Go : code execution via VCS Repositoriesopen in new window An attacker can use a vulnerability of Go, via VCS Repositories, in order to run code... Visit link for details Rundeck : code execution via Job Optionsopen in new window An attacker can use a vulnerability of Rundeck, via Job Options, in order to run code... Visit link for details Chrome Edge Opera : two vulnerabilities dated 11/12/2024open in new window An attacker can use several vulnerabilities of Chrome Edge Opera, dated 11/12/2024... Visit link for details GnuTLS : four vulnerabilities dated 11/07/2025open in new window An attacker can use several vulnerabilities of GnuTLS, dated 11/07/2025... Visit link for details Apache Struts : file upload via Action File Upload Interceptoropen in new window An attacker can upload a malicious file on Apache Struts, via Action File Upload Interceptor, in order for example to upload a Trojan... Visit link for details Linux kernel : multiple vulnerabilities dated 11/07/2025open in new window An attacker can use several vulnerabilities of the Linux kernel, dated 11/07/2025... Visit link for details Ivanti Connect Secure : multiple vulnerabilities dated 10/12/2024open in new window An attacker can use several vulnerabilities of Ivanti Connect Secure, dated 10/12/2024... Visit link for details Adobe Acrobat/Reader : multiple vulnerabilities dated 10/12/2024open in new window An attacker can use several vulnerabilities of Adobe Acrobat/Reader, dated 10/12/2024... Visit link for details Aircompressor : memory corruption via sun.misc.Unsafeopen in new window An attacker can trigger a memory corruption of Aircompressor, via sun.misc.Unsafe, in order to trigger a denial of service, and possibly to run code... Visit link for details Splunk Enterprise : code execution via Gateway App Deserializationopen in new window An attacker can use a vulnerability of Splunk Enterprise, via Gateway App Deserialization, in order to run code... Visit link for details