Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 2676-2700 di 3852 risultati
Pagina 108 di 155

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2023-50966 erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value in a JOSE header.18-02-20262676
MSRC Security UpdateCVE-2024-37371 In MIT Kerberos 5 (aka krb5) before 1.21.3 an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.18-02-20262677
MSRC Security UpdateCVE-2025-22058 udp: Fix memory accounting leak.18-02-20262678
MSRC Security UpdateCVE-2024-4068 Memory Exhaustion in braces18-02-20262679
MSRC Security UpdateCVE-2025-27363 An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.18-02-20262680
MSRC Security UpdateCVE-2025-7339 on-headers vulnerable to http response header manipulation18-02-20262681
MSRC Security UpdateCVE-2022-50230 arm64: set UXN on swapper page tables18-02-20262682
MSRC Security UpdateCVE-2025-38103 HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()18-02-20262683
MSRC Security UpdateCVE-2024-49969 drm/amd/display: Fix index out of bounds in DCN30 color transformation18-02-20262684
MSRC Security UpdateCVE-2023-51714 An issue was discovered in the HTTP2 implementation in Qt before 5.15.17 6.x before 6.2.11 6.3.x through 6.5.x before 6.5.4 and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer overflow check.18-02-20262685
MSRC Security UpdateCVE-2024-56596 jfs: fix array-index-out-of-bounds in jfs_readdir18-02-20262686
MSRC Security UpdateCVE-2024-47739 padata: use integer wrap around to prevent deadlock on seq_nr overflow18-02-20262687
MSRC Security UpdateCVE-2025-21941 drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params18-02-20262688
MSRC Security UpdateCVE-2024-58083 KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()18-02-20262689
MSRC Security UpdateCVE-2024-31852 LLVM before 18.1.3 generates code in which the LR register can be overwritten without data being saved to the stack and thus there can sometimes be an exploitable error in the flow of control. This affects the ARM backend and can be demonstrated with Clang. NOTE: the vendor perspective is "we don't have strong objections for a CVE to be created ... It does seem that the likelihood of this miscompile enabling an exploit remains very low because the miscompile resulting in this JOP gadget is such that the function is most likely to crash on most valid inputs to the function. So if this function is covered by any testing the miscompile is most likely to be discovered before the binary is shipped to production."18-02-20262690
MSRC Security UpdateCVE-2025-38145 soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop()18-02-20262691
MSRC Security UpdateCVE-2025-37878 perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init18-02-20262692
MSRC Security UpdateCVE-2025-58754 Axios is vulnerable to DoS attack through lack of data size check18-02-20262693
MSRC Security UpdateCVE-2024-37370 In MIT Kerberos 5 (aka krb5) before 1.21.3 an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token causing the unwrapped token to appear truncated to the application.18-02-20262694
MSRC Security UpdateCVE-2025-38039 net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload enabled18-02-20262695
MSRC Security UpdateCVE-2023-30589 The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3 only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16 v18 and v20 18-02-20262696
MSRC Security UpdateCVE-2024-36013 Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()18-02-20262697
MSRC Security UpdateCVE-2025-68324 scsi: imm: Fix use-after-free bug caused by unfinished delayed work18-02-20262698
MSRC Security UpdateCVE-2025-38149 net: phy: clear phydev->devlink when the link is deleted18-02-20262699
MSRC Security UpdateCVE-2023-3817 Excessive time spent checking DH q parameter value18-02-20262700
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter