Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 401-425 di 4347 risultati
Pagina 17 di 174

Avvisi di Sicurezza

CERT Alert Data #
Consiglio Federale CHRilevato PoC in RustFS Console02-03-2026401
SANSQuick Howto: ZIP Files Inside RTF, (Mon, Mar 2nd)02-03-2026402
SANSWireshark 4.6.4 Released, (Mon, Mar 2nd)02-03-2026403
Unit42Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel02-03-2026404
CSIRT ITRilevate vulnerabilità in prodotti JetBrains02-03-2026405
Consiglio Federale CHRilevate vulnerabilità in prodotti JetBrains02-03-2026406
SANSISC Stormcast For Monday, March 2nd, 2026 https://isc.sans.edu/podcastdetail/9830, (Mon, Mar 2nd)02-03-2026407
FR-CERT AvisMultiples vulnérabilités dans MISP (02 mars 2026)02-03-2026408
EU-ENISA PublicationsMultiples vulnérabilités dans les produits Microsoft (02 mars 2026)02-03-2026409
EU-ENISA PublicationsMultiples vulnérabilités dans MISP (02 mars 2026)02-03-2026410
FR-CERT AvisMultiples vulnérabilités dans les produits Microsoft (02 mars 2026)02-03-2026411
MSRC Security UpdateCVE-2026-27969 Vitess users with backup storage access can write to arbitrary file paths on restore01-03-2026412
MSRC Security UpdateCVE-2026-28422 Vim has stack-buffer-overflow in build_stl_str_hl()01-03-2026413
MSRC Security UpdateCVE-2026-28419 Vim has Heap-based Buffer Underflow in Emacs tags parsing01-03-2026414
MSRC Security UpdateCVE-2026-28418 Vim has Heap-based Buffer Overflow in Emacs tags parsing01-03-2026415
MSRC Security UpdateCVE-2026-28420 Vim has Heap-based Buffer Overflow and OOB Read in :terminal01-03-2026416
MSRC Security UpdateCVE-2026-28421 Vim has a heap-buffer-overflow and a segmentation fault01-03-2026417
MSRC Security UpdateCVE-2026-28417 Vim has OS Command Injection in netrw01-03-2026418
MSRC Security UpdateCVE-2026-27571 nats-server websockets are vulnerable to pre-auth memory DoS28-02-2026419
MSRC Security UpdateCVE-2025-69873 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.28-02-2026420
MSRC Security UpdateCVE-2025-71232 scsi: qla2xxx: Free sp in error path to fix system crash28-02-2026421
MSRC Security UpdateCVE-2025-71237 nilfs2: Fix potential block overflow that cause system hang28-02-2026422
MSRC Security UpdateCVE-2026-23220 ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths28-02-2026423
MSRC Security UpdateCVE-2025-71229 wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()28-02-2026424
MSRC Security UpdateCVE-2025-71235 scsi: qla2xxx: Delay module unload while fabric scan in progress28-02-2026425
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter