CVE-2025-9047 – Projectworlds Visitor Management System SQL Injection
The following table lists the changes that have been made to the CVE-2025-9047 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-9046 – Tenda AC20 Stack-Based Buffer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-9046 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-9028 – “Code-projects Online Medicine Guide SQL Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2025-9028 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-26709 – ZTE F50 Web Module Unauthorized Access Vulnerability
The following table lists the changes that have been made to the CVE-2025-26709 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-9027 – “Code-Projects Online Medicine Guide SQL Injection”
The following table lists the changes that have been made to the CVE-2025-9027 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-9026 – D-Link DIR-860L OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-9026 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-9025 – Simple Cafe Ordering System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-9025 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-9023 – Tenda AC7/AC18 Buffer Overflow in formSetSchedLed
The following table lists the changes that have been made to the CVE-2025-9023 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-9024 – PHPGurukul Beauty Parlour Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-9024 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]
CVE-2025-8905 – WordPress Inpersttion For Theme Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-8905 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 15, 2025 Action […]