Filter
AND
-Infinity
0

FedoraApache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames

7.5
First published (updated )

FedoraRoutinator terminates when RTR connection is reset too quickly after opening

7.5
First published (updated )

Fedoralibexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external …

7.5
EPSS
0.04%
First published (updated )

PHPPHP-CGI Query String Parameter Vulnerability

First published (updated )

Linux kernelnetfilter: nf_tables: restore set elements when delete set fails

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Linux kernelnetfilter: nft_set_pipapo: walk over current view on netlink dump

First published (updated )

Red Hat Directory Server389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)

First published (updated )

FedoraPath Traversal

7.5
EPSS
0.04%
First published (updated )

FedoraVersions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the…

EPSS
0.04%
First published (updated )

FedoraUndici's Proxy-Authorization header not cleared on cross-origin redirect for dispatch, request, stream, pipeline

EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS, iPadOS, and watchOSInteger overflow in VideoLAN dav1d

8.8
First published (updated )

FedoraOpensc: memory use after free in authentic driver when updating token info

3.4
First published (updated )

ubuntu/c-aresc-ares out of bounds read in ares__read_line()

EPSS
0.04%
First published (updated )

Apple iOS, iPadOS, and watchOSBuffer Overflow, Race Condition, Input Validation

First published (updated )

Apple iOS, iPadOS, and watchOSInput Validation, Race Condition, Buffer Overflow

8.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple iOS, iPadOS, and watchOSBuffer Overflow, Race Condition, Input Validation

7.5
First published (updated )

Apple iOS, iPadOS, and watchOSBuffer Overflow, Race Condition, Input Validation

First published (updated )

ubuntu/freerdp2FreeRDP Integer overflow & OutOfBound Write in clear_decompress_residual_data

EPSS
0.04%
First published (updated )

ubuntu/freerdp2FreeRDP Out-Of-Bounds Read in interleaved_decompress

EPSS
0.04%
First published (updated )

ubuntu/freerdp2FreeRDP Out-Of-Bounds Read in ncrush_decompress

EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

ubuntu/freerdp2FreeRDP Out-Of-Bounds Read in planar_skip_plane_rle

EPSS
0.04%
First published (updated )

ubuntu/freerdp2FreeRDP OutOfBound Read in zgfx_decompress_segment

EPSS
0.04%
First published (updated )

ubuntu/freerdp2FreeRDP vulnerable to integer underflow in nsc_rle_decode

EPSS
0.04%
First published (updated )

FedoraFreeRDP rdp_redirection_read_base64_wchar out of bound read

EPSS
0.04%
First published (updated )

FedoraFreeRDP rdp_write_logon_info_v1 NULL access

7.5
EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

ubuntu/freerdp2FreeRDP zgfx_decompress out of memory vulnerability

7.5
EPSS
0.04%
First published (updated )

ubuntu/freerdp2freerdp_image_copy out of bound read

EPSS
0.04%
First published (updated )

ubuntu/freerdp2FreeRDP ExtractRunLengthRegular* out of bound read

EPSS
0.04%
First published (updated )

redhat/mysqlLast updated 24 July 2024

First published (updated )

FedoraUndici's fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect

3.5
EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203