CVE-2025-5156 – H3C GR-5400AX Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-5156 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]

CVE-2025-5155 – FoxCMS SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5155 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]

CVE-2025-5154 – PhonePe SQLite Database Cleartext Storage Vulnerability

The following table lists the changes that have been made to the CVE-2025-5154 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]

CVE-2025-5153 – CMS Made Simple Design Manager Module Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-5153 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]

CVE-2025-5152 – “Chanjet CRM SQL Injection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-5152 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]

CVE-2025-5151 – Defog-ai Introspect Code Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5151 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]

CVE-2025-5150 – “Docarray Web API Prototype Pollution Vulnerability”

The following table lists the changes that have been made to the CVE-2025-5150 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]

CVE-2025-5149 – WCMS Remote Authentication Bypass

The following table lists the changes that have been made to the CVE-2025-5149 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]

CVE-2025-5148 – FunAudioLLM InspireMusic Pickle Data Handler Deserialization Vulnerability

The following table lists the changes that have been made to the CVE-2025-5148 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]

CVE-2025-5147 – Netcore NBR1005GPEV2, NBR200V2, B6V2 Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5147 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 25, 2025 Action […]