Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 2526-2550 di 4252 risultati
Pagina 102 di 171

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-58160 Tracing logging user input may result in poisoning logs with ANSI escape sequences18-02-20262526
MSRC Security UpdateCVE-2025-23084 A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory. On Windows, a path that does not start with the file separator is treated as relative to the current directory. This vulnerability affects Windows users of `path.join` API.18-02-20262527
MSRC Security UpdateCVE-2025-37988 fix a couple of races in MNT_TREE_BENEATH handling by do_move_mount()18-02-20262528
MSRC Security UpdateCVE-2021-44732 Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.18-02-20262529
MSRC Security UpdateCVE-2025-38181 calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().18-02-20262530
MSRC Security UpdateCVE-2023-42363 A use-after-free vulnerability was discovered in xasprintf function in xfuncs_printf.c:344 in BusyBox v.1.36.1.18-02-20262531
MSRC Security UpdateCVE-2024-3177 Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin18-02-20262532
MSRC Security UpdateCVE-2025-23163 net: vlan: don't propagate flags on open18-02-20262533
MSRC Security UpdateCVE-2023-4580 Push notifications stored on disk in private browsing mode were not being encrypted potentially allowing the leak of sensitive information. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.18-02-20262534
MSRC Security UpdateCVE-2024-49920 drm/amd/display: Check null pointers before multiple uses18-02-20262535
MSRC Security UpdateCVE-2020-36425 An issue was discovered in Arm Mbed TLS before 2.24.0. It incorrectly uses a revocationDate check when deciding whether to honor certificate revocation via a CRL. In some situations, an attacker can exploit this by changing the local clock.18-02-20262536
MSRC Security UpdateCVE-2024-45341 Usage of IPv6 zone IDs can bypass URI name constraints in crypto/x50918-02-20262537
MSRC Security UpdateCVE-2025-38182 ublk: santizize the arguments from userspace when adding a device18-02-20262538
MSRC Security UpdateCVE-2024-41110 Moby authz zero length regression18-02-20262539
MSRC Security UpdateCVE-2024-58098 bpf: track changes_pkt_data property for global functions18-02-20262540
MSRC Security UpdateCVE-2022-3650 A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump and dump privileged information.18-02-20262541
MSRC Security UpdateCVE-2023-3978 Improper rendering of text nodes in golang.org/x/net/html18-02-20262542
MSRC Security UpdateCVE-2025-38234 sched/rt: Fix race in push_rt_task18-02-20262543
MSRC Security UpdateCVE-2023-29400 Improper handling of empty HTML attributes in html/template18-02-20262544
MSRC Security UpdateCVE-2022-30767 nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.18-02-20262545
MSRC Security UpdateCVE-2024-40902 jfs: xattr: fix buffer overflow for invalid xattr18-02-20262546
MSRC Security UpdateCVE-2024-49881 ext4: update orig_path in ext4_find_extent()18-02-20262547
MSRC Security UpdateCVE-2025-37739 f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()18-02-20262548
MSRC Security UpdateCVE-2025-38183 net: lan743x: fix potential out-of-bounds write in lan743x_ptp_io_event_clock_get()18-02-20262549
MSRC Security UpdateCVE-2023-0664 A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.18-02-20262550
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter