Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 2976-3000 di 3852 risultati
Pagina 120 di 155

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-38102 VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify18-02-20262976
MSRC Security UpdateCVE-2022-28391 BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively the attacker could choose to change the terminal's colors.18-02-20262977
MSRC Security UpdateCVE-2023-25585 Field `file_table` of `struct module *module` is uninitialized18-02-20262978
MSRC Security UpdateCVE-2025-38098 drm/amd/display: Don't treat wb connector as physical in create_validate_stream_for_sink18-02-20262979
MSRC Security UpdateCVE-2023-37920 Certifi's removal of e-Tugra root certificate18-02-20262980
MSRC Security UpdateCVE-2024-39485 media: v4l: async: Properly re-initialise notifier entry in unregister18-02-20262981
MSRC Security UpdateCVE-2024-47713 wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()18-02-20262982
MSRC Security UpdateCVE-2024-45000 fs/netfs/fscache_cookie: add missing "n_accesses" check18-02-20262983
MSRC Security UpdateCVE-2025-50084 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).18-02-20262984
MSRC Security UpdateCVE-2024-56708 EDAC/igen6: Avoid segmentation fault on module unload18-02-20262985
MSRC Security UpdateCVE-2023-39128 GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.18-02-20262986
MSRC Security UpdateCVE-2023-25193 hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.18-02-20262987
MSRC Security UpdateCVE-2025-38161 RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction18-02-20262988
MSRC Security UpdateCVE-2023-5870 Postgresql: role pg_signal_backend can signal certain superuser processes.18-02-20262989
MSRC Security UpdateCVE-2025-21787 team: better TEAM_OPTION_TYPE_STRING validation18-02-20262990
MSRC Security UpdateCVE-2024-45006 xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration18-02-20262991
MSRC Security UpdateCVE-2024-50033 slip: make slhc_remember() more robust against malicious packets18-02-20262992
MSRC Security UpdateCVE-2025-50096 Vulnerability in the MySQL Server product of Oracle MySQL18-02-20262993
MSRC Security UpdateCVE-2024-39474 mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL18-02-20262994
MSRC Security UpdateCVE-2025-38146 net: openvswitch: Fix the dead loop of MPLS parse18-02-20262995
MSRC Security UpdateCVE-2010-4226 cpio, as used in build 2007.05.10, 2010.07.28, and possibly other versions, allows remote attackers to overwrite arbitrary files via a symlink within an RPM package archive.18-02-20262996
MSRC Security UpdateCVE-2025-21736 nilfs2: fix possible int overflows in nilfs_fiemap()18-02-20262997
MSRC Security UpdateCVE-2024-43891 tracing: Have format file honor EVENT_FILE_FL_FREED18-02-20262998
MSRC Security UpdateCVE-2025-38126 net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping18-02-20262999
MSRC Security UpdateCVE-2024-0684 Coreutils: heap overflow in split --line-bytes with very long lines18-02-20263000
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter