It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked
into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or execute code with the privileges of the user
invoking the program.
More Stories
Next.js Middleware Auth.Bypass Vulnerability
What is the Vulnerability?FortiGuard Labs has identified ongoing attack attempts targeting a critical authorization bypass vulnerability (CVE-2025-29927) in the middleware...
httpd-2.4.64-1.fc42
FEDORA-2025-6d7a183951 Packages in this update: httpd-2.4.64-1.fc42 Update description: New httpd 2.4.64 release + security fixes Read More
httpd-2.4.64-1.fc41
FEDORA-2025-b486ffd351 Packages in this update: httpd-2.4.64-1.fc41 Update description: New httpd 2.4.64 release + security fixes Read More
USN-7608-6: Linux kernel (Xilinx ZynqMP) vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...
restic-0.18.0-1.fc43
FEDORA-2025-6241ca1662 Packages in this update: restic-0.18.0-1.fc43 Update description: Automatic update for restic-0.18.0-1.fc43. Changelog * Fri Jul 11 2025 Mikel Olasagasti...
SAP NetWeaver S/4HANA – ABAP Code Execution via Internal Function
Posted by Office nullFaktor GmbH on Jul 11 nullFaktor Security Advisory < 20250719 > =========================================================== Title: ABAP Code Execution via...