LibreOffice : code execution via Macro URLopen in new window An attacker can use a vulnerability of LibreOffice, via Macro URL, in order to run code... Visit link for details aap-gateway : information disclosure via Path Validationopen in new window An attacker can bypass access restrictions to data of aap-gateway, via Path Validation, in order to read sensitive information... Visit link for details Mozilla Firefox Thunderbird : multiple vulnerabilities dated 04/03/2025open in new window An attacker can use several vulnerabilities of Mozilla Firefox Thunderbird, dated 04/03/2025... Visit link for details ArcGIS Server : multiple vulnerabilities dated 18/02/2025open in new window An attacker can use several vulnerabilities of ArcGIS Server, dated 18/02/2025... Visit link for details FortiOS : ingress filtrering bypass via SSH Trusted Hosts Bypassopen in new window An attacker can bypass filtering rules of FortiOS, via SSH Trusted Hosts Bypass, in order to send malicious data... Visit link for details Google Android Pixel : multiple vulnerabilities of March 2025open in new window An attacker can use several vulnerabilities of Google Android Pixel... Visit link for details Zabbix : information disclosure via problem.view.refreshopen in new window An attacker can bypass access restrictions to data of Zabbix, via problem.view. Visit link for details Zabbix : executing DLL code via OpenSSL Configuration Fileopen in new window An attacker can create a malicious DLL for Zabbix, via OpenSSL Configuration File, and then put it in the current directory, in order to execute code... Visit link for details QEMU : use after free via QIOChannelWebsockopen in new window An attacker, in a guest system, can force the reuse of a freed memory area of QEMU, via QIOChannelWebsock, in order to trigger a denial of service, and possibly to run code... Visit link for details Redis : four vulnerabilities dated 03/10/2025open in new window An attacker can use several vulnerabilities of Redis, dated 03/10/2025... Visit link for details