| HP LaserJet: three vulnerabilities dated 14/02/2025open in new window | An attacker can use several vulnerabilities of HP LaserJet, dated 14/02/2025... | Visit link for details |
| OpenBSD: denial of service via smtpd imsgopen in new window | An attacker can cause a fatal error of OpenBSD, via smtpd imsg, in order to trigger a denial of service... | Visit link for details |
| GNU Binutils: memory leak via display_info()open in new window | An attacker can create a memory leak of GNU Binutils, via display_info(), in order to trigger a denial of service... | Visit link for details |
| GNU Binutils: memory leak via link_order_scan()open in new window | An attacker can create a memory leak of GNU Binutils, via link_order_scan(), in order to trigger a denial of service... | Visit link for details |
| Chrome Edge Opera: memory corruption via V8open in new window | An attacker can trigger a memory corruption of Chrome Edge Opera, via V8, in order to trigger a denial of service, and possibly to run code... | Visit link for details |
| PostgreSQL: SQL injection via PQescape Miss Neutralizationopen in new window | An attacker can use a SQL injection of PostgreSQL, via PQescape Miss Neutralization, in order to read or alter data... | Visit link for details |
| Go: ingress filtrering bypass via net/http CrossOriginProtectionopen in new window | An attacker can bypass filtering rules of Go, via net/http CrossOriginProtectio | Visit link for details |
| Chrome Edge Opera: four vulnerabilities dated 12/02/2025open in new window | An attacker can use several vulnerabilities of Chrome Edge Opera, dated 12/02/2025... | Visit link for details |
| WebKitGTK: memory corruption via Web Contentopen in new window | An attacker can trigger a memory corruption of WebKitGTK, via Web Content, in order to trigger a denial of service, and possibly to run code... | Visit link for details |
| WebKitGTK: code execution via Web Inspectoropen in new window | An attacker can use a vulnerability of WebKitGTK, via Web Inspector, in order to run code... | Visit link for details |