Filter
AND
-Infinity
0

Red Hat Enterprise LinuxGrub2: squash4: integer overflow may lead to heap based out-of-bounds write when reading data

First published (updated )

OpenSSHOpenssh: machine-in-the-middle attack if verifyhostkeydns is enabled

EPSS
8.93%
First published (updated )

Linux KernelFixes in Linux Kernel

First published (updated )

Red Hat ModClusterMod_cluster/mod_proxy_cluster: stored cross site scripting

EPSS
0.04%
First published (updated )

Apache Tomcat- Rapid Reset HTTP/2 vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

npm/electronHeap buffer overflow in vp8 encoding in libvpx

First published (updated )

Red Hat CodeReady Linux BuilderGNU C Library Buffer Overflow Vulnerability

First published (updated )

Apple iOS, iPadOS, and macOSApple Multiple Products WebKit Use-After-Free Vulnerability

First published (updated )

redhat/kernelLinux Kernel Privilege Escalation Vulnerability

First published (updated )

Red Hat Enterprise Linux ServerRed Hat Polkit Out-of-Bounds Read and Write Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/polkitRed Hat Polkit Incorrect Authorization Vulnerability

First published (updated )

Red Hat Enterprise Linux ServerWebKitGTK Memory Corruption Vulnerability

First published (updated )

redhat/chromium-browserGoogle Chromium V8 Type Confusion Vulnerability

First published (updated )

VMware ESXi and Horizon DaaSVMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability

First published (updated )

Red Hat Enterprise Linux ServerUnderflow in PHP-FPM can lead to RCE

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Linux KernelLinux Kernel Improper Privilege Management Vulnerability

First published (updated )

UbuntuApache HTTP Server Privilege Escalation Vulnerability

First published (updated )

Oracle Financial Services Liquidity Risk Measurement and ManagementXSS, Input Validation

First published (updated )

tvOSApple Multiple Products Type Confusion Vulnerability

First published (updated )

ElasticKibana Arbitrary Code Execution

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Jenkins Script SecurityJenkins Script Security Plugin Sandbox Bypass Vulnerability

First published (updated )

redhat/jenkins-plugin-workflow-cpsJenkins Matrix Project Plugin Remote Code Execution Vulnerability

First published (updated )

maven/org.jenkins-ci.main:jenkins-coreJenkins Stapler Web Framework Deserialization of Untrusted Data Vulnerability

First published (updated )

Macromedia Flash PlayerAdobe Flash Player Use-After-Free Vulnerability

First published (updated )

debian/chromiumGoogle Chromium V8 Out-of-Bounds Write Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Red Hat Enterprise Linux ServerGoogle Chromium V8 Remote Code Execution Vulnerability

First published (updated )

Red Hat RichFacesRed Hat JBoss RichFaces Framework Expression Language Injection Vulnerability

First published (updated )

Macromedia Flash PlayerAdobe Flash Player Stack-based Buffer Overflow Vulnerability

First published (updated )

debian/chromium-browser(Pwn2Own) Xiaomi Mi6 Browser CalculateInstanceSizeHelper Integer Overflow Remote Code Execution Vulnerability

First published (updated )

Macromedia Flash PlayerAdobe Flash Player Use-After-Free Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203