CVE-2025-58367 – DeepDiff is vulnerable to DoS and Remote Code Execution via Delta class pollution
DeepDiff is a project focused on Deep Difference and search of any Python data. Versions 5.0.0 through 8.6.0 are vulnerable to class pollution via the Delta class constructor, and when combined with a gadget available in DeltaDiff, it can lead to Denial of Service and Remote Code Execution (via insecure Pickle deserialization) exploitation. The gadget […]
CVE-2025-58366 – Onyxia private helm repository credentials are leaked through unauthenticated API
The following table lists the changes that have been made to the CVE-2025-58366 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]
CVE-2025-58369 – fs2: Half-shutdown of socket during TLS handshake may result in spin loop on opposite side
fs2 is a compositional, streaming I/O library for Scala. Versions 3.12.2 and lower and 3.13.0-M1 through 3.13.0-M6 is vulnerable to denial of service attacks though TLS sessions using fs2-io on the JVM using the fs2.io.net.tls package. When establishing a TLS session, if one side of the connection shuts down `write` while the peer side is […]
CVE-2025-10027 – itsourcecode POS Point of Sale System 2512.php cross site scripting
The following table lists the changes that have been made to the CVE-2025-10027 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]
CVE-2025-57807 – ImageMagick BlobStream Forward-Seek Under-Allocation
ImageMagick is free and open-source software used for editing and manipulating digital images. ImageMagick versions lower than 14.8.2 include insecure functions: SeekBlob(), which permits advancing the stream offset beyond the current end without increasing capacity, and WriteBlob(), which then expands by quantum + length (amortized) instead of offset + length, and copies to data + […]
CVE-2025-53791 – Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-53791 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]
CVE-2025-10061 – Malformed $group Query May Cause MongoDB Server to Crash
The following table lists the changes that have been made to the CVE-2025-10061 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]
CVE-2025-10060 – MongoDB may be susceptible to Invariant Failure in Transactions due Upsert Operation
The following table lists the changes that have been made to the CVE-2025-10060 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]
CVE-2025-10059 – MongoDB Server router will crash when incorrect lsid is set on a sharded query
The following table lists the changes that have been made to the CVE-2025-10059 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]
CVE-2025-9566 – Podman: podman kube play command may overwrite host files
The following table lists the changes that have been made to the CVE-2025-9566 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 05, 2025 Action […]