Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 426-450 di 4351 risultati
Pagina 18 di 175

Avvisi di Sicurezza

CERT Alert Data #
Unit42Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel02-03-2026426
Consiglio Federale CHRilevate vulnerabilità in prodotti JetBrains02-03-2026427
CSIRT ITRilevate vulnerabilità in prodotti JetBrains02-03-2026428
SANSISC Stormcast For Monday, March 2nd, 2026 https://isc.sans.edu/podcastdetail/9830, (Mon, Mar 2nd)02-03-2026429
EU-ENISA PublicationsMultiples vulnérabilités dans MISP (02 mars 2026)02-03-2026430
EU-ENISA PublicationsMultiples vulnérabilités dans les produits Microsoft (02 mars 2026)02-03-2026431
FR-CERT AvisMultiples vulnérabilités dans MISP (02 mars 2026)02-03-2026432
FR-CERT AvisMultiples vulnérabilités dans les produits Microsoft (02 mars 2026)02-03-2026433
MSRC Security UpdateCVE-2026-27969 Vitess users with backup storage access can write to arbitrary file paths on restore01-03-2026434
MSRC Security UpdateCVE-2026-28422 Vim has stack-buffer-overflow in build_stl_str_hl()01-03-2026435
MSRC Security UpdateCVE-2026-28419 Vim has Heap-based Buffer Underflow in Emacs tags parsing01-03-2026436
MSRC Security UpdateCVE-2026-28418 Vim has Heap-based Buffer Overflow in Emacs tags parsing01-03-2026437
MSRC Security UpdateCVE-2026-28420 Vim has Heap-based Buffer Overflow and OOB Read in :terminal01-03-2026438
MSRC Security UpdateCVE-2026-28421 Vim has a heap-buffer-overflow and a segmentation fault01-03-2026439
MSRC Security UpdateCVE-2026-28417 Vim has OS Command Injection in netrw01-03-2026440
MSRC Security UpdateCVE-2026-27571 nats-server websockets are vulnerable to pre-auth memory DoS28-02-2026441
MSRC Security UpdateCVE-2025-69873 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.28-02-2026442
MSRC Security UpdateCVE-2025-71232 scsi: qla2xxx: Free sp in error path to fix system crash28-02-2026443
MSRC Security UpdateCVE-2025-71237 nilfs2: Fix potential block overflow that cause system hang28-02-2026444
MSRC Security UpdateCVE-2026-23220 ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths28-02-2026445
MSRC Security UpdateCVE-2025-71229 wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()28-02-2026446
MSRC Security UpdateCVE-2025-71235 scsi: qla2xxx: Delay module unload while fabric scan in progress28-02-2026447
MSRC Security UpdateCVE-2026-23228 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()28-02-2026448
MSRC Security UpdateCVE-2026-23222 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly28-02-2026449
MSRC Security UpdateCVE-2026-23212 bonding: annotate data-races around slave->last_rx28-02-2026450
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter