Filter
AND
AND
-Infinity
0

Debian Linuxdump in Debian GNU/Linux 2.1 does not properly restore symlinks, which allows a local user to modify…

2.1
First published (updated )

Berkeley nvinviboot boot script in the Debian nvi package allows local users to delete files via malformed entri…

2.1
First published (updated )

Mandrake Linuxcpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask wh…

2.1
First published (updated )

SudoSudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitr…

2.1
First published (updated )

Debian LinuxTrn allows local users to overwrite other users' files via symlinks.

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Debian LinuxThe logging facility of the Debian smtp-refuser package allows local users to delete arbitrary files…

2.1
First published (updated )

Debian LinuxDebian GNU/Linux cfengine package is susceptible to a symlink attack.

2.1
First published (updated )

ubuntu/redisRedis Unix-domain socket may have be exposed with the wrong permissions for a short time window.

3.6
First published (updated )

ubuntu/util-linuxEscape sequence injection in util-linux wall

3.3
EPSS
0.04%
First published (updated )

Oracle Java SE 7Integer Overflow

3.7
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

ubuntu/open-vm-toolsVMware Tools Authentication Bypass Vulnerability

First published (updated )

redhat/curlInput Validation

3.7
First published (updated )

IBM Data Virtualization on Cloud Pak for DataAn unspecified vulnerability in Oracle MySQL related to the Connectors Connector/J component could a…

3.5
First published (updated )

Debian LinuxUse After Free

3.3
First published (updated )

redhat/jettyEclipse Jetty could allow a physical attacker to bypass security restrictions, caused by a session I…

3.6
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Oracle Java SE 7Last updated 24 July 2024

3.7
First published (updated )

Oracle Java SE 7Last updated 24 July 2024

3.7
First published (updated )

OpenJDK 8An unspecified vulnerability in Oracle Java SE and GraalVM Enterprise Edition related to the Librari…

3.7
First published (updated )

OpenJDK 8An unspecified vulnerability in Oracle Java SE, Oracle GraalVM Enterprise Edition related to the Lib…

3.7
First published (updated )

OpenJDK 8An unspecified vulnerability in Oracle Java SE, Oracle GraalVM Enterprise Edition related to the Net…

3.7
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Oracle Java SE 7Last updated 24 July 2024

3.7
First published (updated )

redhat/javaLast updated 24 July 2024

3.7
First published (updated )

IBM Cloud Pak for Business AutomationPath Traversal

3.1
First published (updated )

Linux KernelLinux Kernel kcm kcmsock.c kcm_tx_work race condition

2.6
First published (updated )

Debian LinuxUse After Free

3.3
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Debian LinuxLast updated 24 July 2024

3.2
First published (updated )

redhat/kernelLast updated 24 March 2025

3.3
First published (updated )

redhat/pumaInconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in puma

3.7
First published (updated )

Linux KernelInput Validation

3.3
First published (updated )

Red Hat Enterprise LinuxLast updated 11 November 2024

3.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203