Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 2751-2775 di 4272 risultati
Pagina 111 di 171

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-1151 GNU Binutils ld xmemdup.c xmemdup memory leak08-01-20262751
MSRC Security UpdateCVE-2024-42064 drm/amd/display: Skip pipe if the pipe idx not set properly08-01-20262752
MSRC Security UpdateCVE-2024-58006 PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar()08-01-20262753
MSRC Security UpdateCVE-2025-21682 eth: bnxt: always recalculate features after XDP clearing, fix null-deref08-01-20262754
MSRC Security UpdateCVE-2025-37822 riscv: uprobes: Add missing fence.i after building the XOL buffer08-01-20262755
MSRC Security UpdateCVE-2025-37882 usb: xhci: Fix isochronous Ring Underrun/Overrun event handling08-01-20262756
MSRC Security UpdateCVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.08-01-20262757
MSRC Security UpdateCVE-2025-37856 btrfs: harden block_group::bg_list against list_del() races08-01-20262758
MSRC Security UpdateCVE-2025-37807 bpf: Fix kmemleak warning for percpu hashmap08-01-20262759
MSRC Security UpdateCVE-2024-23848 In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.08-01-20262760
MSRC Security UpdateCVE-2025-1744 Out-of-bounds Write in radare208-01-20262761
MSRC Security UpdateCVE-2025-68766 irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()08-01-20262762
MSRC Security UpdateCVE-2025-68753 ALSA: firewire-motu: add bounds check in put_user loop for DSP events08-01-20262763
MSRC Security UpdateCVE-2025-15284 arrayLimit bypass in bracket notation allows DoS via memory exhaustion08-01-20262764
MSRC Security UpdateCVE-2025-34468 libcoap Stack-Based Buffer Overflow in Address Resolution DoS or Potential RCE08-01-20262765
MSRC Security UpdateCVE-2025-68380 wifi: ath11k: fix peer HE MCS assignment08-01-20262766
MSRC Security UpdateCVE-2025-68346 ALSA: dice: fix buffer overflow in detect_stream_formats()08-01-20262767
MSRC Security UpdateCVE-2025-68367 macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse08-01-20262768
MSRC Security UpdateCVE-2025-68729 wifi: ath12k: Fix MSDU buffer types handling in RX error path08-01-20262769
MSRC Security UpdateCVE-2025-38425 i2c: tegra: check msg length in SMBUS block read08-01-20262770
MSRC Security UpdateCVE-2025-38476 rpl: Fix use-after-free in rpl_do_srh_inline().08-01-20262771
MSRC Security UpdateCVE-2025-38437 ksmbd: fix potential use-after-free in oplock/lease break ack08-01-20262772
MSRC Security UpdateCVE-2025-68476 KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential08-01-20262773
MSRC Security UpdateCVE-2025-38377 rose: fix dangling neighbour pointers in rose_rt_device_down()08-01-20262774
MSRC Security UpdateCVE-2025-38259 ASoC: codecs: wcd9335: Fix missing free of regulator supplies08-01-20262775
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter