QEMU : integer overflow via virtio-netopen in new window An attacker, in a guest system, can trigger an integer overflow of QEMU, via virtio-net, in order to trigger a denial of service, and possibly to run code... Visit link for details Linux kernel : multiple vulnerabilities dated 11/09/2025open in new window An attacker can use several vulnerabilities of the Linux kernel, dated 11/09/2025... Visit link for details OpenBSD 7.8 : denial of service via Syspatch Aliased Nodesopen in new window An attacker can cause a fatal error of OpenBSD 7.8, via Syspatch Aliased Nodes, in order to trigger a denial of service... Visit link for details radare2 : memory leak via _load_relocations()open in new window An attacker can create a memory leak of radare2, via _load_relocations(), in order to trigger a denial of service... Visit link for details Microsoft Visual Studio : privilege escalation dated 11/02/2025open in new window An attacker can bypass restrictions of Microsoft Visual Studio, dated 11/02/2025, in order to escalate his privileges... Visit link for details Microsoft SharePoint : code execution dated 11/02/2025open in new window An attacker can use a vulnerability of Microsoft SharePoint, dated 11/02/2025, in order to run code... Visit link for details Microsoft 365 Apps Office : vulnerabilities of February 2025open in new window An attacker can use several vulnerabilities of Microsoft products... Visit link for details Adobe Commerce Magento Open Source : multiple vulnerabilities dated 11/02/2025open in new window An attacker can use several vulnerabilities of Adobe Commerce Magento Open Source, dated 11/02/2025... Visit link for details FortiOS : buffer overflow via Fabric Serviceopen in new window An attacker can trigger a buffer overflow of FortiOS, via Fabric Service, in order to trigger a denial of service, and possibly to run code... Visit link for details Microsoft Windows PowerShell : privilege escalation via Hyper-Vopen in new window An attacker can bypass restrictions of Microsoft Windows PowerShell, via Hyper-V, in order to escalate his privileges... Visit link for details