CVE-2025-8329 – Oracle Vehicle Management SQL Injection

The following table lists the changes that have been made to the CVE-2025-8329 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-50777 – AZIOT Smart Wi-Fi CCTV Camera Root Shell Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-50777 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-50464 – “Iptime NAS Firmware Buffer Overflow Vulnerability”

The following table lists the changes that have been made to the CVE-2025-50464 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-36609 – Dell SmartFabric OS10 Hard-coded Password Elevation of Privileges

The following table lists the changes that have been made to the CVE-2025-36609 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-36608 – Dell SmartFabric OS10 XML External Entity Reference Denial of Service

The following table lists the changes that have been made to the CVE-2025-36608 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-30103 – Dell SmartFabric OS10 Local Filesystem Access Vulnerability

The following table lists the changes that have been made to the CVE-2025-30103 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-8328 – Apache Exam Form Submission SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-8328 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-8327 – Code-projects Exam Form Submission SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-8327 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-30105 – Dell XtremIO Log Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-30105 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]

CVE-2025-26332 – Dell XtremIO X2 TechAdvisor Insertion of Sensitive Information into Log File

The following table lists the changes that have been made to the CVE-2025-26332 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 30, 2025 Action […]