MicroPython : three vulnerabilities dated 19/07/2024open in new window An attacker can use several vulnerabilities of MicroPython, dated 19/07/2024... Visit link for details WebKitGTK WPE WebKit : memory corruption via Web Contentopen in new window An attacker can trigger a memory corruption of WebKitGTK WPE WebKit, via Web Content, in order to trigger a denial of service, and possibly to run code... Visit link for details Werkzeug : overload via multipart/form-dataopen in new window An attacker can trigger an overload of Werkzeug, via multipart/form-data, in order to trigger a denial of service... Visit link for details Apport : information disclosure via Core Dumpopen in new window An attacker can bypass access restrictions to data of Apport, via Core Dump, in order to read sensitive information... Visit link for details Linux kernel : multiple vulnerabilities dated 30/05/2025open in new window An attacker can use several vulnerabilities of the Linux kernel, dated 30/05/2025... Visit link for details ModSecurity : overload via sanitiseMatchedBytesopen in new window An attacker can trigger an overload of ModSecurity, via sanitiseMatchedBytes Visit link for details MyDumper : information disclosure via LOAD LOCAL INFILEopen in new window An attacker can bypass access restrictions to data of MyDumper, via LOAD LOCAL INFILE, in order to read sensitive information... Visit link for details IBM Db2 : overload via Q Replicationopen in new window An attacker can trigger an overload of IBM Db2, via Q Replication, in order to trigger a denial of service... Visit link for details IBM Db2 : denial of service via Queryopen in new window An attacker can cause a fatal error of IBM Db2, via Query, in order to trigger a denial of service... Visit link for details IBM Db2 : denial of service via Queryopen in new window An attacker can cause a fatal error of IBM Db2, via Query, in order to trigger a denial of service... Visit link for details