CVE-2025-5561 – PHPGurukul Curfew e-Pass Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-5561 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]
CVE-2025-20996 – Samsung Smart Switch Authorization Bypass
The following table lists the changes that have been made to the CVE-2025-20996 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]
CVE-2025-20995 – Samsung Internet File Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-20995 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]
CVE-2025-20994 – Samsung Internet File Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-20994 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]
CVE-2025-20993 – Samsung Camera libsecimaging Camera Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-20993 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]
CVE-2025-20992 – Samsung Camera Out-of-Bounds Read Vulnerability
The following table lists the changes that have been made to the CVE-2025-20992 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]
CVE-2025-20987 – Samsung Galaxy Fingerprint Vulnerability – Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-20987 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]
CVE-2025-20981 – Google AudioService Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-20981 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]
CVE-2025-20991 – Android Bluetooth Improper Export of Components Vulnerability
The following table lists the changes that have been made to the CVE-2025-20991 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]
CVE-2025-20989 – Fingerprint Trustlet Log Forgery Vulnerability
The following table lists the changes that have been made to the CVE-2025-20989 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jun. 04, 2025 Action […]