Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 476-500 di 4351 risultati
Pagina 20 di 175

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-71161 dm-verity: disable recursive forward error correction28-02-2026476
MSRC Security UpdateCVE-2025-71160 netfilter: nf_tables: avoid chain re-validation if possible28-02-2026477
MSRC Security UpdateCVE-2025-71154 net: usb: rtl8150: fix memory leak on usb_submit_urb() failure28-02-2026478
MSRC Security UpdateCVE-2025-71152 net: dsa: properly keep track of conduit reference28-02-2026479
MSRC Security UpdateCVE-2025-71150 ksmbd: Fix refcount leak when invalid session is found on session lookup28-02-2026480
MSRC Security UpdateCVE-2025-71147 KEYS: trusted: Fix a memory leak in tpm2_load_cmd28-02-2026481
MSRC Security UpdateCVE-2025-71089 iommu: disable SVA when CONFIG_X86 is set28-02-2026482
MSRC Security UpdateCVE-2025-68817 ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency28-02-2026483
MSRC Security UpdateCVE-2025-68365 fs/ntfs3: Initialize allocated memory before use28-02-2026484
MSRC Security UpdateCVE-2025-68340 team: Move team device type change at the end of team_port_add28-02-2026485
MSRC Security UpdateCVE-2025-68211 ksm: use range-walk function to jump over holes in scan_get_next_rmap_item28-02-2026486
MSRC Security UpdateCVE-2025-40251 devlink: rate: Unset parent pointer in devl_rate_nodes_destroy28-02-2026487
MSRC Security UpdateCVE-2025-40149 tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().28-02-2026488
MSRC Security UpdateCVE-2025-40040 mm/ksm: fix flag-dropping behavior in ksm_madvise28-02-2026489
MSRC Security UpdateCVE-2025-40039 ksmbd: Fix race condition in RPC handle list access28-02-2026490
MSRC Security UpdateCVE-2023-54207 HID: uclogic: Correct devm device reference for hidinput input_dev name28-02-2026491
MSRC Security UpdateCVE-2026-21523 GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability27-02-2026492
MSRC Security UpdateCVE-2026-21518 GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability27-02-2026493
Consiglio Federale CHRisolta vulnerabilità nella libreria pgvector per PostgreSQL27-02-2026494
CSIRT ITRisolta vulnerabilità nella libreria pgvector per PostgreSQL27-02-2026495
CSIRT ITVulnerabilità in prodotti ServiceNow27-02-2026496
Consiglio Federale CHVulnerabilità in prodotti ServiceNow27-02-2026497
MSRC Security UpdateCVE-2026-21620 TFTP Path Traversal27-02-2026498
MSRC Security UpdateCVE-2026-27571 nats-server websockets are vulnerable to pre-auth memory DoS27-02-2026499
MSRC Security UpdateCVE-2025-69873 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.27-02-2026500
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter