Search
An attacker can use malicious data on OpenSSL, via dgst Input Truncation, in order to deceive the victim, identified by CVE-2025-15469.
From vigilance.frAn attacker can force a NULL pointer to be dereferenced on OpenSSL, via SSL_CIPHER_find(), in order to trigger a denial of service, identified by CVE-2025-15468.
From vigilance.frAn attacker can trigger a buffer overflow of OpenSSL, via CMS AuthEnvelopedData Parsing, in order to trigger a denial of service, and possibly to run code, identified by CVE-2025-15467.
From vigilance.frAn unauthenticated remote code execution flaw (CVE-2025-53521) in F5's BIG-IP Access Policy Manager (APM) is under active exploitation.
From helpnetsecurity.comJFrog Security Research vient de mettre au jour une faille majeure affectant la bibliothèque PyPI de telnyx, un SDK essentiel utilisé par les développeurs pour intégrer des agents vocaux IA et des...
From undernews.frAn attacker can trigger a buffer overflow of OpenSSL, via PKCS#12 PBMAC1 Parameters, in order to trigger a denial of service, and possibly to run code, identified by CVE-2025-11187.
From vigilance.frAn attacker can bypass restrictions of Grafana, via Cross-dashboard, in order to escalate his privileges, identified by CVE-2026-21721.
From vigilance.frAn attacker can cause a fatal error of Grafana, via Avatar Cache, in order to trigger a denial of service, identified by CVE-2026-21720.
From vigilance.frJFrog Security Research vient de mettre au jour une faille majeure affectant la bibliothèque PyPI de telnyx, un SDK essentiel utilisé par les développeurs pour intégrer des agents vocaux IA et des...
From undernews.fr
An attacker, in a guest system, can bypass access restrictions of Xen, via Varstored Mapped Guest Memory, in order to read or alter data, identified by CVE-2025-58151.
From vigilance.fr