CVE-2025-54794 – “Claude Code Directory Traversal Vulnerability”
The following table lists the changes that have been made to the CVE-2025-54794 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54387 – IPX Path Prefix Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-54387 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54130 – “Cursor Dotfile File Write RCE Vulnerability”
The following table lists the changes that have been made to the CVE-2025-54130 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54135 – Cursor Unapproved File Writing and RCE Vulnerability
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn’t. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don’t already exist in the workspace, […]
CVE-2025-54119 – ADOdb SQLite3 SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-54119 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-53544 – Trilium Notes Unauthenticated Brute-Force Protection Bypass Vulnerability
Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. In versions below 0.97.0, a brute-force protection bypass in the initial sync seed retrieval endpoint allows unauthenticated attackers to guess the login password without triggering rate limiting. Trilium is a single-user app without a username requirement, and […]
CVE-2025-52892 – EspoCRM Double Slash URL Vulnerability (Cache Corruption)
The following table lists the changes that have been made to the CVE-2025-52892 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-8534 – Libtiff tiff2ps PS_Lvl2page Null Pointer Dereference Vulnerability
The following table lists the changes that have been made to the CVE-2025-8534 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 05, 2025 Action […]
CVE-2025-54797 – Apache Struts Remote Code Execution
The following table lists the changes that have been made to the CVE-2025-54797 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Aug. 05, 2025 Action Type […]
CVE-2025-8530 – Elunez Eladmin Druid Default Credentials Vulnerability
The following table lists the changes that have been made to the CVE-2025-8530 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 04, 2025 Action […]