Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 1-25 di 4028 risultati
Pagina 1 di 162

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2026-43619 Rsync < 3.4.3 Symlink Race Condition via Path-Based Syscalls23-05-20261
MSRC Security UpdateCVE-2026-7246 Pallets Click contains a command injection via Unsanitized Filename "click.edit()"23-05-20262
MSRC Security UpdateCVE-2026-44673 libyang: lyb_read_string() integer overflow → heap buffer overflow23-05-20263
MSRC Security UpdateCVE-2025-68768 inet: frags: flush pending skbs in fqdir_pre_exit()23-05-20264
MSRC Security UpdateCVE-2026-44390 Unbounded name compression in certain cases causes degradation of service23-05-20265
MSRC Security UpdateCVE-2025-51480 Path Traversal vulnerability in onnx.external_data_helper.save_external_data in ONNX 1.17.0 allows attackers to overwrite arbitrary files by supplying crafted external_data.location paths containing traversal sequences, bypassing intended directory restrictions.23-05-20266
MSRC Security UpdateCVE-2026-42944 Heap overflow with multiple NSID, COOKIE, PADDING EDNS options23-05-20267
MSRC Security UpdateCVE-2026-42923 Degradation of service with unbounded NSEC3 hash calculations23-05-20268
MSRC Security UpdateCVE-2025-38096 wifi: iwlwifi: don't warn when if there is a FW error23-05-20269
MSRC Security UpdateCVE-2026-40622 Another 'ghost domain names' attack variant23-05-202610
MSRC Security UpdateCVE-2025-38140 dm: limit swapping tables for devices with zone write plugs23-05-202611
MSRC Security UpdateCVE-2026-42534 Jostle logic bypass degrades resolution performance23-05-202612
MSRC Security UpdateCVE-2026-41292 Long list of incoming EDNS options degrades performance23-05-202613
MSRC Security UpdateCVE-2026-33278 Possible arbitrary code execution during DNSSEC validation23-05-202614
MSRC Security UpdateCVE-2026-41035 In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.23-05-202615
MSRC Security UpdateCVE-2026-44608 Use after free and crash under special conditions in RPZ code23-05-202616
MSRC Security UpdateCVE-2026-42959 Crash during DNSSEC validation of malicious content23-05-202617
MSRC Security UpdateCVE-2026-42960 Possible cache poisoning via promiscuous records for the authority section23-05-202618
MSRC Security UpdateCVE-2026-32792 Packet of death with DNSCrypt23-05-202619
MSRC Security UpdateCVE-2026-29518 Rsync < 3.4.3 TOCTOU Race Condition Allows Symlink-Based Arbitrary File Write23-05-202620
MSRC Security UpdateCVE-2026-45232 Rsync < 3.4.3 Off-by-One Stack Write via HTTP Proxy23-05-202621
MSRC Security UpdateCVE-2026-43617 Rsync < 3.4.3 Authorization Bypass via Hostname Resolution23-05-202622
MSRC Security UpdateCVE-2026-43620 Rsync < 3.4.3 Out-of-Bounds Array Read via recv_files()23-05-202623
MSRC Security UpdateCVE-2026-43618 Rsync < 3.4.3 Integer Overflow Information Disclosure23-05-202624
MSRC Security UpdateCVE-2025-14575 Uncontrolled Search Path Element in Qt Network OpenSSL TLS backend allows rogue CA certificate loading23-05-202625
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter