CVE-2025-58782 – Apache Jackrabbit Core, Apache Jackrabbit JCR Commons: JNDI injection risk with JndiRepositoryFactory

The following table lists the changes that have been made to the CVE-2025-58782 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

Argo CD Security Flaw Rated 9.8 Leaves GitOps Repositories Exposed

Argo CD Security Flaw Rated 9.8 Leaves GitOps Repositories Exposed A security flaw in Argo CD, the popular open-source GitOps tool for Kubernetes, has been targeted at the DevOps and cloud-native communities. Tracked as CVE-2025-55190, the vulnerability has been rate … Read more Published Date: Sep 08, 2025 (2 hours, 17 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-41708 – Cleartext Transmission of Sensitive Data via Insecure HTTP Web Interface

The following table lists the changes that have been made to the CVE-2025-41708 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-41664 – Improper Permission Handling Enables Unauthorized Access to Firmware and Certificates

The following table lists the changes that have been made to the CVE-2025-41664 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-10088 – SourceCodester Time Tracker index.html cross site scripting

The following table lists the changes that have been made to the CVE-2025-10088 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-10087 – SourceCodester Pet Grooming Management Software profit_report.php sql injection

The following table lists the changes that have been made to the CVE-2025-10087 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-8085 – Ditty < 3.1.58 – Unauthenticated SSRF

The following table lists the changes that have been made to the CVE-2025-8085 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]

CVE-2025-10086 – fuyang_lipengjun platform AdPositionController queryAll improper authorization

The following table lists the changes that have been made to the CVE-2025-10086 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Sep. 08, 2025 Action […]