CVE-2013-10054 – LibrettoCMS Unauthenticated Remote Code Execution File Upload Vulnerability
The following table lists the changes that have been made to the CVE-2013-10054 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2013-10052 – ZPanel Sudo Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2013-10052 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Two high-severity vulnerabilities in Anthropic’s Claude Code could allow attackers to escape restrictions and execute unauthorized commands. Most remarkably, Claude itself unwittingly assisted in deve … Read more Published Date: Aug 04, 2025 (2 hours, 16 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-8518 – Givanz Vvveb Code Editor Remote Code Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-8518 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-51535 – Austrian Archaeological Institute OpenAtlas SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-51535 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-50420 – Poppler PDF Denial of Service
The following table lists the changes that have been made to the CVE-2025-50420 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-44960 – RUCKUS SmartZone OS Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-44960 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-51534 – Austrian Archaeological Institute (AI) OpenAtlas Cross-Site Scripting (XSS)
The following table lists the changes that have been made to the CVE-2025-51534 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-50422 – Poppler PDF Memory Leak Information Disclosure
The following table lists the changes that have been made to the CVE-2025-50422 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]
CVE-2025-44963 – RUCKUS Network Director JWT Spoofing Vulnerability
The following table lists the changes that have been made to the CVE-2025-44963 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]