CVE-2025-8535 – “Cronoh NanoVault XSS Vulnerability”

The following table lists the changes that have been made to the CVE-2025-8535 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]

CVE-2025-54871 – Electron TCC Bypass

Electron Capture facilitates video playback for screen-sharing and capture. In versions 2.19.1 and below, the elecap app on macOS allows local unprivileged users to bypass macOS TCC privacy protections by enabling ELECTRON_RUN_AS_NODE. This environment variable allows arbitrary Node.js code to be executed via the -e flag, which runs inside the main Electron context, inheriting any […]

CVE-2025-8538 – Portabilis i-Educar Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-8538 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]

CVE-2025-54870 – VTun-ng Blowfish-256 Plaintext Reversion Vulnerability

The following table lists the changes that have been made to the CVE-2025-54870 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]

CVE-2025-54865 – Tilesheets MediaWiki SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-54865 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]

CVE-2025-54804 – Russh SSH Integer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2025-54804 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]

CVE-2025-54803 – js-toml Prototype Pollution Vulnerability

The following table lists the changes that have been made to the CVE-2025-54803 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]

CVE-2025-54795 – Claude Code Command Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-54795 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]

CVE-2025-54802 – “pyLoad Path Traversal RCE”

pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE). The addcrypted endpoint in pyload-ng suffers from an unsafe path construction vulnerability, allowing […]

CVE-2025-54780 – GLPI Screenshot Plugin File Disclosure and PHP Wrapper Abuse

The following table lists the changes that have been made to the CVE-2025-54780 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]