CVE-2025-9595 – Code-projects Student Information Management System Cross Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-9595 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]
CVE-2025-48979 – “UISP Command Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2025-48979 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 29, 2025 Action […]
CVE-2025-9594 – iSourcecode Apartment Management System SQL Injection
The following table lists the changes that have been made to the CVE-2025-9594 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]
CVE-2025-9593 – iSourcecode Apartment Management System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-9593 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]
CVE-2025-58062 – OpenMCP Client OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-58062 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 28, 2025 Action […]