CVE-2025-38600 – “Qualcomm Atheros WiFi Off-By-One Array Indexing Vulnerability”
The following table lists the changes that have been made to the CVE-2025-38600 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Aug. 19, 2025 Action […]
CVE-2025-38601 – Qualcomm Atheros Wi-Fi ath11k: Page Fault due to Uninitialized Flag
The following table lists the changes that have been made to the CVE-2025-38601 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Aug. 19, 2025 Action […]
CVE-2025-38599 – “TP-Link Wireless WiFi Out-Of-Boundary Access Vulnerability”
The following table lists the changes that have been made to the CVE-2025-38599 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Aug. 19, 2025 Action […]
CVE-2025-38598 – AMDGPU Use-After-Free Vulnerability
The following table lists the changes that have been made to the CVE-2025-38598 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Aug. 19, 2025 Action […]
CVE-2025-9146 – Linksys E5600 Remote Cryptographic Algorithm Manipulation Vulnerability
The following table lists the changes that have been made to the CVE-2025-9146 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]
CVE-2025-9145 – Scada-LTS SVG File Handler Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-9145 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]
CVE-2025-8782 – Apache Apache HTTP Server Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-8782 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Aug. 19, 2025 Action Type […]
CVE-2025-51540 – EzGED3 Password Hashing Weakness (Insecure Hashing Scheme)
The following table lists the changes that have been made to the CVE-2025-51540 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]
CVE-2025-51539 – EzGED3 PHP File Read Vulnerability
EzGED3 3.5.0 contains an unauthenticated arbitrary file read vulnerability due to improper access control and insufficient input validation in a script exposed via the web interface. A remote attacker can supply a crafted path parameter to a PHP script to read arbitrary files from the filesystem. The script lacks both authentication checks and secure path […]
CVE-2025-50938 – Hustoj XSS
The following table lists the changes that have been made to the CVE-2025-50938 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]