OBS-Vigilance

TitleDescriptionDate
Drupal Download All Files: information disclosure via Table Of Filesopen in new windowAn attacker can bypass access restrictions to data of Drupal Download All Files, via Table Of Files, in order to read sensitive information...Visit link for details
libjxl: out-of-bounds memory reading via Exif Handleropen in new windowAn attacker can force a read at an invalid memory address of libjxl, via Exif Handler, in order to trigger a denial of service, or to obtain sensitive information...Visit link for details
Apache Guacamole: code execution via Console Codes Sequenceopen in new windowAn attacker can use a vulnerability of Apache Guacamole, via Console Codes Sequence, in order to run code...Visit link for details
pbkdf2: weak signature via Signature Spoofingopen in new windowAn attacker can use malicious data on pbkdf2, via Signature Spoofing, in order to deceive the victim...Visit link for details
pbkdf2: weak signature via Signature Spoofingopen in new windowAn attacker can use malicious data on pbkdf2, via Signature Spoofing, in order to deceive the victim...Visit link for details
LibTIFF: memory leak via tiffcmp/tools/tiffcmp.copen in new windowAn attacker can create a memory leak of LibTIFF, via tiffcmp/tools/Visit link for details
Linux kernel: multiple vulnerabilities dated 04/07/2025open in new windowAn attacker can use several vulnerabilities of the Linux kernel, dated 04/07/2025...Visit link for details
MediaWiki: multiple vulnerabilities dated 04/07/2025open in new windowAn attacker can use several vulnerabilities of MediaWiki, dated 04/07/2025...Visit link for details
Chrome Edge Opera: memory corruption via V8 Type Confusionopen in new windowAn attacker can trigger a memory corruption of Chrome Edge Opera, via V8 Type Confusion, in order to trigger a denial of service, and possibly to run code...Visit link for details
Linux kernel: denial of service via Qdisc Tree Duplicating Netemsopen in new windowAn attacker can cause a fatal error of the Linux kernel, via Qdisc Tree Duplicating Netems, in order to trigger a denial of service...Visit link for details