Chrome Edge Opera : multiple vulnerabilitiesopen in new window An attacker can use several vulnerabilities of Chrome Edge Opera... Visit link for details Google Android Pixel : multiple vulnerabilities of January 2024open in new window An attacker can use several vulnerabilities of Google Android Pixel... Visit link for details Slurm : six vulnerabilitiesopen in new window An attacker can use several vulnerabilities of Slurm... Visit link for details PHP : ingress filtrering bypass via mail() Newline Header Injectionopen in new window An attacker can bypass filtering rules of PHP, via mail() Newline Header Injection, in order to send malicious data... Visit link for details Deepin-Compressor : code execution via Zip Path Traversalopen in new window An attacker can use a vulnerability of Deepin-Compressor, via Zip Path Traversal, in order to run code... Visit link for details Perl Spreadsheet-ParseExcel : code execution via evalopen in new window An attacker can use a vulnerability of Perl Spreadsheet:: Visit link for details OpenBSD : out-of-bounds memory reading via sndiodopen in new window An attacker can force a read at an invalid memory address of OpenBSD, via sndiod, in order to trigger a denial of service, or to obtain sensitive information... Visit link for details Python Core : ingress filtrering bypass via Serialized Email Header Newlines Injectionopen in new window An attacker can bypass filtering rules of Python Core, via Serialized Email Header Newlines Injection, in order to send malicious data... Visit link for details REXML : overload dated 01/08/2024open in new window An attacker can trigger an overload of REXML, dated 01/08/2024, in order to trigger a denial of service... Visit link for details snapd : file write via Symbolic Linksopen in new window An attacker can bypass access restrictions of snapd, via Symbolic Links, in order to alter files... Visit link for details