A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by ‘Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative’ was reported to the affected vendor on: 2025-01-09, 0 days ago. The vendor is given until 2025-05-09 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
Category Archives: Advisories
Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Ivanti Products, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager is a client-based unified endpoint management software. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system.
Ivanti Connect Secure is an SSL VPN solution for remote and mobile users.Ivanti Policy Secure (IPS) is a network access control (NAC) solution which provides network access only to authorized and secured users and devices.Ivanti Neurons for Zero Trust Access (ZTA) Gateways securely connects devices to web applications, whether on-premises or in the cloud, using Zero Trust principles.
Depending on the privileges associated with the system, an attacker could then install programs; view, change, or delete data. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
USN-7193-1: Thunderbird vulnerability
Masato Kinugawa discovered that Thunderbird did not properly validate the
CSP policy in the Web Compatibility extension. An attacker could
potentially exploit this issue to perform a cross-site scripting attack.
USN-7192-1: xfpt vulnerability
It was discovered that xfpt did not properly manage memory under certain
circumstances. If a user were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause the application
to crash or execute arbitrary code.
USN-7191-1: Firefox vulnerabilities
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2025-0237,
CVE-2025-0239, CVE-2025-0240, CVE-2025-0242, CVE-2025-0243, CVE-2025-0247)
Irvan Kurniawan discovered that Firefox incorrectly handled memory when
breaking lines in text, leading to a use-after-free vulnerability. An
attacker could possibly use this issue to cause a denial of service or
possibly execute arbitrary code. (CVE-2025-0238)
Nils Bars discovered that Firefox incorrectly handled memory when using
JavaScript Text Segmentation. An attacker could possibly use this issue to
cause a denial of service. (CVE-2025-0241)
DSA-5840-1 chromium – security update
Security issues were discovered in Chromium which could result
in the execution of arbitrary code, denial of service, or information
disclosure.
redict-7.3.2-1.el9
FEDORA-EPEL-2025-86e34a5c90
Packages in this update:
redict-7.3.2-1.el9
Update description:
update to 7.3.2
fixes CVE-2024-46981
fixes CVE-2024-51741
fixes CVE-2024-31449
fixes CVE-2024-31227
fixes CVE-2024-31228
redict-7.3.2-1.fc41
FEDORA-2025-d6c0319427
Packages in this update:
redict-7.3.2-1.fc41
Update description:
update to 7.3.2
fixes CVE-2024-46981
fixes CVE-2024-51741
fixes CVE-2024-31449
fixes CVE-2024-31227
fixes CVE-2024-31228
redict-7.3.2-1.el8
FEDORA-EPEL-2025-57df67c36a
Packages in this update:
redict-7.3.2-1.el8
Update description:
update to 7.3.2
fixes CVE-2024-46981
fixes CVE-2024-51741
fixes CVE-2024-31449
fixes CVE-2024-31227
fixes CVE-2024-31228
redict-7.3.2-1.fc40
FEDORA-2025-282df7372b
Packages in this update:
redict-7.3.2-1.fc40
Update description:
update to 7.3.2
fixes CVE-2024-46981
fixes CVE-2024-51741
fixes CVE-2024-31449
fixes CVE-2024-31227
fixes CVE-2024-31228