Veritas NetBackup : file upload via BPCD Processopen in new window An attacker can upload a malicious file on Veritas NetBackup, via BPCD Process, in order for example to upload a Trojan... Visit link for details IBM Db2 : denial of service via Columnar Tablesopen in new window An attacker can cause a fatal error of IBM Db2, via Columnar Tables, in order to trigger a denial of service... Visit link for details IBM Db2 : denial of service via Specially Crafted Queryopen in new window An attacker can cause a fatal error of IBM Db2, via Specially Crafted Query, in order to trigger a denial of service... Visit link for details IBM Db2 : denial of service via Crafted Queryopen in new window An attacker can cause a fatal error of IBM Db2, via Crafted Query, in order to trigger a denial of service... Visit link for details SnapCenter : write access via System Logging Configuration Settingsopen in new window An attacker can bypass access restrictions of SnapCenter, via System Logging Configuration Settings, in order to alter data... Visit link for details Suricata Engine : vulnerability dated 01/04/2024open in new window A vulnerability of Suricata Engine, dated 01/04/2024, was announced... Visit link for details Kanidm : denial of service via Oauth2 Claim Mapsopen in new window An attacker can cause a fatal error of Kanidm, via Oauth2 Claim Maps, in order to trigger a denial of service... Visit link for details libuv : ingress filtrering bypass via uv_getaddrinfo()open in new window An attacker can bypass filtering rules of libuv, via uv_getaddrinfo(), in order to send malicious data... Visit link for details undici : vulnerabilityopen in new window A vulnerability of undici was announced... Visit link for details Python Core : use after free via deque_index_impl()open in new window An attacker can force the reuse of a freed memory area of Python Core, via deque_index_impl(), in order to trigger a denial of service, and possibly to run code... Visit link for details