OBS-Vigilance

TitleDescriptionDate
MicroPython: three vulnerabilities dated 19/07/2024open in new windowAn attacker can use several vulnerabilities of MicroPython, dated 19/07/2024...Visit link for details
WebKitGTK WPE WebKit: memory corruption via Web Contentopen in new windowAn attacker can trigger a memory corruption of WebKitGTK WPE WebKit, via Web Content, in order to trigger a denial of service, and possibly to run code...Visit link for details
Werkzeug: overload via multipart/form-dataopen in new windowAn attacker can trigger an overload of Werkzeug, via multipart/form-data, in order to trigger a denial of service...Visit link for details
Apport: information disclosure via Core Dumpopen in new windowAn attacker can bypass access restrictions to data of Apport, via Core Dump, in order to read sensitive information...Visit link for details
Linux kernel: multiple vulnerabilities dated 30/05/2025open in new windowAn attacker can use several vulnerabilities of the Linux kernel, dated 30/05/2025...Visit link for details
ModSecurity: overload via sanitiseMatchedBytesopen in new windowAn attacker can trigger an overload of ModSecurity, via sanitiseMatchedBytesVisit link for details
MyDumper: information disclosure via LOAD LOCAL INFILEopen in new windowAn attacker can bypass access restrictions to data of MyDumper, via LOAD LOCAL INFILE, in order to read sensitive information...Visit link for details
IBM Db2: overload via Q Replicationopen in new windowAn attacker can trigger an overload of IBM Db2, via Q Replication, in order to trigger a denial of service...Visit link for details
IBM Db2: denial of service via Queryopen in new windowAn attacker can cause a fatal error of IBM Db2, via Query, in order to trigger a denial of service...Visit link for details
IBM Db2: denial of service via Queryopen in new windowAn attacker can cause a fatal error of IBM Db2, via Query, in order to trigger a denial of service...Visit link for details