CVE-2025-3304 – “Code-projects Patient Record Management System SQL Injection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-3304 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 05, 2025 Action […]

CVE-2025-32365 – Poppler JBIG2Stream Out-of-Bounds Read Vulnerability

The following table lists the changes that have been made to the CVE-2025-32365 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 05, 2025 Action […]

CVE-2025-32364 – Poppler Floating-Point Exception

The following table lists the changes that have been made to the CVE-2025-32364 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 05, 2025 Action […]

CVE-2025-3303 – Apache Code-projects Patient Record Management System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-3303 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 05, 2025 Action […]

CVE-2025-32360 – Zammad Information Exposure Vulnerability

The following table lists the changes that have been made to the CVE-2025-32360 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 05, 2025 Action […]

CVE-2025-32359 – Zammad Two-Factor Authentication Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-32359 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 05, 2025 Action […]

CVE-2025-32358 – Zammad SSRF

The following table lists the changes that have been made to the CVE-2025-32358 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 05, 2025 Action […]

CVE-2025-32357 – Zammad Privilege Escalation Information Disclosure

The following table lists the changes that have been made to the CVE-2025-32357 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 05, 2025 Action […]

CVE-2024-56370 – Xero Perl Cryptographic Entropy Weakness

The following table lists the changes that have been made to the CVE-2024-56370 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 9b29abf9-4ab0-4765-b253-1875cd9b441e Apr. 05, 2025 Action […]

CVE-2024-52322 – Xero WebService Perl Cryptographic Entropy Weakness

The following table lists the changes that have been made to the CVE-2024-52322 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 9b29abf9-4ab0-4765-b253-1875cd9b441e Apr. 05, 2025 Action […]