CVE-2025-8011 – Google Chrome V8 Type Confusion Heap Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2025-8011 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]
CVE-2025-7766 – Lantronix Provisioning Manager XML External Entity Injection RCE
The following table lists the changes that have been made to the CVE-2025-7766 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]
CVE-2025-54141 – ViewVC Filesystem Exposure Vulnerability
The following table lists the changes that have been made to the CVE-2025-54141 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]
CVE-2025-54140 – pyLoad Path Traversal Remote Code Execution Vulnerability
pyLoad is a free and open-source Download Manager written in pure Python. In version 0.5.0b3.dev89, an authenticated path traversal vulnerability exists in the /json/upload endpoint of pyLoad. By manipulating the filename of an uploaded file, an attacker can traverse out of the intended upload directory, allowing them to write arbitrary files to any location on […]
CVE-2025-54138 – LibreNMS Remote File Inclusion Vulnerability
The following table lists the changes that have been made to the CVE-2025-54138 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]
CVE-2025-54137 – HAX CMS NodeJS Hardcoded Credentials and Private Keys Vulnerability
The following table lists the changes that have been made to the CVE-2025-54137 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]
CVE-2025-8010 – Google Chrome V8 Type Confusion Heap Corruption
The following table lists the changes that have been made to the CVE-2025-8010 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]
CVE-2025-54072 – Yt-dlp Windows Remote Code Execution Vulnerability
yt-dlp is a feature-rich command-line audio/video downloader. In versions 2025.06.25 and below, when the –exec option is used on Windows with the default placeholder (or {}), insufficient sanitization is applied to the expanded filepath, allowing for remote code execution. This is a bypass of the mitigation for CVE-2024-22423 where the default placeholder and {} were […]
CVE-2025-53703 – DuraComm SPM-500 Data Transmission Without Encryption Vulnerability
The following table lists the changes that have been made to the CVE-2025-53703 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]
CVE-2025-53538 – Suricata HTTP2 Data Stream 0 Memory Corruption Vulnerability
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions 7.0.10 and below and 8.0.0-beta1 through 8.0.0-rc1, mishandling of data on HTTP2 stream 0 can lead to uncontrolled memory usage, leading to loss of visibility. Workarounds include disabling the HTTP/2 parser, and […]