Filter
AND

PHPThe pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorre…

First published (updated )

PHPThe compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorr…

7.8
First published (updated )

Docker Cs EngineInput Validation

7.5
First published (updated )

Docker Cs EngineInput Validation

First published (updated )

openSUSEInput Validation

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Debian Debian LinuxCSRF

First published (updated )

Apple macOSLibreSSL. Multiple issues were addressed by updating to libressl version 2.6.4.

7.5
First published (updated )

Apple macOSBuffer Overflow

First published (updated )

openSUSECommand Injection

7.8
First published (updated )

openSUSEBuffer Overflow

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSELibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) vi…

First published (updated )

openSUSEInteger Overflow

7.8
First published (updated )

Roundcube WebmailXSS

First published (updated )

Roundcube WebmailXSS

First published (updated )

GraphicsMagickBuffer Overflow

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

GraphicsMagickBuffer Overflow

7.8
First published (updated )

openSUSEBuffer Overflow

First published (updated )

openSUSEThe TIFFGetField function in coders/tiff.c in GraphicsMagick 1.3.24 allows remote attackers to cause…

7.5
First published (updated )

openSUSEThe Utah RLE reader in GraphicsMagick before 1.3.25 allows remote attackers to cause a denial of ser…

7.8
First published (updated )

openSUSENull Pointer Dereference

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

NTP ntpThe ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does…

First published (updated )

Debian Debian LinuxThe t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of se…

7.8
First published (updated )

debian/tiffNull Pointer Dereference

7.5
First published (updated )

openSUSEOut-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier al…

First published (updated )

openSUSEBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

debian/tiffDivide by Zero

7.5
First published (updated )

redhat enterprise Linux server eusBuffer Overflow

7.8
First published (updated )

redhat enterprise Linux server eusInteger Overflow

7.8
First published (updated )

openSUSEInteger Overflow

7.8
First published (updated )

openSUSECode Injection

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203