Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 4001-4025 di 4265 risultati
Pagina 161 di 171

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-6075 Quadratic complexity in os.path.expandvars() with user-controlled template06-12-20254001
MSRC Security UpdateCVE-2025-61724 Excessive CPU consumption in Reader.ReadResponse in net/textproto06-12-20254002
MSRC Security UpdateCVE-2025-58185 Parsing DER payload can cause memory exhaustion in encoding/asn106-12-20254003
MSRC Security UpdateCVE-2025-47912 Insufficient validation of bracketed IPv6 hostnames in net/url06-12-20254004
MSRC Security UpdateCVE-2025-61723 Quadratic complexity when parsing some invalid inputs in encoding/pem06-12-20254005
MSRC Security UpdateCVE-2025-58188 Panic when validating certificates with DSA public keys in crypto/x50906-12-20254006
MSRC Security UpdateCVE-2025-58186 Lack of limit when parsing cookies can cause memory exhaustion in net/http06-12-20254007
MSRC Security UpdateCVE-2025-58183 Unbounded allocation when parsing GNU sparse map in archive/tar06-12-20254008
MSRC Security UpdateCVE-2025-11411 Possible domain hijacking via promiscuous records in the authority section06-12-20254009
MSRC Security UpdateCVE-2025-55554 pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long().06-12-20254010
MSRC Security UpdateCVE-2025-55552 pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together.06-12-20254011
MSRC Security UpdateCVE-2025-55551 An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation.06-12-20254012
MSRC Security UpdateCVE-2025-55560 An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor.06-12-20254013
MSRC Security UpdateCVE-2025-10911 Libxslt: use-after-free with key data stored cross-rvt06-12-20254014
MSRC Security UpdateCVE-2025-9086 Out of bounds read for cookie path06-12-20254015
MSRC Security UpdateCVE-2025-8277 Libssh: memory exhaustion via repeated key exchange in libssh06-12-20254016
MSRC Security UpdateCVE-2025-9288 Missing type checks leading to hash rewind and passing on crafted data06-12-20254017
MSRC Security UpdateCVE-2021-23445 Cross-site Scripting (XSS)06-12-20254018
MSRC Security UpdateCVE-2025-8961 LibTIFF tiffcrop tiffcrop.c main memory corruption06-12-20254019
MSRC Security UpdateCVE-2025-8114 : null pointer dereference in libssh kex session id calculation06-12-20254020
MSRC Security UpdateCVE-2025-51480 Path Traversal vulnerability in onnx.external_data_helper.save_external_data in ONNX 1.17.0 allows attackers to overwrite arbitrary files by supplying crafted external_data.location paths containing traversal sequences, bypassing intended directory restrictions.06-12-20254021
MSRC Security UpdateCVE-2025-7424 Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes06-12-20254022
MSRC Security UpdateCVE-2025-7425 Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr06-12-20254023
MSRC Security UpdateCVE-2025-5916 Libarchive: integer overflow while reading warc files at archive_read_support_format_warc.c06-12-20254024
MSRC Security UpdateCVE-2025-5918 Libarchive: reading past eof may be triggered for piped file streams06-12-20254025
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter