OBS-Vigilance

TitleDescriptionDate
LibreOffice: code execution via Macro URLopen in new windowAn attacker can use a vulnerability of LibreOffice, via Macro URL, in order to run code...Visit link for details
aap-gateway: information disclosure via Path Validationopen in new windowAn attacker can bypass access restrictions to data of aap-gateway, via Path Validation, in order to read sensitive information...Visit link for details
Mozilla Firefox Thunderbird: multiple vulnerabilities dated 04/03/2025open in new windowAn attacker can use several vulnerabilities of Mozilla Firefox Thunderbird, dated 04/03/2025...Visit link for details
ArcGIS Server: multiple vulnerabilities dated 18/02/2025open in new windowAn attacker can use several vulnerabilities of ArcGIS Server, dated 18/02/2025...Visit link for details
FortiOS: ingress filtrering bypass via SSH Trusted Hosts Bypassopen in new windowAn attacker can bypass filtering rules of FortiOS, via SSH Trusted Hosts Bypass, in order to send malicious data...Visit link for details
Google Android Pixel: multiple vulnerabilities of March 2025open in new windowAn attacker can use several vulnerabilities of Google Android Pixel...Visit link for details
Zabbix: information disclosure via problem.view.refreshopen in new windowAn attacker can bypass access restrictions to data of Zabbix, via problem.view.Visit link for details
Zabbix: executing DLL code via OpenSSL Configuration Fileopen in new windowAn attacker can create a malicious DLL for Zabbix, via OpenSSL Configuration File, and then put it in the current directory, in order to execute code...Visit link for details
QEMU: use after free via QIOChannelWebsockopen in new windowAn attacker, in a guest system, can force the reuse of a freed memory area of QEMU, via QIOChannelWebsock, in order to trigger a denial of service, and possibly to run code...Visit link for details
Redis: four vulnerabilities dated 03/10/2025open in new windowAn attacker can use several vulnerabilities of Redis, dated 03/10/2025...Visit link for details