Filter
AND
AND
AND

Redhat Enterprise LinuxA flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a mal…

7.5
First published (updated )

IBM Cloud Pak for Security (CP4S)Null Pointer Dereference

7.5
First published (updated )

Linux Linux kernelLast updated 29 November 2024

7.2
First published (updated )

Apple Mac OS XMail. An out-of-bounds write issue was addressed with improved bounds checking.

7.5
First published (updated )

Redhat Enterprise LinuxIn ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Redhat Enterprise LinuxPyXML: Hash table collisions CPU usage Denial of Service

7.8
First published (updated )

Redhat Enterprise LinuxInput Validation

7.5
First published (updated )

Fedoraproject FedoraAn access bypass issue was found in Drupal 7.x before version 7.5. If a Drupal site has the ability …

7.5
First published (updated )

Avaya IP OfficeNull Pointer Dereference

7.5
First published (updated )

Debian Debian LinuxBuffer Overflow

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/kernelBuffer Overflow

8.4
First published (updated )

Linux Linux kernelBuffer Overflow

7.8
First published (updated )

Hp Icewall Sso AgentA security vulnerability in HPE IceWall SSO Agent Option and IceWall MFA (Agent module ) could be ex…

7.1
First published (updated )

redhat/kernelSACK can cause extensive memory use via fragmented resend queue

7.5
First published (updated )

redhat/kernelInteger overflow in TCP_SKB_CB(skb)->tcp_gso_segs

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Fedoraproject FedoraThe .forceput (or .forcedef depending on the ghostscript version) is still accessible via DefineReso…

7.3
First published (updated )

ubuntu/ghostscriptIt was found that some additional operators and dictionaries were needed to be hidden in order to pr…

7.8
First published (updated )

Redhat Enterprise LinuxNetwide Assembler (NASM) 2.14rc16 has a heap-based buffer over-read in expand_mmac_params in asm/pre…

7.8
First published (updated )

Redhat Enterprise LinuxNetwide Assembler (NASM) 2.14rc15 has a heap-based buffer over-read in expand_mmac_params in asm/pre…

7.8
First published (updated )

Oracle Utilities FrameworkInput Validation

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Redhat Jboss Enterprise Application PlatformIt was found that when Artemis and HornetQ before 2.4.0 are configured with UDP discovery and JGroup…

7.8
First published (updated )

Linux Linux kernelRace Condition

7.8
First published (updated )

Redhat Enterprise LinuxInfoleak

7.5
First published (updated )

Redhat Jboss Enterprise Application PlatformIn Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the securi…

First published (updated )

Redhat Enterprise LinuxInfoleak

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Redhat Enterprise LinuxWebExtension scripts can use the data: protocol to affect pages loaded by other web extensions using…

7.5
First published (updated )

Redhat Enterprise LinuxExternal resources that should be blocked when loaded by SVG images can bypass security restrictions…

7.5
First published (updated )

Mozilla FirefoxMozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability

First published (updated )

OpenSSL OpenSSLInfoleak, Weak Encryption

7.5
First published (updated )

redhat/hibernate4-eap6It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat …

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203