Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 3151-3175 di 3852 risultati
Pagina 127 di 155

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2024-56746 fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem()18-02-20263151
MSRC Security UpdateCVE-2024-6119 Possible denial of service in X.509 name checks18-02-20263152
MSRC Security UpdateCVE-2024-50058 serial: protect uart_port_dtr_rts() in uart_shutdown() too18-02-20263153
MSRC Security UpdateCVE-2020-28362 Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.18-02-20263154
MSRC Security UpdateCVE-2024-58002 media: uvcvideo: Remove dangling pointers18-02-20263155
MSRC Security UpdateCVE-2024-24791 Denial of service due to improper 100-continue handling in net/http18-02-20263156
MSRC Security UpdateCVE-2025-1735 pgsql extension does not check for errors during escaping18-02-20263157
MSRC Security UpdateCVE-2025-57052 cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.18-02-20263158
MSRC Security UpdateCVE-2025-21761 openvswitch: use RCU protection in ovs_vport_cmd_fill_info()18-02-20263159
MSRC Security UpdateCVE-2024-2313 If kernel headers need to be extracted bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.18-02-20263160
MSRC Security UpdateCVE-2023-27534 A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.18-02-20263161
MSRC Security UpdateCVE-2025-5455 Possible denial of service when passing malformed data in a URL to qDecodeDataUrl18-02-20263162
MSRC Security UpdateCVE-2025-6491 NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix18-02-20263163
MSRC Security UpdateCVE-2025-21794 HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()18-02-20263164
MSRC Security UpdateCVE-2024-53150 ALSA: usb-audio: Fix out of bounds reads when finding clock sources18-02-20263165
MSRC Security UpdateCVE-2024-50059 ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition18-02-20263166
MSRC Security UpdateCVE-2025-21722 nilfs2: do not force clear folio if buffer is referenced18-02-20263167
MSRC Security UpdateCVE-2023-52435 net: prevent mss overflow in skb_segment()18-02-20263168
MSRC Security UpdateCVE-2019-10638 In the Linux kernel before 5.1.7 a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g. UDP and ICMP). When such traffic is sent to multiple destination IP addresses it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.18-02-20263169
MSRC Security UpdateCVE-2024-44946 kcm: Serialise kcm_sendmsg() for the same socket.18-02-20263170
MSRC Security UpdateCVE-2025-5318 Libssh: out-of-bounds read in sftp_handle()18-02-20263171
MSRC Security UpdateCVE-2025-1220 Null byte termination in hostnames18-02-20263172
MSRC Security UpdateCVE-2024-40979 wifi: ath12k: fix kernel crash during resume18-02-20263173
MSRC Security UpdateCVE-2023-52434 smb: client: fix potential OOBs in smb2_parse_contexts()18-02-20263174
MSRC Security UpdateCVE-2016-9840 inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic18-02-20263175
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter