Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 1426-1450 di 3902 risultati
Pagina 58 di 157

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2023-29400 Improper handling of empty HTML attributes in html/template18-02-20261426
MSRC Security UpdateCVE-2022-30767 nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.18-02-20261427
MSRC Security UpdateCVE-2024-40902 jfs: xattr: fix buffer overflow for invalid xattr18-02-20261428
MSRC Security UpdateCVE-2024-49881 ext4: update orig_path in ext4_find_extent()18-02-20261429
MSRC Security UpdateCVE-2025-37739 f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()18-02-20261430
MSRC Security UpdateCVE-2025-38183 net: lan743x: fix potential out-of-bounds write in lan743x_ptp_io_event_clock_get()18-02-20261431
MSRC Security UpdateCVE-2023-0664 A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.18-02-20261432
MSRC Security UpdateCVE-2025-37805 sound/virtio: Fix cancel_sync warnings on uninitialized work_structs18-02-20261433
MSRC Security UpdateCVE-2024-49893 drm/amd/display: Check stream_status before it is used18-02-20261434
MSRC Security UpdateCVE-2024-39494 ima: Fix use-after-free on a dentry's dname.name18-02-20261435
MSRC Security UpdateCVE-2025-38231 nfsd: Initialize ssc before laundromat_work to prevent NULL dereference18-02-20261436
MSRC Security UpdateCVE-2024-57254 An integer overflow in sqfs_inode_size in Das U-Boot before 2025.01-rc1 occurs in the symlink size calculation via a crafted squashfs filesystem.18-02-20261437
MSRC Security UpdateCVE-2024-0752 A use-after-free crash could have occurred on macOS if a Firefox update were being applied on a very busy system. This could have resulted in an exploitable crash. This vulnerability affects Firefox < 122.18-02-20261438
MSRC Security UpdateCVE-2025-61105 FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_link_info function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.18-02-20261439
MSRC Security UpdateCVE-2024-27316 Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames18-02-20261440
MSRC Security UpdateCVE-2025-37857 scsi: st: Fix array overflow in st_setup()18-02-20261441
MSRC Security UpdateCVE-2022-25881 This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server when that server reads the cache policy from the request using this library. 18-02-20261442
MSRC Security UpdateCVE-2024-49930 wifi: ath11k: fix array out-of-bound access in SoC stats18-02-20261443
MSRC Security UpdateCVE-2024-39495 greybus: Fix use-after-free bug in gb_interface_release due to race condition.18-02-20261444
MSRC Security UpdateCVE-2025-38201 netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX18-02-20261445
MSRC Security UpdateCVE-2025-14178 Heap buffer overflow in array_merge()18-02-20261446
MSRC Security UpdateCVE-2025-61102 FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.18-02-20261447
MSRC Security UpdateCVE-2025-37851 fbdev: omapfb: Add 'plane' value check18-02-20261448
MSRC Security UpdateCVE-2024-45009 mptcp: pm: only decrement add_addr_accepted for MPJ req18-02-20261449
MSRC Security UpdateCVE-2022-34835 In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function.18-02-20261450
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter