CVE-2025-54429 – Polkadot Frontier CallableByContract AddressType Vulnerability
Polkadot Frontier is an Ethereum and EVM compatibility layer for Polkadot and Substrate. There are various account address types in Frontier, e.g. precompiled contracts, smart contracts, and externally owned accounts. Some EVM mechanisms should be unreachable by certain types of accounts for safety. For precompiles to be callable by smart contracts they must be explicitly […]
CVE-2025-54427 – Polkadot Frontier EVM Gas Price Manipulation Denial-of-Service
Polkadot Frontier is an Ethereum and EVM compatibility layer for Polkadot and Substrate. The extrinsic note_min_gas_price_target is an inherent extrinsic, meaning only the block producer can call it. To ensure correctness, the ProvideInherent trait should be implemented for each inherent, which includes the check_inherent call. This allows other nodes to verify if the input (in […]
CVE-2025-54428 – RevelaCode MongoDB Atlas URI Exposure
RevelaCode is an AI-powered faith-tech project that decodes biblical verses, prophecies and global events into accessible language. In versions below 1.0.1, a valid MongoDB Atlas URI with embedded username and password was accidentally committed to the public repository. This could allow unauthorized access to production or staging databases, potentially leading to data exfiltration, modification, or […]
CVE-2025-54426 – Polkadot Frontier Curve25519 Precompute Invalid Input Handling
The following table lists the changes that have been made to the CVE-2025-54426 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]
CVE-2025-54423 – Copyparty Cross-Site Scripting (XSS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-54423 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]
CVE-2025-54419 – Node-SAML SAML Assertion Tampering
The following table lists the changes that have been made to the CVE-2025-54419 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]
CVE-2025-50486 – PHPGurukul Car Rental Project Session Hijacking Vulnerability
The following table lists the changes that have been made to the CVE-2025-50486 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]
CVE-2025-50485 – PHPGurukul Online Course Registration Session Hijacking Vulnerability
The following table lists the changes that have been made to the CVE-2025-50485 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]
CVE-2025-29534 – PowerStick Wave Dual-Band Wifi Extender Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-29534 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 28, 2025 Action […]
CVE-2025-8283 – “Podman Netavark DNS Hijacking Vulnerability”
A vulnerability was found in the netavark package, a network stack for containers used with Podman. Due to dns.podman search domain being removed, netavark may return external servers if a valid A/AAAA record is sent as a response. When creating a container with a given name, this name will be used as the hostname for […]