Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 1426-1450 di 3799 risultati
Pagina 58 di 152

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2026-23222 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly03-03-20261426
MSRC Security UpdateCVE-2026-1979 mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free03-03-20261427
MSRC Security UpdateCVE-2026-23217 riscv: trace: fix snapshot deadlock with sbi ecall03-03-20261428
MSRC Security UpdateCVE-2025-15079 libssh global known_hosts override03-03-20261429
MSRC Security UpdateCVE-2025-15224 libssh key passphrase bypass without agent set03-03-20261430
MSRC Security UpdateCVE-2023-45229 Out-of-Bounds Read in EDK II Network Package03-03-20261431
MSRC Security UpdateCVE-2024-38796 Integer overflow in PeCoffLoaderRelocateImage03-03-20261432
MSRC Security UpdateCVE-2023-45231 Out-of-Bounds Read in EDK II Network Package03-03-20261433
MSRC Security UpdateCVE-2022-4304 Timing Oracle in RSA Decryption03-03-20261434
MSRC Security UpdateCVE-2026-27969 Vitess users with backup storage access can write to arbitrary file paths on restore01-03-20261435
MSRC Security UpdateCVE-2026-28422 Vim has stack-buffer-overflow in build_stl_str_hl()01-03-20261436
MSRC Security UpdateCVE-2026-28419 Vim has Heap-based Buffer Underflow in Emacs tags parsing01-03-20261437
MSRC Security UpdateCVE-2026-28418 Vim has Heap-based Buffer Overflow in Emacs tags parsing01-03-20261438
MSRC Security UpdateCVE-2026-28420 Vim has Heap-based Buffer Overflow and OOB Read in :terminal01-03-20261439
MSRC Security UpdateCVE-2026-28421 Vim has a heap-buffer-overflow and a segmentation fault01-03-20261440
MSRC Security UpdateCVE-2026-28417 Vim has OS Command Injection in netrw01-03-20261441
MSRC Security UpdateCVE-2026-27571 nats-server websockets are vulnerable to pre-auth memory DoS28-02-20261442
MSRC Security UpdateCVE-2025-69873 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.28-02-20261443
MSRC Security UpdateCVE-2025-71232 scsi: qla2xxx: Free sp in error path to fix system crash28-02-20261444
MSRC Security UpdateCVE-2025-71237 nilfs2: Fix potential block overflow that cause system hang28-02-20261445
MSRC Security UpdateCVE-2026-23220 ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths28-02-20261446
MSRC Security UpdateCVE-2025-71229 wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()28-02-20261447
MSRC Security UpdateCVE-2025-71235 scsi: qla2xxx: Delay module unload while fabric scan in progress28-02-20261448
MSRC Security UpdateCVE-2026-23228 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()28-02-20261449
MSRC Security UpdateCVE-2026-23222 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly28-02-20261450
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter