Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 3651-3675 di 3995 risultati
Pagina 147 di 160

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2024-43914 md/raid5: avoid BUG_ON() while continue reshape after reassembling18-02-20263651
MSRC Security UpdateCVE-2024-56548 hfsplus: don't query the device logical block size multiple times18-02-20263652
MSRC Security UpdateCVE-2024-56741 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.18-02-20263653
MSRC Security UpdateCVE-2025-52555 CephFS Permission Escalation Vulnerability in Ceph Fuse mounted FS18-02-20263654
MSRC Security UpdateCVE-2024-39894 OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g. for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly other timing attacks against keystroke entry could occur.18-02-20263655
MSRC Security UpdateCVE-2020-24347 njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_lvlhsh_level_find in njs_lvlhsh.c.18-02-20263656
MSRC Security UpdateCVE-2022-30631 Stack exhaustion when reading certain archives in compress/gzip18-02-20263657
MSRC Security UpdateCVE-2024-42289 scsi: qla2xxx: During vport delete send async logout explicitly18-02-20263658
MSRC Security UpdateCVE-2023-38546 This flaw allows an attacker to insert cookies at will into a running program using libcurl if the specific series of conditions are met. libcurl performs transfers. In its API an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program usin18-02-20263659
MSRC Security UpdateCVE-2024-58010 binfmt_flat: Fix integer overflow bug on 32 bit systems18-02-20263660
MSRC Security UpdateCVE-2025-38086 net: ch9200: fix uninitialised access during mii_nway_restart18-02-20263661
MSRC Security UpdateCVE-2024-36387 Apache HTTP Server: DoS by Null pointer in websocket over HTTP/218-02-20263662
MSRC Security UpdateCVE-2024-56765 powerpc/pseries/vas: Add close() callback in vas_vm_ops struct18-02-20263663
MSRC Security UpdateCVE-2025-6395 Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()18-02-20263664
MSRC Security UpdateCVE-2024-44986 ipv6: fix possible UAF in ip6_finish_output2()18-02-20263665
MSRC Security UpdateCVE-2023-50495 NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().18-02-20263666
MSRC Security UpdateCVE-2025-39732 wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()18-02-20263667
MSRC Security UpdateCVE-2025-21700 net: sched: Disallow replacing of child qdisc from one parent to another18-02-20263668
MSRC Security UpdateCVE-2024-49896 drm/amd/display: Check stream before comparing them18-02-20263669
MSRC Security UpdateCVE-2025-38085 mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race18-02-20263670
MSRC Security UpdateCVE-2024-26948 drm/amd/display: Add a dc_state NULL check in dc_state_release18-02-20263671
MSRC Security UpdateCVE-2022-46456 NASM v2.16 was discovered to contain a global buffer overflow in the component dbgdbg_typevalue at /output/outdbg.c.18-02-20263672
MSRC Security UpdateCVE-2024-37298 Potential memory exhaustion attack due to sparse slice deserialization18-02-20263673
MSRC Security UpdateCVE-2025-27221 In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.18-02-20263674
MSRC Security UpdateCVE-2022-24921 regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.18-02-20263675
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter