Filter
AND
AND

redhat/FreeIPAFreeipa: delegation rules allow a proxy service to impersonate any user to access another target service

8.8
First published (updated )

Apple iPadOSApple Multiple Products WebKit Use-After-Free Vulnerability

First published (updated )

Redhat Enterprise Linux Server EusUse After Free

8.8
First published (updated )

Redhat Jboss Enterprise Application PlatformThe domain controller in Red Hat JBoss Enterprise Application Platform (EAP) 7.x before 7.0.2 allows…

8.8
First published (updated )

Linux Linux kernelLast updated 29 November 2024

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

FreeBSD FreeBSDInteger Overflow, Buffer Overflow

8.8
First published (updated )

Debian Debian LinuxInteger Overflow, Buffer Overflow

8.8
First published (updated )

redhat/glusterfsThe Gluster filesystem allows for symlink destinations to point to filepaths outside of the mounted …

8.8
First published (updated )

redhat/kernelBroadcom brcmfmac driver is vulnerable to a frame validation bypass

8.3
First published (updated )

Fedoraproject FedoraInput Validation

8.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Red Hat Enterprise LinuxInput Validation

8.1
First published (updated )

redhat/log4jDeserialization of untrusted data in JMSAppender in Apache Log4j 1.2

8.1
First published (updated )

Red Hat Enterprise LinuxA weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Fac…

8.1
First published (updated )

PostgreSQL PostgreSQLA vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary obj…

First published (updated )

Red Hat Enterprise LinuxXorg-x11-server: selinux context corruption

7.8
EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Linux Linux kernelLinux Kernel Race Condition Vulnerability

First published (updated )

Linux Linux kernelRace Condition

7.8
First published (updated )

redhat/eap7-wildflyThere was a vulnerability found in wildfly, where incorrect JBOSS_LOCAL_USER challenge location whe…

7.8
First published (updated )

ISC BINDThe RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x b…

7.8
First published (updated )

Red Hat Enterprise LinuxIn ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

ImageMagick ImageMagickIncorrect Type Cast

7.8
First published (updated )

openSUSE openSUSEMalicious File Upload

7.8
First published (updated )

IBM Cloud Pak for Security (CP4S)X.Org Server XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability

7.8
First published (updated )

Red Hat Enterprise LinuxPyXML: Hash table collisions CPU usage Denial of Service

7.8
First published (updated )

Red Hat Enterprise LinuxLast updated 24 July 2024

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Linux Linux kernelUse After Free

7.8
First published (updated )

Red Hat Enterprise LinuxBuffer Overflow

7.8
First published (updated )

Red Hat Enterprise LinuxAn out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segme…

7.8
First published (updated )

Red Hat Enterprise LinuxBuffer Overflow

7.8
First published (updated )

Red Hat Enterprise LinuxInteger Overflow

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203