management System Cross-Site Request Forgery Vulnerability”

The following table lists the changes that have been made to the CVE-2025-3150 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]

CVE-2025-3149 – “ITing Student Homework Management System Cross-Site Scripting Vulnerability”

The following table lists the changes that have been made to the CVE-2025-3149 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 03, 2025 Action […]

CVE-2025-22007 – Linux Bluetooth NULL Dereference Vulnerability

The following table lists the changes that have been made to the CVE-2025-22007 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Apr. 03, 2025 Action […]

CVE-2025-22006 – Cisco Ethernet Linux Kernel NULL Pointer Dereference Vulnerability

The following table lists the changes that have been made to the CVE-2025-22006 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Apr. 03, 2025 Action […]

CVE-2025-22001 – “Qualcomm Accelerator Integer Overflow Vulnerability”

The following table lists the changes that have been made to the CVE-2025-22001 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Apr. 03, 2025 Action […]

CVE-2025-22004 – Linux Kernel Use After Free Vulnerability in ATM Net

The following table lists the changes that have been made to the CVE-2025-22004 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Apr. 03, 2025 Action […]