CVE-2025-8535 – “Cronoh NanoVault XSS Vulnerability”
The following table lists the changes that have been made to the CVE-2025-8535 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54871 – Electron TCC Bypass
Electron Capture facilitates video playback for screen-sharing and capture. In versions 2.19.1 and below, the elecap app on macOS allows local unprivileged users to bypass macOS TCC privacy protections by enabling ELECTRON_RUN_AS_NODE. This environment variable allows arbitrary Node.js code to be executed via the -e flag, which runs inside the main Electron context, inheriting any […]
CVE-2025-8538 – Portabilis i-Educar Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2025-8538 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54870 – VTun-ng Blowfish-256 Plaintext Reversion Vulnerability
The following table lists the changes that have been made to the CVE-2025-54870 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54865 – Tilesheets MediaWiki SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-54865 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54804 – Russh SSH Integer Overflow Vulnerability
The following table lists the changes that have been made to the CVE-2025-54804 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54803 – js-toml Prototype Pollution Vulnerability
The following table lists the changes that have been made to the CVE-2025-54803 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54795 – Claude Code Command Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-54795 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54802 – “pyLoad Path Traversal RCE”
pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE). The addcrypted endpoint in pyload-ng suffers from an unsafe path construction vulnerability, allowing […]
CVE-2025-54780 – GLPI Screenshot Plugin File Disclosure and PHP Wrapper Abuse
The following table lists the changes that have been made to the CVE-2025-54780 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]