CVE-2025-58366 – Onyxia private helm repository credentials are leaked through unauthenticated API

The following table lists the changes that have been made to the CVE-2025-58366 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]

CVE-2025-10027 – itsourcecode POS Point of Sale System 2512.php cross site scripting

The following table lists the changes that have been made to the CVE-2025-10027 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]

CVE-2025-57807 – ImageMagick BlobStream Forward-Seek Under-Allocation

ImageMagick is free and open-source software used for editing and manipulating digital images. ImageMagick versions lower than 14.8.2 include insecure functions: SeekBlob(), which permits advancing the stream offset beyond the current end without increasing capacity, and WriteBlob(), which then expands by quantum + length (amortized) instead of offset + length, and copies to data + […]

CVE-2025-53791 – Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2025-53791 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]

CVE-2025-10061 – Malformed $group Query May Cause MongoDB Server to Crash

The following table lists the changes that have been made to the CVE-2025-10061 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]

CVE-2025-10060 – MongoDB may be susceptible to Invariant Failure in Transactions due Upsert Operation

The following table lists the changes that have been made to the CVE-2025-10060 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]

CVE-2025-10059 – MongoDB Server router will crash when incorrect lsid is set on a sharded query

The following table lists the changes that have been made to the CVE-2025-10059 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]

CVE-2025-9566 – Podman: podman kube play command may overwrite host files

The following table lists the changes that have been made to the CVE-2025-9566 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]