CVE-2013-10054 – LibrettoCMS Unauthenticated Remote Code Execution File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2013-10054 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2013-10052 – ZPanel Sudo Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2013-10052 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Two high-severity vulnerabilities in Anthropic’s Claude Code could allow attackers to escape restrictions and execute unauthorized commands. Most remarkably, Claude itself unwittingly assisted in deve … Read more Published Date: Aug 04, 2025 (2 hours, 16 minutes ago) Vulnerabilities has been mentioned in this article.

CVE-2025-8518 – Givanz Vvveb Code Editor Remote Code Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-8518 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-51535 – Austrian Archaeological Institute OpenAtlas SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-51535 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-50420 – Poppler PDF Denial of Service

The following table lists the changes that have been made to the CVE-2025-50420 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-44960 – RUCKUS SmartZone OS Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-44960 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-51534 – Austrian Archaeological Institute (AI) OpenAtlas Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-51534 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-50422 – Poppler PDF Memory Leak Information Disclosure

The following table lists the changes that have been made to the CVE-2025-50422 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]

CVE-2025-44963 – RUCKUS Network Director JWT Spoofing Vulnerability

The following table lists the changes that have been made to the CVE-2025-44963 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]