1
0
1
0
Vulnerability Timeline
1 vulnerabilities discovered over time for Erase-install
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-70342 | 6.6 | An attacker can capture admin credentials entered during system reinstall or erase operations because the software saves this sensitive information in a publicly accessible file. This vulnerability can be exploited by an unauthenticated user who creates a specific type of communication channel on the system. | grahampugherase-install | Exploit Available | about 1 month agoMar 4, 2026 |
About Grahampugh Erase-install Security
This page provides comprehensive security vulnerability tracking for Grahampugh Erase-install. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Erase-install updated to the latest version
- • Subscribe to security advisories from Grahampugh
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately