CVE-2025-8034 – Mozilla Firefox and Thunderbird Memory Corruption Vulnerability

Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects […]

CVE-2025-8032 – Mozilla Firefox/Thunderbird XSLT Document Loading CSP Bypass

The following table lists the changes that have been made to the CVE-2025-8032 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-8030 – Mozilla Firefox/Thunderbird Cross-Site Scripting (XSS)

The following table lists the changes that have been made to the CVE-2025-8030 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-8031 – Mozilla Firefox and Thunderbird HTTP Basic Authentication Credential Leak Vulnerability

The following table lists the changes that have been made to the CVE-2025-8031 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-51475 – SuperAGI File Overwrite Vulnerability

The following table lists the changes that have been made to the CVE-2025-51475 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-51472 – TransformerOptimus SuperAGI Code Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-51472 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-51458 – Eosphoros-ai DB-GPT SQL Injection

The following table lists the changes that have been made to the CVE-2025-51458 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-31513 – AlertEnterprise Guardian Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-31513 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]

CVE-2025-31512 – AlertEnterprise Guardian Approval Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-31512 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 22, 2025 Action […]