CVE-2025-6248 – Lenovo Browser Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-6248 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-6232 – Lenovo Vantage Elevation of Privilege
The following table lists the changes that have been made to the CVE-2025-6232 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-53964 – GoldenDict Uncontrolled File Modification Vulnerability
The following table lists the changes that have been made to the CVE-2025-53964 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jul. 17, 2025 Action Type […]
CVE-2025-4657 – Lenovo Protection Driver Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-4657 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-3753 – ROS Robot Operating System ‘rosbag’ Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-3753 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-2818 – Motorola Smart Connect Bluetooth File Interception Vulnerability
The following table lists the changes that have been made to the CVE-2025-2818 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-23270 – NVIDIA Jetson Linux UEFI Management Mode Information Disclosure and Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-23270 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-23267 – NVIDIA Container Toolkit Link Following Vulnerability (Denial of Service and Data Tampering)
The following table lists the changes that have been made to the CVE-2025-23267 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-23266 – NVIDIA Container Toolkit Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-23266 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]
CVE-2025-1729 – TrackPoint Quick Menu DLL Hijacking Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-1729 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 17, 2025 Action […]