



An attacker can bypass access restrictions to data of OpenSSL, via Low-level OCB Function, in order to read sensitive information, identified by CVE-2025-69418.
From vigilance.frUn attaquant peut contourner les restrictions d'accès aux données de OpenSSL, via Low-level OCB Function, afin d'obtenir des informations sensibles, identifié par CVE-2025-69418.
From vigilance.frRoad to 1.0
From store.steampowered.comAn attacker, in a guest system, can bypass access restrictions of Xen, via Varstored Mapped Guest Memory, in order to read or alter data, identified by CVE-2025-58151.
From vigilance.frUn attaquant, dans un système invité, peut contourner les restrictions d'accès de Xen, via Varstored Mapped Guest Memory, afin de lire ou modifier des données sur le système hôte, identifié par...
From vigilance.fr
An attacker can bypass restrictions of IBM Power System, via PowerVM Hypervisor, in order to escalate his privileges, identified by CVE-2025-36238.
From vigilance.frUn attaquant peut contourner les restrictions de IBM Power System, via PowerVM Hypervisor, afin d'élever ses privilèges, identifié par CVE-2025-36238.
From vigilance.fr


Crimson Desert crosses 3 million sales as Patch 1.00.03 tackles controls, combat, and bugs while Pearl Abyss audits and replaces AI-generated assets.
From baskingamer.comAn attacker can bypass access restrictions to data of Envoy, via CONNECT Data Forwarding, in order to read sensitive information, identified by CVE-2025-64763.
From vigilance.frUn attaquant peut contourner les restrictions d'accès aux données de Envoy, via CONNECT Data Forwarding, afin d'obtenir des informations sensibles, identifié par CVE-2025-64763.
From vigilance.fr
An attacker can use several vulnerabilities of the Linux kernel, dated 25/01/2026, identified by CVE-2025-71162, CVE-2025-71163, CVE-2026-22996.
From vigilance.fr
